Certified Information Systems Security Professional - CISSP
4.4 (754 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
5,598 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Certified Information Systems Security Professional - CISSP to your Wishlist.

Add to Wishlist

Certified Information Systems Security Professional - CISSP

Get CISSP Certified easily
Bestselling
4.4 (754 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
5,598 students enrolled
Created by Mohamed Atef
Last updated 6/2017
English
English
Current price: $10 Original price: $95 Discount: 89% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 9.5 hours on-demand video
  • 2 Articles
  • 3 Supplemental Resources
  • 1 Practice Test
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Clear CISSP Exam
  • Analyze information systems access control.
  • Analyze security architecture and design
  • Analyze network security systems and telecommunications.
  • Analyze information security classification and program development.
  • Analyze risk management criteria and ethical codes of conduct.
  • Analyze cryptography characteristics and elements.
  • Analyze physical security.
  • Analyze operations security.
  • Apply Business Continuity and Disaster Recovery Plans.
  • Analyze software development security.
  • Identify legal issues, regulations, compliance standards, and investigation practices relating to information systems security.
View Curriculum
Requirements
  • 2 years of experiences in security
Description

In today fast evolving times technological solutions by itself cannot protect an organizations important information assets. So, Employers demanding qualified information security staff give their organizations a leading edge by providing the highest standard of security for their  customers, employees, stakeholders and organizational information assets.

The CISSP is an internationally recognized certification for information security professionals.  Offered by the International Information Systems Security Certification Consortium, (ISC)2, the CISSP certification is both an objective measure of excellence and a globally recognized standard of achievement. 

Benefits of the CISSP Certification for Professionals

  • Indicates a working knowledge of information security
  • Commitment to profession
  • Provides a career distinction, with enhanced credibility and marketability
  • Has exclusive benefits as an (ISC)² member, including valuable resources such as peer networking and idea exchange
  • Certified information security professionals earn more than their non-certified counterparts, according to the Global Information Security Workforce Study
  • Satisfies the government and organization requirements for information security certification mandates


Who is the target audience?
  • IT security-related practitione
  • Security Administrators
  • Auditors
  • Network analysts
  • Security analysts
  • Information Security officer (ISO)
  • Consultants
  • Security Instructors
Students Who Viewed This Course Also Viewed
Curriculum For This Course
71 Lectures
09:35:11
+
Introduction
4 Lectures 20:57

Introduction about the course objective and the CISSP certificate.

Preview 12:13


In this lecture i explained the CISSP course road map 

Course Roadmap
04:11

In this lecture i explained the difference between the CISSP 3rd edition and the CISSP 4th edition 

CISSP 3rd vs CISSP 4th
03:42
+
Information Systems Access Control
13 Lectures 02:01:34

In this lecture i explained what will be the resources used during the course and the website that student will use to practice the exam.

Exam website

http://www.mhprofessional.com/sites/CISSPExams/exam.php?id=AccessControl

Important Websites and Course Material
07:02

Course Materials and Study Plan
00:27

Extra Resources.
00:10

In this lecture i  introduced the first domain which is the ACCESS CONTROL , the components of AC.

Introduction
06:45

In this lecture i explained the different Authorization modals.

Authorization
19:19

In this lecture i explained the different Authentication modals.

Authentication
18:45

Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in with a single ID and password to gain access to a connected system or systems without using different usernames or passwords, or in some configurations seamlessly sign on at each system.

Single Sign On SSO
13:05

Cnetral Administration (RADUIS)
04:12

In this lecture i explained different attacks that target the Access Control, Technical and human based.

Access Control Attack
17:11

In This lecture i explained what is Intrusion Detection System IDS.

Intrusion Detection Systems
06:53

In this lecture i explained the importance of penetration testing and the different phases. 

Penetration Testing
15:36

Acces Control Important area for the exam
04:10

In this lecture i went through some exam question.

Access Control Questions
07:58
+
Security Architecture and Design
8 Lectures 01:07:13

In this lecture i explained the different security framework like ISO , COBIT and others.

Common Security Architecture Frameworks
12:21

Trusted Computing Base
09:17

In this lectures i explained different security models like BLP, BIBA and other models and what is their objectives. 

Security Models
17:03

In this lecture i explained the major Trusted Computer based vulnerability.

TCB Vulnerabilities
09:43

In this lecture i explained different security mode and their definition. 

Security Mode Types
03:41

In this lecture i explained the TCSEC or also known Orange book.

TCSEC
05:46

In this lecture we explained the ITSEC

Information Systems Security Standards
06:09

In this lecture i went through some exam question. 

Security Architecture Questions
03:13
+
Network and Telecommunications Security
12 Lectures 01:47:26

In this lecture i explained the OSI Model

The OSI Model
17:22

TCP/IP Model
02:45

Network Architecture Components
17:04

In this lecture i explained the different types of firewall 

Firewall
10:38

Network Types and Topolgies
08:37

In this lectures i explained the Remote Access Technology

Remote Access Technology
18:30

Wireless Network
07:15

In this lecture i explained the different network attacks. 

Network Attacks
08:58

Remote Access Security Mechanisms
02:12

RAID
06:54

In this lecture i explained the different type of backup.

Backup
05:55

Network Questions
01:16
+
Information Security Classification and Program Development
3 Lectures 12:17
Classification Schemes
04:34

Security Document Types
03:21

Security Awareness and Training
04:22
+
Risk Management and Ethics
3 Lectures 35:56
What is a Risk ?
11:59

Asset Evaluation
18:28

Ethics Issues in a Computing Environment
05:29
+
Cryptography
5 Lectures 56:47
Cryptography
16:26

Alternative Ciphers
07:51

Symmetric Encryption
12:38

Asymmetric Encryption
13:47

Hashing
06:05
+
Physical Security
4 Lectures 26:01
What Is Physical Security?
07:39

Physical Access Barriers
09:44

Power Issues
03:10

Fire
05:28
+
Operations Security
2 Lectures 14:27
Operations Security
04:03

Operations Security Control Methods
10:24
+
Business Continuity and Disaster Recovery Planning
5 Lectures 47:53
Business Continuity Plans
14:32

Business Impact Analysis
10:09

MTD/RTO/RPO
11:39

Disaster Recovery Plans
03:29

Alternate Sites
08:04
4 More Sections
About the Instructor
Mohamed Atef
4.3 Average rating
2,868 Reviews
19,156 Students
14 Courses
Information Security Consultant, Certified Instructor

Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience.

CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+

Professional Experience:
IBM, Cliveland Clink Abu Dhabi (CCAD), Orascom Telecommunication, UAE Ministry of Interior, Egyptian Ministry of Interior, Saudi Ministry of Interior, Prince Naif University for forensic science - KSA, Khalifa University - UAE, Cairo University - Egypt