Search This Blog

Showing posts with label CISSP. Show all posts
Showing posts with label CISSP. Show all posts

Saturday, March 4, 2017

(ISC)2 CISSP Certified Information Systems Security Professional Exam Video Training Course DVD Rs 399/-



Duration : 10 Hours - 39 Video Lessons 

1. Welcome to CISSP (16 min)
2. CIA Concepts (4 min)
3. Policies (13 min)
4. Risk (13 min)
5. Control Types (17 min)
6. Security Awareness Training (6 min)
7. Ethical Hacking (13 min)
8. Symmetric Cryptography (19 min)
9. Asymmetric Cryptography (24 min)
10. Fire (16 min)
11. Physical Security (13 min)
12. Electric Power (12 min)
13. OSI Lower Layers (29 min)
14. OSI Upper Layers (24 min)
15. Firewalls (21 min)
16. VPNs (27 min)
17. Attacks (21 min)
18. Authentication Concepts (9 min)
19. Multifactor Authentication (15 min)
20. Centralized Management (17 min)
21. SSO and Security Threats (25 min)
22. Computing System Evaluations (15 min)
23. Security Model Details (11 min)
24. Availability and Integrity Design (14 min)
25. IDS and IPS (17 min)
26. Controls for Operational Security (19 min)
27. Separation of Duties (18 min)
28. Backups and Media (16 min)
29. DR and BC (20 min)
30. Malware (14 min)
31. Evidence (12 min)
32. Laws and Liability (10 min)
33. Incident Response (15 min)
34. System and Software Security (16 min)
35. Virtualization and Cloud (13 min)
36. 2700x (6 min)
37. Federated Identities (11 min)
38. EPA (16 min)
39. Monitoring and More (12 min)


======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term


Shipping Banner

Thursday, February 23, 2017

ISACA CISA 2016 - Certified Information Systems Auditor Video Training Course DVD Rs 450/-




