===================================
Total Video training Duration 54 Hours
Total video Lessons : 440
DVDs : 3
=================================
CISSP Certification Training: Domain 1
Duration: 7 hours
63 tutorial video Lessons
01. CISSP Course Introduction
02. Security Concepts
03. Security Governance
04. Risk Management
05 Personnel Security
06. Security Awareness Training
07. Wrap Up
CISSP Certification Training: Domain 2
Duration: 4.5 hours
35 tutorial video Lessons
01. Asset Security - Introduction
02. The Information Lifecycle
03. Roles And Responsibilities
04. Data Classification
05. Data Retention
06. Security Controls
07. Wrap Up
CISSP Certification Training: Domain 3
Duration: 11 hours
107 tutorial video Lessons
01. Security Engineering - Introduction
02. Security Models
03. Computer Hardware Architecture
04. Operating System Architecture
05. Virtualization
06. Information Systems And Application Architecture
07. Introduction To Cryptography
08. Hashing Algorithms
09. Symmetric Key Algorithms
10. Asymmetric Key Algorithms
11. Cryptography In Use
12. Attacks On Cryptography
13. Physical Security
14. Conclusion
CISSP Certification Training: Domain 4
Duration: 11 hours
88 tutorial video Lessons
01. Introduction
02. The Open Systems Interconnection Model
03. Transmission Media And Technologies
04. Network Infrastructures And Application Architecture
05. Wireless Networking
06. Protocols
07. Network Technologies
08. Attacks On Networks
09. Wrap Up
CISSP Certification Training: Domain 5
Duration: 7 hours
55 tutorial video Lessons
01. Identity And Access Management
02. Introduction And Key Terms
03. Identification And Authentication
04. Single Sign-On And Federated Identity Management
05. Authorization
06. Conclusion
CISSP Certification Training: Domain 6
Duration: 3 hours
19 Video Lessons
01. Security Assessment And Testing
02. Security Control Testing Strategies
03. Collecting Security Process Data
04. Auditing
05. Wrap Up
CISSP Certification Training: Domain 7
Security Operations
Run time: 8 hours 10 minutes
Introduction 05m 38s
Provisioning
Change Management 09m 16s
Physical, Virtual, And Cloud 09m 58s
Infrastructure And Firewalls 08m 13s
Security Components 10m 23s
Services, Servers, WS, And VOIP 08m 35s
Apps, Protocols, And Users 09m 24s
Asset Inventory 07m 15s
Planning 08m 27s
Acquisition 10m 15s
Deployment 08m 50s
Maintaining Systems And Services
Maintenance 07m 27s
Repairs And AV 09m 17s
Logging 09m 29s
Remote Log Repository 08m 50s
Auditing 03m 26s
IDS And IPS 07m 21s
NIDS 09m 30s
NIDS, NIPS, And HIPS 08m 47s
DLP 07m 43s
Honeypot, Honeynet, And Honeytoken 09m 08s
SIEM And Inspections 06m 25s
Monitoring Users 09m 40s
Configuration And Performance Testing 09m 54s
Vulnerability And Penetration Testing 10m 27s
Reports And Decommissioning 08m 28s
Incident Response
Incident Response Introduction 06m 40s
Escalation Process 08m 15s
Litigation And Criminal Act 09m 22s
Preparation 10m 43s
Detection And Containment 10m 12s
Eradication 05m 33s
Recovery And Incident Review 04m 59s
Investigations
Investigations 08m 05s
Evidence - Part 1 06m 41s
Evidence - Part 2 06m 07s
Digital Forensics 11m 04s
Legal Proceedings And EDiscovery 09m 54s
BCP And DRP
BCP And DRP Introduction 06m 54s
BCP And DRP Timelines 12m 15s
BCP And DRP Details 08m 57s
DRP Planning And BIA 07m 43s
DRP Plan Development 06m 43s
DR Teams And Plan Testing 09m 02s
DRP Approval Initiation And Termination 07m 59s
Maintaining The Plans 05m 05s
Recovery Strategies
Recovery Strategies 07m 57s
Alternate Facilities - Part 1 08m 04s
Alternate Facilities - Part 2 07m 22s
Network Recovery 08m 02s
Raid 0 1 08m 18s
Raid 2 3 4 5 And Parity 08m 48s
Full Backup 06m 35s
INC Diff Backups 07m 58s
Backups Electronic Vaulting And Shadow Copies 09m 57s
Journaling, RPO, And RTO 09m 33s
Recovery Of Services And Personnel 10m 41s
Physical Security And Safety
Wrap Up
CISSP Certification Training: Domain 8
Software Development Security
Run time: 2 hours 20 minutes
Application Architecture
Application Architecture Review 10m 56s
The Software Development Lifecycle And Related Development Models
CMM, SDL, And OWASP 09m 54s
Waterfall, Spiral, And Prototyping 07m 38s
Agile Development Platforms And DevOps 07m 44s
Risks Within Software
Buffer Overflow And Injection 10m 18s
Controls To Secure Software Development
Stack Canary, NX Memory, And Garbage Collection 08m 25s
Sandboxing 07m 24s
Input, Process, And Output Controls 09m 14s
Software Development Controls Summary 08m 16s
Testing Software
Web Application Testing 09m 18s
Wrap Up
======================================================================
This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV
This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV
======================================================================
No comments:
Post a Comment