Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Coaching Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Data Science
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 7.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
IT & Software IT Certification CISSP - Certified Information Systems Security Professional

CISSP - Certified Information Systems Security Professional

CISSP Certification Course - Certified Information Systems Security Professional 2015
Rating: 4.1 out of 54.1 (582 ratings)
4,463 students
Created by Stone River eLearning
Last updated 2/2017
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Understand access control systems and methodology
  • Apply application and systems development security
  • Implement business continuity planning & disaster recovery planning
  • Understand Cryptography and how it's used
  • Understand law, investigation and ethics
  • Implement operations security
  • Implement physical security
  • Understand security architecture and models
  • Handle security management practices
  • Understand telecommunications and networking security
Curated for the Udemy for Business collection

Requirements

  • Roughly five years of direct full-time security work experience is recommended, but not required

Description

The CISSP: Certified Information Systems Security Professional Certification certification training package covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge.  

The new eight domains are:

  1. Security and Risk Management
  2. Asset Security
  3. Security Engineering
  4. Communications and Network Security
  5. Identity and Access Management
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

The CISSP Certification is administered by the International Information Systems Security Certification Consortium or (ISC)². (ISC)² promotes the CISSP exam as an aid to evaluating personnel performing information security functions.  Candidates for this exam are typically network security professionals and system administrators with at least four years of direct work experience in two or more of the ten test domains.  As the first ANSI ISO accredited credential in the field of information security, the Certified Information Systems Security Professional (CISSP) certification provides information security professionals with not only an objective measure of competence, but a globally recognized standard of achievement.

Who this course is for:

  • Experienced IT security-related practitioners, auditors, consultants, investigators or instructors, including network or security analysts and engineers, network administrators, information security specialists and risk management professionals, who wish to advance their current computer security careers

Course content

12 sections • 145 lectures • 7h 44m total length

  • Preview00:18

  • Introduction
    00:15
  • CISSP Certification Goals
    01:25
  • Security Professional Certification Value
    01:25
  • Exam Common Body of Knowledge
    00:49
  • Preview02:25

  • Introduction
    00:18
  • Cryptography Concepts Part1
    06:19
  • Cryptography Concepts Part2
    02:53
  • History of Cryptography
    06:47
  • Cryptosystem Features
    02:13
  • Encryption Systems Part1
    06:23
  • Encryption Systems Part2
    03:04
  • Substitution Ciphers
    01:58
  • Symmetric Algorithms Part1
    07:19
  • Symmetric Algorithms Part2
    05:11
  • Preview05:06
  • Message Integrity
    07:52
  • Digital Signatures
    01:28
  • Public Key Infrastructure Part1
    06:19
  • Public Key Infrastructure Part2
    02:04
  • Trusted Platform Module
    02:41
  • Encryption Communication Levels
    01:56
  • E-Mail Security
    01:47
  • Internet Security
    05:35
  • Cryptography Attacks
    05:48

  • Introduction
    00:18
  • Preview01:04
  • Geographical-Man Made and Political Threats
    06:09
  • Site and Facility Design
    04:35
  • Perimeter Security
    05:27
  • Building and Internal Security
    04:18
  • Secure Data Centers and Fire Detection Systems
    03:53
  • Types of Power Issues
    03:36
  • HVAC Guidelines
    00:54
  • Equipment Security and Personal Security
    01:42

  • Introduction
    00:23
  • Security Model Concepts
    00:57
  • Preview03:43
  • Computing Platforms
    01:56
  • Virtual Computing and Security Services
    02:27
  • System Components
    03:54
  • Memory Concepts
    04:08
  • Enforcing Process Security and Multitasking
    02:08
  • System Security Architecture
    05:05
  • Security Models and Modes Part1
    04:58
  • Security Models and Modes Part2
    04:28
  • System Evaluation and Assurance Levels
    03:36
  • Certification and Accreditation
    01:28
  • Security Architecture Threats
    02:46
  • Database Security and Distributed Systems Security
    03:40

  • Introduction
    00:19
  • Preview02:41
  • Identification and Authentication
    02:30
  • Password Types and Management
    04:39
  • Ownership-Character-Physiological-Behavioral Factors
    04:10
  • Biometric Considerations
    03:08
  • Authorization Concepts Part1
    03:28
  • Authorization Concepts Part2
    03:59
  • User Accountability
    03:10
  • Vulnerability Assessment
    00:49
  • Penetration Testing and Threat Modeling
    03:36
  • Access Control Categories-Types-Models and Administration
    06:38
  • Provisioning Life Cycle and Access Control Monitoring
    03:48
  • Access Control Threats
    05:12

  • Introduction
    00:21
  • System Development Life Cycle
    01:23
  • Preview01:48
  • Software Development Security Best Practices
    00:57
  • Software Development Methods
    06:54
  • Programming Languages
    05:02
  • Database Architecture and Models
    01:28
  • Database Interface Languages
    00:52
  • Data Warehouse-Mining and Threats
    01:04
  • Database and Application Access Control
    01:49
  • Monitoring for Problems
    01:28
  • Software Threats and Security
    06:45

  • Introduction
    00:14
  • Preview03:47
  • Security Frameworks & Methodologies Part1
    05:37
  • Security Frameworks & Methodologies Part2
    05:15
  • Risk Assessment
    01:51
  • Asset Values-Vulnerabilities and Threats
    02:20
  • Quantitative Risk Analysis
    05:59
  • Safeguard Selection
    02:37
  • Risk Management
    04:39
  • Security Governance Components
    01:51
  • Security Policies
    04:21
  • Classification Life Cycle
    02:20
  • Responsibilities and Roles
    02:11
  • Personnel Security
    01:44
  • Security Awareness Training
    02:27

  • Introduction
    00:16
  • Preview07:10
  • OSI and TCIP Models Part2
    01:52
  • IP Addressing
    02:53
  • Transmission Methods
    03:10
  • Types of Cabling
    02:55
  • Network Topologies
    06:19
  • Network Protocols and Services
    03:59
  • Network Routing and Devices
    07:22
  • Network Connection Types Part1
    04:01
  • Network Connection Types Part2
    04:40
  • Network Authentication
    02:47
  • Wireless Technologies
    02:29
  • WLAN Security Methods
    01:54
  • Network Threats and Cabling Behaviors
    06:02

  • Introduction
    00:16
  • Operation Security Concepts
    01:48
  • Protecting Tangible and Intangible Assets
    01:28
  • Asset and Media Management
    02:55
  • Preview02:05
  • Network and Resource Management
    00:49
  • Incident Response and Change Management
    01:12
  • Patch Management-Audit and Review
    00:44
  • Threats and Preventative Measures
    00:53
  • Trusted Paths-Trusted Recovery and System Hardening
    01:02
  • Monitoring and Reporting
    01:00

Instructor

Stone River eLearning
500,000+ Happy Udemy Students
Stone River eLearning
  • 4.2 Instructor Rating
  • 51,375 Reviews
  • 657,002 Students
  • 302 Courses

At Stone River eLearning, technology is all we teach. If you're interested in IT, programming, development or design - we have it covered. 

Check out our huge catalog of courses and join the over 1,200,000+ students currently taking Stone River eLearning courses. We currently offer 800+ different technology training courses on our Stone River eLearning website and are adding new courses on hot and trending topics every month. A subscription option is available for those with a real passion for learning.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.