CBT Nuggets (ISC)2 CISSP 2015

CBT Nuggets (ISC)2 CISSP 2015
http://bit.ly/23fnRPj


CBT Nuggets (ISC)2 CISSP 2015


image


CBT Nuggets (ISC)2 CISSP 2015

CBT Nuggets (ISC)2 CISSP 2015

Certified Information Systems Security Professional

This (ISC)2 CISSP training with Keith Barker is designed for those who are preparing for a CISSP certification in information security, including topics from eight security domains (based on the 2015 blueprint), that will be tested in the CISSP certification exam.

Related Area of Expertise:
IT Security

Recommended skills:
At least 5 years of experience in two of the following domains, and exposure to the others: Security and Risk Management, Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, Software Development Security

Recommended equipment:
None

Related certifications:
CISSP® – Certified Information Systems Security Professional

Related job functions:
Security consultant
Security analyst
Security manager
Security systems engineer
IT director
Chief information security officer
Security auditor
Security architect
Network architect

CISSP certification one of the most respected certifications available, and is currently in great demand by a wide variety organizations. From banking and financial institutions to government and public utilities, as well as high-tech and hospitality, the skills of a CISSP are needed by nearly every industry.

In this new CISSP 2015 training, you'll focus on the eight security domains that will be tested in the CISSP certification exam, based on the 2015 blueprint from ISC(2). Benefits of being a CISSP include:

Demonstrated working knowledge of information security
Confirmed commitment to profession
A career differentiator, with enhanced credibility and marketability

All trademarks and copyrights are the property of their respective holders.


CBT Nuggets (ISC)2 CISSP 2015 Free Download Links


Uploaded Download Links

Get Premium Uploaded Account: Max Speed & Resumable Support Download :

Uploaded Premium

cnisc2cissp2015.part1.rar
cnisc2cissp2015.part2.rar
cnisc2cissp2015.part3.rar


1. Welcome to CISSP (16 min)
In this Nugget, Keith shares tips with you on how to get the most from this course. We are glad you are here; let's get started.
2. CIA Concepts (4 min)
In this Nugget, Keith describes the acronym of CIA that will assist you in interpreting the questions and succeeding in the CISSP certification.
3. Policies (13 min)
In this Nugget, Keith describes and provides examples of Information Security (InfoSec) policies, including who creates them.
4. Risk (13 min)
In this Nugget, Keith describes the concept of risk as it relates to Information Security.
5. Control Types (17 min)
In this Nugget, Keith discusses security-related control types and purposes.
6. Security Awareness Training (6 min)
In this Nugget, Keith talks with you about a few items that should be included as part of security awareness training for users who work with our data and systems.
7. Ethical Hacking (13 min)
In this Nugget, Keith describes guidelines and uses for Ethical Hacking.
8. Symmetric Cryptography (19 min)
In this Nugget, Keith discusses the concept of symmetric cryptography, including the use of the same key for both encryption and decryption services.
9. Asymmetric Cryptography (24 min)
In this Nugget, Keith describes and provides example of asymmetrical encryption for authentication and non-repudiation.
10. Fire (16 min)
In this Nugget, Keith talks with you about fire prevention, detection, and suppression.
11. Physical Security (13 min)
In this Nugget, Keith discusses several physical security controls and how they can be applied.
12. Electric Power (12 min)
In this Nugget, Keith discusses issues regarding the availability and use of electrical power, along with location decisions regarding a data center.
13. OSI Lower Layers (29 min)
In this Nugget, Keith talks with you about the OSI layers, including layers 1-3, and their relationship to each other.
14. OSI Upper Layers (24 min)
In this Nugget, Keith adds a little more detail regarding the network layer, (picking up from the discussion on the OSI Lower Layers) and then talks with you about functions at the transport and applications layers of the protocol stack.
15. Firewalls (21 min)
In this Nugget, Keith talks with you about methods and best practices for using firewalls to improve and enforce security.
16. VPNs (27 min)
In this Nugget, Keith talks with you about how Virtual Private Networks can be implemented, along with their role in providing confidentiality, data integrity, and authentication services.
17. Attacks (21 min)
In this Nugget, Keith discusses a few attack types with you. For more information on detailed attacks, please enjoy the course "Penetration Testing with Linux Tools" here at CBT Nuggets that demonstrates tools from the BackTrack and Kali Linux distributions.
18. Authentication Concepts (9 min)
In this Nugget, Keith talks with you about reasons and methods for authentication on network and systems.
19. Multifactor Authentication (15 min)
In this Nugget, Keith talks with you about multi-factor authentication, including details about biometrics.
20. Centralized Management (17 min)
In this Nugget, Keith discusses several centralized approaches to identity and access management.
21. SSO and Security Threats (25 min)
In this Nugget, Keith discusses options for Single Sign On (SSO), as well as additional security threats — and what can be done to reduce their risk.
22. Computing System Evaluations (15 min)
In this Nugget, Keith talks with you about methods used, such as 3rd parties, for the evaluation of computing systems.
23. Security Model Details (11 min)
In this Nugget, Keith shares additional details regarding four security models that are important to know for a CISSP candidate.
24. Availability and Integrity Design (14 min)
In this Nugget, Keith talks with you about design issues that have an impact on availability and data integrity.
25. IDS and IPS (17 min)
In this Nugget, Keith describes and compares the features of Intrusion Detection Systems (IDS), and Intrusion Prevention Systems (IPS).
26. Controls for Operational Security (19 min)
In this Nugget, Keith reviews with you the types of functions of controls typically used to maintain operational control.
27. Separation of Duties (18 min)
In this Nugget, Keith provides examples of how separation of duties can improve the security posture of an organization.
28. Backups and Media (16 min)
In this Nugget, Keith talks with you about backup methods, as well as how we can help ensure confidentiality regarding the backup media. Fault tolerance with RAID also is discussed in this Nugget.
29. DR and BC (20 min)
In this Nugget, Keith discusses several of the concepts regarding Disaster Recovery (DR) and Business Continuity (BC), both of which are important for the availability of secure systems.
30. Malware (14 min)
In this Nugget, Keith talks with you about malware, including some steps organizations can take to minimize it.
31. Evidence (12 min)
In this Nugget, Keith reviews a few topics and terms associated with evidence.
32. Laws and Liability (10 min)
This Nugget addresses responsibilities that organizations have to maintain adequate security regarding sensitive data.
33. Incident Response (15 min)
In this Nugget, Keith talks with you about how incident response policies and procedures can improve the handling of problems when they arise.
34. System and Software Security (16 min)
In this Nugget, Keith talks with you about security issues that should be considered throughout many of the different stages of software and system development.
35. Virtualization and Cloud (13 min)
In this Nugget, Keith talks with you about security considerations when dealing with cloud and other virtualized environments.
36. 2700x (6 min)
In this Nugget, Keith talks with you about a couple standards documents, 27001 and 27002, that can provide guidelines and implementation best practices for security.
37. Federated Identities (11 min)
In this Nugget, Keith talks with you about federated identity services, as well as security concerns regarding them.
38. EPA (16 min)
In this Nugget, Keith discusses education, protocols, and applications (EPA) in the context of a secure environment.
39. Monitoring and More (12 min)
In this Nugget, Keith continues a discussion regarding protection of an Industrial Control System, and talks about monitoring, data handling, and disposal in a security-focused environment.


If this post was usefull for you, let us know in comments…

The post CBT Nuggets (ISC)2 CISSP 2015 appeared first on Free Download For All.

0 comments:

Enregistrer un commentaire

Trending on the Web

Related Posts Plugin for WordPress, Blogger...