ISC: 2 CISSP 2015
Год выпуска: 2015
Производитель: CBT Nuggets
Сайт производителя: www.cbtnuggets.com/it-training/isc2-cissp-2015
Автор: Keith Barker
Продолжительность: 10h
Тип раздаваемого материала: Видеоурок
Язык: Английский
Описание: Это (ISC)2 CISSP). подготовка кадров с Кейт Бейкер предназначена для тех, кто готовится к сертификации CISSP). в сфере информационной безопасности, в том числе темы из восьми доменов (на базе 2015 года план), что будет опробован в CISSP сертификационного экзамена.This (ISC)2 CISSP training with Keith Barker is designed for those who are preparing for a CISSP certification in information security, including topics from eight security domains (based on the 2015 blueprint), that will be tested in the CISSP certification exam.
Related Area of Expertise:
IT Security
Recommended skills:
At least 5 years of experience in two of the following domains, and exposure to the others: Security and Risk Management, Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, Software Development Security
Recommended equipment:
None
Related certifications:
CISSP® - Certified Information Systems Security Professional
- Related job functions:
- Security consultant
- Security analyst
- Security manager
- Security systems engineer
- IT director
- Chief information security officer
- Security auditor
- Security architect
- Network architect
CISSP certification one of the most respected certifications available, and is currently in great demand by a wide variety organizations. From banking and financial institutions to government and public utilities, as well as high-tech and hospitality, the skills of a CISSP are needed by nearly every industry.
In this new CISSP 2015 training, you'll focus on the eight security domains that will be tested in the CISSP certification exam, based on the 2015 blueprint from ISC(2). Benefits of being a CISSP include:
Demonstrated working knowledge of information security
Confirmed commitment to profession
A career differentiator, with enhanced credibility and marketability
All trademarks and copyrights are the property of their respective holders.
1. Welcome to CISSP (16 min)
2. CIA Concepts (4 min)
3. Policies (13 min)
4. Risk (13 min)
5. Control Types (17 min)
6. Security Awareness Training (6 min)
7. Ethical Hacking (13 min)
8. Symmetric Cryptography (19 min)
9. Asymmetric Cryptography (24 min)
10. Fire (16 min)
11. Physical Security (13 min)
12. Electric Power (12 min)
13. OSI Lower Layers (29 min)
14. OSI Upper Layers (24 min)
15. Firewalls (21 min)
16. VPNs (27 min)
17. Attacks (21 min)
18. Authentication Concepts (9 min)
19. Multifactor Authentication (15 min)
20. Centralized Management (17 min)
21. SSO and Security Threats (25 min)
22. Computing System Evaluations (15 min)
23. Security Model Details (11 min)
24. Availability and Integrity Design (14 min)
25. IDS and IPS (17 min)
26. Controls for Operational Security (19 min)
27. Separation of Duties (18 min)
28. Backups and Media (16 min)
29. DR and BC (20 min)
30. Malware (14 min)
31. Evidence (12 min)
32. Laws and Liability (10 min)
33. Incident Response (15 min)
34. System and Software Security (16 min)
35. Virtualization and Cloud (13 min)
36. 2700x (6 min)
37. Federated Identities (11 min)
38. EPA (16 min)
39. Monitoring and More (12 min)
Файлы примеров: отсутствуют
Формат видео: MP4
Видео: AVC, 1280x720, 16:9, 30.000 fps, ~ 1500 Kbps
Аудио: AAC, 22.5 KHz, ~ 128.0 Kbps, 2 channelsing and financial institutions to government and public utilities, as well as high-tech and hospitality, the skills of a CISSP are needed by nearly every industry.
In this new CISSP 2015 training, you'll focus on the eight security domains that will be tested in the CISSP certification exam, based on the 2015 blueprint from ISC(2). Benefits of being a CISSP include:
Demonstrated working knowledge of information security
Confirmed commitment to profession
A career differentiator, with enhanced credibility and marketability
All trademarks and copyrights are the property of their respective holders.
1. Welcome to CISSP (16 min)
2. CIA Concepts (4 min)
3. Policies (13 min)
4. Risk (13 min)
5. Control Types (17 min)
6. Security Awareness Training (6 min)
7. Ethical Hacking (13 min)
8. Symmetric Cryptography (19 min)
9. Asymmetric Cryptography (24 min)
10. Fire (16 min)
11. Physical Security (13 min)
12. Electric Power (12 min)
13. OSI Lower Layers (29 min)
14. OSI Upper Layers (24 min)
15. Firewalls (21 min)
16. VPNs (27 min)
17. Attacks (21 min)
18. Authentication Concepts (9 min)
19. Multifactor Authentication (15 min)
20. Centralized Management (17 min)
21. SSO and Security Threats (25 min)
22. Computing System Evaluations (15 min)
23. Security Model Details (11 min)
24. Availability and Integrity Design (14 min)
25. IDS and IPS (17 min)
26. Controls for Operational Security (19 min)
27. Separation of Duties (18 min)
28. Backups and Media (16 min)
29. DR and BC (20 min)
30. Malware (14 min)
31. Evidence (12 min)
32. Laws and Liability (10 min)
33. Incident Response (15 min)
34. System and Software Security (16 min)
35. Virtualization and Cloud (13 min)
36. 2700x (6 min)
37. Federated Identities (11 min)
38. EPA (16 min)
39. Monitoring and More (12 min)
Файлы примеров: отсутствуют
Формат видео: MP4
Видео: AVC, 1280x720, 16:9, 12.000 fps, ~ 500 Kbps
Аудио: AAC, 22.5 KHz, ~ 64.0 Kbps, 2 channels