Certified Information Systems Security Professional - CISSP 2021
39 H 48 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayThis course has a practice test
Episodes
Episodes
- Security and Risk Management
- Overview
- Understand adhere, promote professional ethics
- Understand and apply security concepts (CIA)
- Evaluate and apply security governance principles
- Determine compliance and other requirements
- Legal, regulatory issues for information security
- Spotlight on the GDPR
- Understand requirements for investigation types
- Security policy, standards, procedures, guidelines
- Identify, analyze, prioritize BC requirements
- Personnel security policies and procedures
- Understand, apply risk management concepts
- Spotlight on the Risk Management Framework
- Threat modeling concepts and methodologies
- Apply Supply Chain Risk Management (SCRM) concepts
- Security awareness, education and training program
- Security and Risk Management Key Points
- Asset Security
- Identify and classify information, assets
- Establish information, asset handling requirements
- Provision resources securely
- Manage data lifecycle
- Ensure appropriate asset retention
- Data security controls and compliance requirements
- Assets Security - Key Points
- Security Architecture and Engineering
- Engineering process using secure design principles
- Fundamental concepts of security models
- Controls based upon system security requirements
- Security capabilities of Information Systems–vocab
- Security capabilities of Information Systems – CPU
- Security capabilities of Info Systems – Memory
- Assess and mitigate vulnerabilities - the basics
- Assess and mitigate vulnerabilities - the rest
- Spotlight on cryptographic solutions - Symmetric
- Spotlight on cryptographic solutions - Asymmetric
- Spotlight on cryptographic solutions - PKI & certs
- Spotlight on cryptographic solutions - hashing
- Cryptographic solutions - digital signing
- Understand methods of cryptanalytic attacks
- Security principles for site and facility design
- Design site and facility security controls
- Spotlight on fire control
- Security Architecture & Engineering - Key Points
- Communication and Network Security
- Spotlight on the OSI Model
- Spotlight on Internet Protocol (IP) networking
- Spotlight on IPsec
- Spotlight on Secure Protocols
- Implications of converged & multilayer protocols
- Spotlight on Micro-segmentation
- Wireless, Cellular & Content Distribution Networks
- Secure network components
- Implement secure communication channels
- Communications & Network Security - Key Points
- Identity and Access Management (IAM)
- Control physical and logical access to assets
- Manage identification and authentication
- Federated identity with a third-party service
- Implement, manage auth mechanisms - Vocab
- Implement, manage auth mechanisms - Models
- Manage the identity, access provisioning lifecycle
- Implement authentication systems
- Spotlight on Kerberos
- Spotlight on Federated Identity Management (FIM)
- Identity Access Management (IAM) - Key Points
- Security Assessment and Testing
- Assessment, test, & security audit strategies
- Spotlight on System and Org Controls Reports (SOC)
- Conduct security control testing - the basics
- Conduct security control testing - the rest
- Collect security process data
- Analyze test output and generate reports
- Security Assessment and Testing - Key Points
- Security Operations
- Understand and comply with investigations
- Conduct logging & monitoring activities
- Conduct logging & monitoring activities - threat
- Perform Configuration Management (CM)
- Apply foundational security operations concepts
- Apply resource protection
- Conduct incident management
- Detective & preventative measures
- Patch & vulnerability management
- Understand & participate in change management
- Implement recovery strategies
- Implement Disaster Recovery (DR) processes
- Test Disaster Recovery Plans (DRP)
- Business Continuity (BC) planning & exercises
- Implement and manage physical security
- Address personnel safety and security concerns
- Security Operations - Key points
- Software Development Security
- Spotlight on the Software Development Life Cycle
- Certs & Accreditation Verification & Validation
- Security in the SDLC - Methodologies
- Security in the SDLC - Maturity Models
- Security in the SDLC - odds & ends
- Apply controls in development ecosystems - basics
- Apply controls in development ecosystems - rest
- Spotlight on the OWASP TOP 10
- Assess the effectiveness of software security
- Assess security impact of acquired software
- Define, apply secure coding guidelines, standards
- Spotlight on Databases
- Software Development Security - Key Points
- The CISSP Toolbox
- What is the CISSP Toolbox?
- Who are you?
- What does your study plan look like?
- What is your timeline?
Overview
3 M



- Episode Description
- Transcript