Ultimate CISSP Certification Prep: Master Cybersecurity Pro 2024
Focused View
20:17:00
1.1 Organizational and Professional Ethics.mp4
09:24
2.1 Information and Cybersecurity Principles.mp4
10:52
3.1 Strategic Alignment.mp4
11:55
3.2 Organizational Roles and Responsibilities.mp4
12:41
3.3 Security Control Frameworks.mp4
11:51
4.1 Regulatory and Compliance Obligations.mp4
10:58
4.2 Intellectual Property & Transborder Data Flow.mp4
11:47
4.3 Privacy Principles.mp4
12:39
4.4 Cybercrime and Data Breaches.mp4
11:26
5.1 Investigation Objectives and Requirements.mp4
10:36
6.1 Governance Documents.mp4
09:17
7.1 Business Continuity Planning.mp4
09:43
7.2 Business Impact Analysis.mp4
12:59
8.1 Workforce Lifecycle Security.mp4
11:30
8.2 Workforce and Third-party Policies and Agreements.mp4
10:03
9.1 Risk Basics.mp4
10:07
9.2 Risk Assessment.mp4
07:32
9.3 Risk Analysis.mp4
13:23
9.4 Risk Response and Treatment.mp4
11:34
9.5 Risk Mitigation Controls.mp4
07:52
9.6 Risk Monitoring, Reporting, and Maturity.mp4
07:54
10.1 Threat Actors and Attributes.mp4
14:06
10.2 Attack Vectors - Digital Infrastructure.mp4
10:30
10.3 Attack Vectors - People.mp4
17:13
10.4 Attack Vectors - Code.mp4
09:59
10.5 Threat Modeling and Intelligence.mp4
11:08
11.1 Supply Chain Relationships and Risks.mp4
08:48
11.2 Supply Chain Risk Management and Mitigation.mp4
08:23
12.1 SETA Principles and Practices.mp4
15:12
12.2 Emerging SETA Trends, Techniques, and Topics.mp4
08:28
13.1 Asset Classification.mp4
10:11
14.1 Asset Handling Requirements.mp4
09:11
15.1 Asset Management.mp4
09:02
16.1 Data Management.mp4
08:00
16.2 Data Collection, Retention, and Archiving.mp4
09:57
16.3 Data Deletion and Media Destruction.mp4
12:05
17.1 Asset Retention and Retirement.mp4
09:38
18.1 Control Baselines.mp4
10:56
18.2 Data Protection Methods.mp4
12:37
19.1 Secure Design Principles.mp4
10:04
19.2 Zero Trust and Secure Access Service Edge (SASE).mp4
11:40
20.1 Information Security Models.mp4
11:07
21.1 Security Evaluation Criteria.mp4
09:25
22.1 Trusted Computing Base.mp4
12:55
23.1 Client-based, Server-based, and Distributed Systems.mp4
09:31
23.2 Database Management Systems.mp4
10:50
23.3 Operational Technology (OT).mp4
09:22
23.4 Cloud-based Systems.mp4
15:02
23.5 Internet of Things (IoT & IIoT) Systems.mp4
10:01
23.6 Virtualization.mp4
10:38
23.7 Automation and Solution Elements.mp4
09:56
24.1 Cryptography Primer.mp4
11:00
24.2 Encryption.mp4
14:53
24.3 Hashing and Digital Signatures.mp4
14:51
24.4 PKI and Digital Certificates.mp4
11:25
24.5 Emerging Cryptography.mp4
09:34
25.1 Cryptographic Attacks.mp4
11:18
25.2 Post-Exploitation Attacks.mp4
08:25
25.3 Ransomware.mp4
09:18
26.1 Physical Security Principles.mp4
09:09
27.1 Site and Building Controls.mp4
10:45
27.2 Environmental Impact.mp4
10:38
28.1 Information System Lifecycle.mp4
08:18
29.1 Network Models.mp4
13:08
29.2 Internet Protocol (IP).mp4
12:42
