Certified Information Systems Security Professional - CISSP

Get CISSP Certified easily
4.4 (193 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
1,635 students enrolled
$19
$50
62% off
Take This Course
  • Lectures 68
  • Length 9.5 hours
  • Skill Level Intermediate Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 4/2016 English

Course Description

In today fast evolving times technological solutions by itself cannot protect an organizations important information assets. So, Employers demanding qualified information security staff give their organizations a leading edge by providing the highest standard of security for their  customers, employees, stakeholders and organizational information assets.

The CISSP is an internationally recognized certification for information security professionals.  Offered by the International Information Systems Security Certification Consortium, (ISC)2, the CISSP certification is both an objective measure of excellence and a globally recognized standard of achievement. 

Benefits of the CISSP Certification for Professionals

  • Indicates a working knowledge of information security
  • Commitment to profession
  • Provides a career distinction, with enhanced credibility and marketability
  • Has exclusive benefits as an (ISC)² member, including valuable resources such as peer networking and idea exchange
  • Certified information security professionals earn more than their non-certified counterparts, according to the Global Information Security Workforce Study
  • Satisfies the government and organization requirements for information security certification mandates


What are the requirements?

  • 2 years of experiences in security

What am I going to get from this course?

  • Clear CISSP Exam
  • Analyze information systems access control.
  • Analyze security architecture and design
  • Analyze network security systems and telecommunications.
  • Analyze information security classification and program development.
  • Analyze risk management criteria and ethical codes of conduct.
  • Analyze cryptography characteristics and elements.
  • Analyze physical security.
  • Analyze operations security.
  • Apply Business Continuity and Disaster Recovery Plans.
  • Analyze software development security.
  • Identify legal issues, regulations, compliance standards, and investigation practices relating to information systems security.

What is the target audience?

  • IT security-related practitione
  • Security Administrators
  • Auditors
  • Network analysts
  • Security analysts
  • Information Security officer (ISO)
  • Consultants
  • Security Instructors

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction
12:13

Introduction about the course objective and the CISSP certificate.

04:11

In this lecture i explained the CISSP course road map 

03:42

In this lecture i explained the difference between the CISSP 3rd edition and the CISSP 4th edition 

Section 2: Information Systems Access Control
07:02

In this lecture i explained what will be the resources used during the course and the website that student will use to practice the exam.

Exam website

http://www.mhprofessional.com/sites/CISSPExams/exam.php?id=AccessControl

06:45

In this lecture i  introduced the first domain which is the ACCESS CONTROL , the components of AC.

19:19

In this lecture i explained the different Authorization modals.

18:45

In this lecture i explained the different Authentication modals.

13:05

Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in with a single ID and password to gain access to a connected system or systems without using different usernames or passwords, or in some configurations seamlessly sign on at each system.

Cnetral Administration (RADUIS)
04:12
17:11

In this lecture i explained different attacks that target the Access Control, Technical and human based.

06:53

In This lecture i explained what is Intrusion Detection System IDS.

15:36

In this lecture i explained the importance of penetration testing and the different phases. 

Acces Control Important area for the exam
04:10
07:58

In this lecture i went through some exam question.

Section 3: Security Architecture and Design
12:21

In this lecture i explained the different security framework like ISO , COBIT and others.

Trusted Computing Base
09:17
17:03

In this lectures i explained different security models like BLP, BIBA and other models and what is their objectives. 

09:43

In this lecture i explained the major Trusted Computer based vulnerability.

03:41

In this lecture i explained different security mode and their definition. 

05:46

In this lecture i explained the TCSEC or also known Orange book.

06:09

In this lecture we explained the ITSEC

03:13

In this lecture i went through some exam question. 

Section 4: Network and Telecommunications Security
17:22

In this lecture i explained the OSI Model

TCP/IP Model
02:45
Network Architecture Components
17:04
10:38

In this lecture i explained the different types of firewall 

Network Types and Topolgies
08:37
18:30

In this lectures i explained the Remote Access Technology

Wireless Network
07:15
08:58

In this lecture i explained the different network attacks. 

Remote Access Security Mechanisms
02:12
RAID
06:54
05:55

In this lecture i explained the different type of backup.

Network Questions
01:16
Section 5: Information Security Classification and Program Development
Classification Schemes
04:34
Security Document Types
03:21
Security Awareness and Training
04:22
Section 6: Risk Management and Ethics
What is a Risk ?
11:59
Asset Evaluation
18:28
Ethics Issues in a Computing Environment
05:29
Section 7: Cryptography
Cryptography
16:26
Alternative Ciphers
07:51
Symmetric Encryption
12:38
Asymmetric Encryption
13:47
Hashing
06:05
Section 8: Physical Security
What Is Physical Security?
07:39
Physical Access Barriers
09:44
Power Issues
03:10
Fire
05:28
Section 9: Operations Security
Operations Security
04:03
Operations Security Control Methods
10:24
Section 10: Business Continuity and Disaster Recovery Planning
Business Continuity Plans
14:32
Business Impact Analysis
10:09
MTD/RTO/RPO
11:39
Disaster Recovery Plans
03:29
Alternate Sites
08:04
Section 11: Legal, Regulations, Compliance, and Investigations
Types of Law
06:49
Liability
03:52
Section 12: Application Security
The System Life Cycle
06:40
Software Escrow
03:06
Software Development Methods
06:37
The Change Control Process
03:01
Security Consideration
01:49
What is SQL Injection ?
14:05
SQL Injection attack
07:52
Software Control
02:45
Section 13: Difference between Third Edition and Fourth Editiom
Difference between Third Edition and Fourth Editiom
03:13
Section 14: Are you ready for the exam?
Are you ready for the exam ?
04:58

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Mohamed Atef, Certified Instructor with more than 15 years of experience.

ICT Consultant and certified instructor with more than 20 years of experience deliver professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)

Project Management Professional (PMP) )ID #1772374

Ready to start learning?
Take This Course