Certified Information Systems Security Professional - CISSP
4.4 (199 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
2,553 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Certified Information Systems Security Professional - CISSP to your Wishlist.

Add to Wishlist

Certified Information Systems Security Professional - CISSP

Get CISSP Certified easily
Best Seller
4.4 (199 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
2,553 students enrolled
Created by Mohamed Atef
Last updated 8/2017
English
English [Auto-generated]
Current price: $12 Original price: $95 Discount: 87% off
4 days left at this price!
30-Day Money-Back Guarantee
Includes:
  • 9.5 hours on-demand video
  • 2 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion

Training 5 or more people?

Get your team access to Udemy's top 2,000 courses anytime, anywhere.

Try Udemy for Business
What Will I Learn?
  • Be ready to pass the CISSP exam from the first attempt
  • Understand the different Information Security domains
View Curriculum
Requirements
  • Students need to have 2 years of experience in Information Security
Description

In today's fast evolving times technological solutions by itself cannot protect an organization's important information assets. So, Employers demanding qualified information security staff give their organizations a leading edge by providing the highest standard of security for their customers, employees, stakeholders and organizational information assets.

The CISSP is an internationally recognized security certification for information security professionals. Offered by the International Information Systems Security Certification Consortium, (ISC)2, the CISSP certification is both an objective measure of excellence and a globally recognized standard of achievement.

Benefits of the CISSP Certification for Professionals

  • Indicates a working knowledge of information security
  • Commitment to profession
  • Provides a career distinction, with enhanced credibility and marketability
  • Has exclusive benefits as an (ISC)² member, including valuable resources such as peer networking and idea exchange
  • Certified information security professionals earn more than their non-certified counterparts, according to the Global Information Security Workforce Study
  • Satisfies the government and organization requirements for information security certification mandates
Who is the target audience?
  • You
  • Cyber Security Professional
  • Information Security Specialist
  • Student who want to start learning about security
  • Anyone who want to start an Information Security Career
Compare to Other CISSP Courses
Curriculum For This Course
69 Lectures
09:24:55
+
Introduction
4 Lectures 20:57

Some of the Sucess Stories for students who enrolled in my course and pass the CISSP exam from the first attempt.

Preview 00:51

The value of the CISSP Certificates in the market today and what will be the benefit of  of holding a CISSP Certificate 

Preview 12:13

The course plan and Road map, 

How can you get CISSP Certified from 3 to 5 weeks ?

 what should be the study plan ?

Course Roadmap
04:11

What is the difference between CISSP Third and Fourth Edition and why should you study the Third Edition to pass the Fourth Edition exam. 

CISSP 3rd vs 4th
03:42
+
Information Systems Access Control
11 Lectures 02:00:57

The Resources that you should use during the course and the best exam practice questions that will allow you to clear the CISSP from the first attempt. 

Important Websites and Course Material
07:02

An Instruction to Access Control also know as AAA (Authentication , Authorization and Accounting) 

Introduction to Access Control
06:45

The different Authorization Models and the difference between DAC, MAC and Non DAC

Authorization
19:19

The Different type of Authentication. 

Authentication
18:46

Single Sign On is very common, 

How it work ?

What Protocol is using SSO ? 

What is the component of SSO ?

Single Sign on SSO
13:05

A Clear Explanation of RADUIS

Central Administration (RADUIS)
04:12

Different types of Access Control Attacks 

Access Control Attack
17:11

Different types of IDS / IPS and how they are functioning. 

Instrusion Detection System (IDS)
06:53

The Importance of Penetration Testing and the different phases of PT. 

Penetration Testing
15:36

Which area you should focus on in the access control domain for the exam. 

Access Control Inportant exam area
04:10

Some Examples of Access control question in the exam. 

Access Control Questions
07:58
+
Security Architecture and Design
8 Lectures 01:07:13

Some of the common Security framework 

Common Security Architecture Frameworks
12:21

The definition of the Trusted Computer base also know as TCB

Trused Computing base
09:17

Different Types of Security Models. 

Security Models
17:03

TCB Vulnerability

TCB Vulerability
09:43

Different type of Security Modes. 

Secuity Mode Types
03:41

TCSEC a an American standard using to evaluate computer system 

TCSEC
05:46

ITSEC is an European standard used to evaluate computer systems. 

Information Systems Security Standards
06:09

Some sample of exam questions

Security Archtecture Questions
03:13
+
Network and Telecommunications Security
12 Lectures 01:47:26
The OSI Model
17:22

TCP / IP Model

TCP/IP Model
02:45

Network Architecture Components
17:04

Different types of Firewall and their usages. 

Firewall
10:38

Network Types and Topolgies
08:37

Remote Access Technology
18:30

Wireless Network
07:15

Network Attacks
08:58

Remote Access Security Mechanisms
02:12

Different types of RAID and their usages.

RAID
06:54

Different types of Backup and their usages. 

Backup
05:55

Some Network questions from the exam. 

Network Questions
01:16
+
Information Security Classification and Program Development
3 Lectures 12:17
Classification Schemes
04:34

Different types of Security documents, like policy , procedures, guidelines and standard 

Security Document Types
03:21

Security Awareness and Training
04:22
+
Risk Management and Ethics
3 Lectures 35:56
What is a Risk ?
11:59

Asset Valuation
18:28

Ethics Issues in a Computing Environment
05:29
+
Cryptography
5 Lectures 56:47
Cryptography
16:26

Alternative Ciphers
07:51

Symmetric Encryption
12:38

Asymmetric Encryption
13:47

Hashing
06:05
+
Physical Security
4 Lectures 26:01
What Is Physical Security?
07:39

Physical Access Barriers
09:44

Power Issues
03:10

Fire
05:28
+
Operations Security
2 Lectures 14:27
Operations Security
04:03

Operations Security Control Methods
10:24
+
Business Continuity and Disaster Recovery Planning
5 Lectures 47:53
Business Continuity Plans
14:32

Business Impact Analysis
10:09

MTD/RTO/RPO
11:39

How to create a Disaster Recovery Plan. 

Disaster Recovery Plans
03:29

Alternate Sites
08:04
4 More Sections
About the Instructor
Mohamed Atef
4.4 Average rating
2,674 Reviews
20,367 Students
14 Courses
Information Security Consultant, Certified Instructor

Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience.

CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+

Professional Experience:
IBM, Cliveland Clink Abu Dhabi (CCAD), Orascom Telecommunication, UAE Ministry of Interior, Egyptian Ministry of Interior, Saudi Ministry of Interior, Prince Naif University for forensic science - KSA, Khalifa University - UAE, Cairo University - Egypt