Duration : 11 HOURS

98 Video Lessons

1. CISA Overview (7 min)
2. The Process of Auditing Information Systems (11 min)
3. IT Audit Standards, Guidelines, Tools and Techniques, and Code of Ethics (9 min)
4. Audit Risk Assessment (15 min)
5. Business Processes (5 min)
6. Control Objectives (8 min)
7. Audit Planning and Management (9 min)
8. Laws and Regulations (3 min)
9. Evidence (11 min)
10. Sampling Methodologies (9 min)
11. Reporting and Communications (5 min)
12. Audit Quality Assurance (3 min)
13. Types of Audits (5 min)
14. Governance and Management of IT (8 min)
15. Information Systems Strategy (10 min)
16. Standards, Governance and Frameworks (9 min)
17. IT Organization (6 min)
18. Legal Compliance (8 min)
19. Enterprise Architecture (4 min)
20. Maintenance of Policies and Procedures (2 min)
21. Maturity Models (5 min)
22. Process Optimization (3 min)
23. IT Investment Strategies (5 min)
24. IT Vendor Selection and Management (8 min)
25. IT Risk Management (8 min)
26. Control Processes (4 min)
27. Quality Management Systems (4 min)
28. IT Performance Monitoring and Reporting (6 min)
29. BCP - Business Impact Analysis (8 min)
30. BCP – Maintenance and Testing (3 min)
31. BCP - Invoke and Return to Normal (7 min)
32. Information Systems Acquisition, Development and Implementation (9 min)
33. Benefits Realization (5 min)
34. Vendor Management (7 min)
35. Project Governance (9 min)
36. Project Management (17 min)
37. Risk Management (5 min)
38. Requirements Management (7 min)
39. Application Architecture (5 min)
40. Methodologies (12 min)
41. Control Objectives and Techniques (11 min)
42. Testing (10 min)
43. Configuration and Change Management (6 min)
44. System Migration and Deployment (10 min)
45. Project Success Criteria (5 min)
46. Post-Implementation Reviews (4 min)
47. Information Systems Operations, Maintenance & Support (8 min)
48. Service Level Frameworks (6 min)
49. Service Level Management (7 min)
50. Monitor 3rd Party Compliance (4 min)
51. Architecture (11 min)
52. Computer Hardware, Software and Networks (22 min)
53. Software Resiliency Tools and Techniques (4 min)
54. Software Licensing and Inventory Interfaces (3 min)
55. Managing Schedules (6 min)
56. System Interface Integrity (10 min)
57. Capacity Planning (4 min)
58. Performance Monitoring (3 min)
59. Data Backup (5 min)
60. Database Administration Practices (9 min)
61. Data Quality and Retention (6 min)
62. Problem and Incident Management (5 min)
63. Managing Change to Production Environments (3 min)
64. Risks and Controls for End User Computing (6 min)
65. Disaster Recovery – Legal and Contractual Issues (7 min)
66. Business Impact of Disaster Recovery (2 min)
67. Disaster Recovery Plan Maintenance (5 min)
68. Alternate Processing Sites (9 min)
69. Disaster Recovery Testing (4 min)
70. Invoking Disaster Recovery (6 min)
71. Protection of Information Assets (8 min)
72. Information Asset Protection (4 min)
73. Privacy Principles (6 min)
74. Security Controls (5 min)
75. Environmental Protection (6 min)
76. Physical Access Controls (5 min)
77. Logical Access Controls (3 min)
78. Identification and Authentication (3 min)
79. Virtual Systems (5 min)
80. Mobile Devices (3 min)
81. Voice Communication (4 min)
82. Internet Security, Protocols and Techniques (9 min)
83. Network Security Concerns (4 min)
84. Data Encryption (3 min)
85. Public Key Infrastructure (5 min)
86. Peer to Peer Computing (5 min)
87. Data Classification Standards (4 min)
88. Handling Confidential Data (4 min)
89. Data Leakage (4 min)
90. End-User Computing Security (5 min)
91. Security Awareness Program (4 min)
92. Cyber Attacks (7 min)
93. Detection Tools (4 min)
94. Security Testing Techniques (6 min)
95. Security Incidents (3 min)
96. Handling of Evidence (4 min)
97. Fraud Risk Factors (6 min)
98. Passing the Exam (7 min)

======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term


Shipping Banner

Thursday, June 16, 2016

CISSP Certification 2016 Complete 8 Domains Video Training Course On 3 DVDs Rs799/-



===================================



Total Video training Duration 54 Hours

Total video Lessons : 440

DVDs : 3

=================================


CISSP Certification Training: Domain 1

Duration: 7 hours  

63 tutorial video Lessons

01. CISSP Course Introduction
02. Security Concepts
03. Security Governance
04. Risk Management
05 Personnel Security
06. Security Awareness Training
07. Wrap Up


CISSP Certification Training: Domain 2

Duration: 4.5 hours 

35 tutorial video Lessons


01. Asset Security - Introduction
02. The Information Lifecycle
03. Roles And Responsibilities
04. Data Classification
05. Data Retention
06. Security Controls
07. Wrap Up



CISSP Certification Training: Domain 3

Duration: 11 hours  

107 tutorial video Lessons

01. Security Engineering - Introduction
02. Security Models
03. Computer Hardware Architecture
04. Operating System Architecture
05. Virtualization
06. Information Systems And Application Architecture
07. Introduction To Cryptography
08. Hashing Algorithms
09. Symmetric Key Algorithms
10. Asymmetric Key Algorithms
11. Cryptography In Use
12. Attacks On Cryptography
13. Physical Security
14. Conclusion

CISSP Certification Training: Domain 4 

Duration: 11 hours 

88 tutorial video Lessons

01. Introduction
02. The Open Systems Interconnection Model
03. Transmission Media And Technologies
04. Network Infrastructures And Application Architecture
05. Wireless Networking
06. Protocols
07. Network Technologies
08. Attacks On Networks
09. Wrap Up


