Ultimate CISSP Certification Prep: Master Cybersecurity Pro 2024
 Focused View
                                    20:17:00
1.1 Organizational and Professional Ethics.mp4
09:24   
2.1 Information and Cybersecurity Principles.mp4
10:52   
3.1 Strategic Alignment.mp4
11:55   
3.2 Organizational Roles and Responsibilities.mp4
12:41   
3.3 Security Control Frameworks.mp4
11:51   
4.1 Regulatory and Compliance Obligations.mp4
10:58   
4.2 Intellectual Property & Transborder Data Flow.mp4
11:47   
4.3 Privacy Principles.mp4
12:39   
4.4 Cybercrime and Data Breaches.mp4
11:26   
5.1 Investigation Objectives and Requirements.mp4
10:36   
6.1 Governance Documents.mp4
09:17   
7.1 Business Continuity Planning.mp4
09:43   
7.2 Business Impact Analysis.mp4
12:59   
8.1 Workforce Lifecycle Security.mp4
11:30   
8.2 Workforce and Third-party Policies and Agreements.mp4
10:03   
9.1 Risk Basics.mp4
10:07   
9.2 Risk Assessment.mp4
07:32   
9.3 Risk Analysis.mp4
13:23   
9.4 Risk Response and Treatment.mp4
11:34   
9.5 Risk Mitigation Controls.mp4
07:52   
9.6 Risk Monitoring, Reporting, and Maturity.mp4
07:54   
10.1 Threat Actors and Attributes.mp4
14:06   
10.2 Attack Vectors - Digital Infrastructure.mp4
10:30   
10.3 Attack Vectors - People.mp4
17:13   
10.4 Attack Vectors - Code.mp4
09:59   
10.5 Threat Modeling and Intelligence.mp4
11:08   
11.1 Supply Chain Relationships and Risks.mp4
08:48   
11.2 Supply Chain Risk Management and Mitigation.mp4
08:23   
12.1 SETA Principles and Practices.mp4
15:12   
12.2 Emerging SETA Trends, Techniques, and Topics.mp4
08:28   
13.1 Asset Classification.mp4
10:11   
14.1 Asset Handling Requirements.mp4
09:11   
15.1 Asset Management.mp4
09:02   
16.1 Data Management.mp4
08:00   
16.2 Data Collection, Retention, and Archiving.mp4
09:57   
16.3 Data Deletion and Media Destruction.mp4
12:05   
17.1 Asset Retention and Retirement.mp4
09:38   
18.1 Control Baselines.mp4
10:56   
18.2 Data Protection Methods.mp4
12:37   
19.1 Secure Design Principles.mp4
10:04   
19.2 Zero Trust and Secure Access Service Edge (SASE).mp4
11:40   
20.1 Information Security Models.mp4
11:07   
21.1 Security Evaluation Criteria.mp4
09:25   
22.1 Trusted Computing Base.mp4
12:55   
23.1 Client-based, Server-based, and Distributed Systems.mp4
09:31   
23.2 Database Management Systems.mp4
10:50   
23.3 Operational Technology (OT).mp4
09:22   
23.4 Cloud-based Systems.mp4
15:02   
23.5 Internet of Things (IoT & IIoT) Systems.mp4
10:01   
23.6 Virtualization.mp4
10:38   
23.7 Automation and Solution Elements.mp4
09:56   
24.1 Cryptography Primer.mp4
11:00   
24.2 Encryption.mp4
14:53   
24.3 Hashing and Digital Signatures.mp4
14:51   
24.4 PKI and Digital Certificates.mp4
11:25   
24.5 Emerging Cryptography.mp4
09:34   
25.1 Cryptographic Attacks.mp4
11:18   
25.2 Post-Exploitation Attacks.mp4
08:25   
25.3 Ransomware.mp4
09:18   
26.1 Physical Security Principles.mp4
09:09   
27.1 Site and Building Controls.mp4
10:45   
27.2 Environmental Impact.mp4
10:38   
28.1 Information System Lifecycle.mp4
08:18   
29.1 Network Models.mp4
13:08   
29.2 Internet Protocol (IP).mp4
12:42   
29.3 Secure Protocols.mp4
12:33   
29.4 Multilayer and Converged Protocols.mp4
09:38   
29.5 Transport Architecture.mp4
07:37   
29.6 Segmentation.mp4
08:53   
29.7 Microsegmentation.mp4
06:57   
29.8 Wireless Architecture.mp4
10:27   
29.9 Wi-Fi Networks.mp4
12:23   
29.10 Virtual Private Cloud.mp4
08:41   
29.11 Continuous Monitoring.mp4
11:04   
30.1 Transmission Media.mp4
09:30   
30.2 Network Access Control.mp4
13:22   
30.3 Endpoint Security.mp4
08:30   
31.1 Voice, Video, and Collaboration (CDN).mp4
09:31   
31.2 Secure Remote Access Communications.mp4
11:31   
32.1 Access Control Fundamentals.mp4
14:03   
33.1 Identity Management (IdM).mp4
09:11   
33.2 Authentication and Credential Management.mp4
12:41   
33.3 Biometric Authentication.mp4
08:23   
