back

Certified Information Systems Security Professional - CISSP 2021 (In Production)

39 H 29 M

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
Episodes
Episodes
  • Security and Risk Management
    • Overview
    • Understand adhere, promote professional ethics
    • Understand and apply security concepts (CIA)
    • Evaluate and apply security governance principles
    • Determine compliance and other requirements
    • Legal, regulatory issues for information security
    • Spotlight on the GDPR
    • Understand requirements for investigation types
    • Security policy, standards, procedures, guidelines
    • Identify, analyze, prioritize BC requirements
    • Personnel security policies and procedures
    • Understand, apply risk management concepts
    • Spotlight on the Risk Management Framework
    • Threat modeling concepts and methodologies
    • Apply Supply Chain Risk Management (SCRM) concepts
    • Security awareness, education and training program
    • Security and Risk Management Key Points
  • Asset Security
    • Identify and classify information, assets
    • Establish information, asset handling requirements
    • Provision resources securely
    • Manage data lifecycle
    • Ensure appropriate asset retention
    • Data security controls and compliance requirements
    • Assets Security - Key Points
  • Security Architecture and Engineering
    • Engineering process using secure design principles
    • Fundamental concepts of security models
    • Controls based upon system security requirements
    • Security capabilities of Information Systems–vocab
    • Security capabilities of Information Systems – CPU
    • Security capabilities of Info Systems – Memory
    • Assess and mitigate vulnerabilities - the basics
    • Assess and mitigate vulnerabilities - the rest
    • Spotlight on cryptographic solutions - Symmetric
    • Spotlight on cryptographic solutions - Asymmetric
    • Spotlight on cryptographic solutions - PKI & certs
    • Spotlight on cryptographic solutions - hashing
    • Cryptographic solutions - digital signing
    • Understand methods of cryptanalytic attacks
    • Security principles for site and facility design
    • Design site and facility security controls
    • Spotlight on fire control
    • Security Architecture & Engineering - Key Points
  • Communication and Network Security
    • Spotlight on the OSI Model
    • Spotlight on Internet Protocol (IP) networking
    • Spotlight on IPsec
    • Spotlight on Secure Protocols
    • Implications of converged & multilayer protocols
    • Spotlight on Micro-segmentation
    • Wireless, Cellular & Content Distribution Networks
    • Secure network components
    • Implement secure communication channels
    • Communications & Network Security - Key Points
  • Identity and Access Management (IAM)
    • Control physical and logical access to assets
    • Manage identification and authentication
    • Federated identity with a third-party service
    • Implement, manage auth mechanisms - Vocab
    • Implement, manage auth mechanisms - Models
    • Manage the identity, access provisioning lifecycle
    • Implement authentication systems
    • Spotlight on Kerberos
    • Spotlight on Federated Identity Management (FIM)
    • Identity Access Management (IAM) - Key Points
  • Security Assessment and Testing
    • Assessment, test, & security audit strategies
    • Spotlight on System and Org Controls Reports (SOC)
    • Conduct security control testing - the basics
    • Conduct security control testing - the rest
    • Collect security process data
    • Analyze test output and generate reports
    • Security Assessment and Testing - Key Points
  • Security Operations
    • Understand and comply with investigations
    • Conduct logging & monitoring activities
    • Conduct logging & monitoring activities - threat
    • Perform Configuration Management (CM)
    • Apply foundational security operations concepts
    • Apply resource protection
    • Conduct incident management
    • Detective & preventative measures
    • Patch & vulnerability management
    • Understand & participate in change management
    • Implement recovery strategies
    • Implement Disaster Recovery (DR) processes
    • Test Disaster Recovery Plans (DRP)
    • Business Continuity (BC) planning & exercises
    • Implement and manage physical security
    • Address personnel safety and security concerns
    • Security Operations - Key points
  • Software Development Security
    • Spotlight on the Software Development Life Cycle
    • Certs & Accreditation Verification & Validation
    • Security in the SDLC - Methodologies
    • Security in the SDLC - Maturity Models
    • Security in the SDLC - odds & ends
    • Apply controls in development ecosystems - basics
    • Apply controls in development ecosystems - rest
    • Spotlight on the OWASP TOP 10
    • Assess the effectiveness of software security
    • Assess security impact of acquired software
    • Define, apply secure coding guidelines, standards
    • Spotlight on Databases
    • Software Development Security - Key Points

Overview

3 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description

Start training today

Just you? Check out our personal plans

Premium

$529 per seat/per year

2

Total seats

Standard

$349 per seat/per year

2

Total seats

Get a demo or a start a team trial

This website uses cookies to enhance the user experience. By using this site and service, you agree to the use of cookies as described in the ITProTV Privacy Policy.