CISSP Certification Training: Domain 5


Duration: 7 hours  

55 tutorial video Lessons


01. Identity And Access Management
02. Introduction And Key Terms
03. Identification And Authentication
04. Single Sign-On And Federated Identity Management
05. Authorization
06. Conclusion

CISSP Certification Training: Domain 6


Duration: 3 hours 

19 Video Lessons

01. Security Assessment And Testing
02. Security Control Testing Strategies
03. Collecting Security Process Data
04. Auditing

05. Wrap Up

CISSP Certification Training: Domain 7

Security Operations

Run time: 8 hours 10 minutes

Introduction 05m  38s

Provisioning

Change Management 09m  16s

Physical, Virtual, And Cloud 09m  58s

Infrastructure And Firewalls 08m  13s

Security Components 10m  23s

Services, Servers, WS, And VOIP 08m  35s

Apps, Protocols, And Users 09m  24s

Asset Inventory 07m  15s

Planning 08m  27s

Acquisition 10m  15s

Deployment 08m  50s

Maintaining Systems And Services

Maintenance 07m  27s

Repairs And AV 09m  17s

Logging 09m  29s

Remote Log Repository 08m  50s

Auditing 03m  26s

IDS And IPS 07m  21s

NIDS 09m  30s

NIDS, NIPS, And HIPS 08m  47s

DLP 07m  43s

Honeypot, Honeynet, And Honeytoken 09m  08s

SIEM And Inspections 06m  25s

Monitoring Users 09m  40s

Configuration And Performance Testing 09m  54s

Vulnerability And Penetration Testing 10m  27s

Reports And Decommissioning 08m  28s

Incident Response

Incident Response Introduction 06m  40s

Escalation Process 08m  15s

Litigation And Criminal Act 09m  22s

Preparation 10m  43s

Detection And Containment 10m  12s

Eradication 05m  33s

Recovery And Incident Review 04m  59s

Investigations

Investigations 08m  05s

Evidence - Part 1 06m  41s

Evidence - Part 2 06m  07s

Digital Forensics 11m  04s

Legal Proceedings And EDiscovery 09m  54s

BCP And DRP

BCP And DRP Introduction 06m  54s

BCP And DRP Timelines 12m  15s

BCP And DRP Details 08m  57s

DRP Planning And BIA 07m  43s

DRP Plan Development 06m  43s

DR Teams And Plan Testing 09m  02s

DRP Approval Initiation And Termination 07m  59s

Maintaining The Plans 05m  05s

Recovery Strategies

Recovery Strategies 07m  57s

Alternate Facilities - Part 1 08m  04s

Alternate Facilities - Part 2 07m  22s

Network Recovery 08m  02s

Raid 0 1 08m  18s

Raid 2 3 4 5 And Parity 08m  48s

Full Backup 06m  35s

INC Diff Backups 07m  58s

Backups Electronic Vaulting And Shadow Copies 09m  57s

Journaling, RPO, And RTO 09m  33s

Recovery Of Services And Personnel 10m  41s

Physical Security And Safety

Wrap Up


CISSP Certification Training: Domain 8

Software Development Security

Run time: 2 hours 20 minutes

Application Architecture


Application Architecture Review 10m  56s

The Software Development Lifecycle And Related Development Models

CMM, SDL, And OWASP 09m  54s

Waterfall, Spiral, And Prototyping 07m  38s

Agile Development Platforms And DevOps 07m  44s

Risks Within Software

Buffer Overflow And Injection 10m  18s

Controls To Secure Software Development

Stack Canary, NX Memory, And Garbage Collection 08m  25s

Sandboxing 07m  24s

Input, Process, And Output Controls 09m  14s

Software Development Controls Summary 08m  16s

Testing Software

Web Application Testing 09m  18s

Wrap Up




======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term

Shipping Banner