34.1 Federated Identity Management.mp4
11:43   
35.1 Authorization and Access Controls.mp4
12:24   
36.1 Identity and Access Management (IAM).mp4
11:34   
37.1 Implementing Authentication Systems.mp4
12:04   
37.2 Authentication and Access Control Attacks.mp4
11:32   
38.1 Assessment and Audit Strategies.mp4
09:34   
38.2 Planning Engagements.mp4
09:38   
39.1 Vulnerability Testing and Assessment.mp4
14:19   
39.2 Penetration Testing and Attack Simulations.mp4
13:49   
39.3 Code and Interface Testing.mp4
10:04   
CISSP Introduction.mp4
07:37   
CISSP Introduction (1).mp4
07:37   
Learning objectives.mp4
00:20   
Learning objectives (1).mp4
00:19   
Learning objectives (2).mp4
00:26   
Learning objectives (3).mp4
00:32   
Learning objectives (4).mp4
00:25   
Learning objectives (5).mp4
00:21   
Learning objectives (6).mp4
00:25   
Learning objectives (7).mp4
00:25   
Learning objectives (8).mp4
00:37   
Learning objectives (9).mp4
00:32   
Learning objectives (10).mp4
00:23   
Learning objectives (11).mp4
00:36   
Learning objectives (12).mp4
00:19   
Learning objectives (13).mp4
00:20   
Learning objectives (14).mp4
00:18   
Learning objectives (15).mp4
00:25   
Learning objectives (16).mp4
00:19   
Learning objectives (17).mp4
00:32   
Learning objectives (18).mp4
00:25   
Learning objectives (19).mp4
00:19   
Learning objectives (20).mp4
00:20   
Learning objectives (21).mp4
00:25   
Learning objectives (22).mp4
00:53   
Learning objectives (23).mp4
00:41   
Learning objectives (24).mp4
00:34   
Learning objectives (25).mp4
00:20   
Learning objectives (26).mp4
00:22   
Learning objectives (27).mp4
00:36   
Learning objectives (28).mp4
00:51   
Learning objectives (29).mp4
00:21   
Learning objectives (30).mp4
00:34   
Learning objectives (31).mp4
00:22   
Learning objectives (32).mp4
00:28   
Learning objectives (33).mp4
00:20   
Learning objectives (34).mp4
00:20   
Learning objectives (35).mp4
00:21   
Learning objectives (36).mp4
00:34   
Learning objectives (37).mp4
00:22   
Learning objectives (38).mp4
00:31   
Lessons 1-5 Deep Dive Quiz.mp4
11:38   
Lessons 13 - 18 Deep Dive Quiz.mp4
21:28   
Lessons 19 - 22 Deep Dive Quiz.mp4
12:40   
Lessons 26 - 28 Deep Dive Quiz.mp4
13:44   
Lessons 30 - 31 Deep Dive Quiz.mp4
09:59   
Lessons 32 - 37 Deep Dive Quiz.mp4
16:46   
Lessons 38 - 39 Deep Dive Quiz.mp4
11:47   
Lesson 6 - 9 Deep Dive Quiz.mp4
15:44   
Lesson 10 - 12 Deep Dive Quiz.mp4
12:59   
Lesson 23 Deep Dive Quiz.mp4
14:12   
Lesson 24 - 25 Deep Dive Quiz.mp4
16:22   
Lesson 29 Deep Dive Quiz.mp4
11:40   
Module Introduction.mp4
01:19   
Module Introduction (1).mp4
00:54   
Module Introduction (2).mp4
01:09   
Module Introduction (3).mp4
01:08   
Module Introduction (4).mp4
00:55   
Module Introduction (5).mp4
00:51   
More details
Course Overview
Prepare for the CISSP certification with this comprehensive 4th Edition course covering all 8 domains of information security. Gain expert-level knowledge and practical skills to pass the exam and advance your cybersecurity career.
What You'll Learn
- Master all 8 CISSP domains including Security Architecture and Risk Management
 - Develop professional-level cybersecurity strategies and solutions
 - Understand legal, regulatory and compliance requirements for security professionals
 
Who This Is For
- Aspiring CISSP certification candidates
 - IT professionals transitioning to security roles
 - Security analysts seeking career advancement
 
Key Benefits
- 20+ hours of comprehensive CISSP exam preparation
 - Based on the latest (ISC)² CISSP exam outline
 - Taught by cybersecurity industry experts
 
Curriculum Highlights
- Security and Risk Management Fundamentals
 - Asset Security and Protection Mechanisms
 - Security Architecture and Engineering Principles
 
  Focused display
                                - language english
 - Training sessions 152
 - duration 20:17:00
 - Release Date 2025/05/27