Header Ads Widget

Responsive Advertisement

CISSP : Domains 1, 2, AND 3

CISSP : Domains 1, 2, AND 3

Publisher A. Obaidi
Course Length 4 hours
Course Language English



Description

This course covers Domain 1 (Security and Risk Management), Domain 2 (Asset Security), AND Domain 3 (Security Engineering) of the CISSP (Certified Information Systems Security Professional) exam. We'll review the following concepts:
Domiain 1
  • Confidentiality
  • Integrity
  • Availability
  • Information Security
  • Control Frameworks
  • Security Governance
  • Risk Management
  • Business Continuity Planning
  • Digital Signatures
  • Digital Certificates
  • Hashing
  • Organizational Processes
  • Security Roles and Responsibilities
  • Compliance
  • Ethics
  • Computer Crimes
  • Software Licensing
  • Export Controls
  • Data Breaches
  • Security Policies
  • RAID Technology
  • Risk Assessment Techniques
  • Quantitative Risk Factors
  • Risk Management Strategies
  • Security Controls
Domain 2
  • Understanding Data Security
  • Security Policies
  • Developing Security Baselines
  • Data Security Roles
  • Customizing Security Standards
  • Data Privacy
  • Customizing Security Standards
  • Leveraging Industry Standards
  • Data Encryption
Domain 3
  • Secure Design Principles
  • Security Models
  • Security Requirements
  • Virtualization
  • Cloud Computing Models
  • Public Cloud Tiers
  • Memory Protection
  • Interface Protection
  • High Availability and Fault Tolerance
  • OWASP Top 10
  • SQL Injections
  • Cross-Site Scripting (XSS)
  • Cross-Request Forgery
  • Understanding Encryption
  • Symmetric vs. Asymmetric Cryptography
  • Goals of Cryptography
  • Codes vs. Ciphers
  • Key Lifecycle Management
  • Data Encryption Standard (DES)
  • Triple DES (3DES)
  • Advanced Encryption Standard (AES)
  • Blowfish
  • Twofish
  • RC4
  • RSA Cryptography
  • Elliptic Curve & Quantum Cryptography
  • Key Exchange
  • Diffie-Hellman Key Exchange
  • Key Escrow
  • Trust Models
  • PKI and Digital Certificates
  • Hash Functions and Digital Certificates
  • Digital Signatures
These are just a few of the topics covered in this course. Each lecture is designed to introduce concepts in manner that breaks down core concepts into fundamental principles. Whether you're a beginner in the field of information and cybersecurity, or an experience professional, you will gain valuable knowledge that can be applied in your personal and professional life. 
Who is the target audience?
  • Beginner, Mid-Level, and Advanced Level students may take this course. The course is designed in such a way, that it explains the core principals in detail, thereby making an excellent source for beginners, while allowing more advanced students to gain a robust understanding of the topics.
  • This course is intended for anyone interested in learning about CISSP, Information Security, and/or Cybersecurity







        Post a Comment

        0 Comments