29.3 Secure Protocols.mp4
12:33
29.4 Multilayer and Converged Protocols.mp4
09:38
29.5 Transport Architecture.mp4
07:37
29.6 Segmentation.mp4
08:53
29.7 Microsegmentation.mp4
06:57
29.8 Wireless Architecture.mp4
10:27
29.9 Wi-Fi Networks.mp4
12:23
29.10 Virtual Private Cloud.mp4
08:41
29.11 Continuous Monitoring.mp4
11:04
30.1 Transmission Media.mp4
09:30
30.2 Network Access Control.mp4
13:22
30.3 Endpoint Security.mp4
08:30
31.1 Voice, Video, and Collaboration (CDN).mp4
09:31
31.2 Secure Remote Access Communications.mp4
11:31
32.1 Access Control Fundamentals.mp4
14:03
33.1 Identity Management (IdM).mp4
09:11
33.2 Authentication and Credential Management.mp4
12:41
33.3 Biometric Authentication.mp4
08:23
34.1 Federated Identity Management.mp4
11:43
35.1 Authorization and Access Controls.mp4
12:24
36.1 Identity and Access Management (IAM).mp4
11:34
37.1 Implementing Authentication Systems.mp4
12:04
37.2 Authentication and Access Control Attacks.mp4
11:32
38.1 Assessment and Audit Strategies.mp4
09:34
38.2 Planning Engagements.mp4
09:38
39.1 Vulnerability Testing and Assessment.mp4
14:19
39.2 Penetration Testing and Attack Simulations.mp4
13:49
39.3 Code and Interface Testing.mp4
10:04
CISSP Introduction.mp4
07:37
CISSP Introduction (1).mp4
07:37
Learning objectives.mp4
00:20
Learning objectives (1).mp4
00:19
Learning objectives (2).mp4
00:26
Learning objectives (3).mp4
00:32
Learning objectives (4).mp4
00:25
Learning objectives (5).mp4
00:21
Learning objectives (6).mp4
00:25
Learning objectives (7).mp4
00:25
Learning objectives (8).mp4
00:37
Learning objectives (9).mp4
00:32
Learning objectives (10).mp4
00:23
Learning objectives (11).mp4
00:36
Learning objectives (12).mp4
00:19
Learning objectives (13).mp4
00:20
Learning objectives (14).mp4
00:18
Learning objectives (15).mp4
00:25
Learning objectives (16).mp4
00:19
Learning objectives (17).mp4
00:32
Learning objectives (18).mp4
00:25
Learning objectives (19).mp4
00:19
Learning objectives (20).mp4
00:20
Learning objectives (21).mp4
00:25
Learning objectives (22).mp4
00:53
Learning objectives (23).mp4
00:41
Learning objectives (24).mp4
00:34
Learning objectives (25).mp4
00:20
Learning objectives (26).mp4
00:22
Learning objectives (27).mp4
00:36
Learning objectives (28).mp4
00:51
Learning objectives (29).mp4
00:21
Learning objectives (30).mp4
00:34
Learning objectives (31).mp4
00:22
Learning objectives (32).mp4
00:28
Learning objectives (33).mp4
00:20
Learning objectives (34).mp4
00:20
Learning objectives (35).mp4
00:21
Learning objectives (36).mp4
00:34
Learning objectives (37).mp4
00:22
Learning objectives (38).mp4
00:31
Lessons 1-5 Deep Dive Quiz.mp4
11:38
Lessons 13 - 18 Deep Dive Quiz.mp4
21:28
Lessons 19 - 22 Deep Dive Quiz.mp4
12:40
Lessons 26 - 28 Deep Dive Quiz.mp4
13:44
Lessons 30 - 31 Deep Dive Quiz.mp4
09:59
Lessons 32 - 37 Deep Dive Quiz.mp4
16:46
Lessons 38 - 39 Deep Dive Quiz.mp4
11:47
Lesson 6 - 9 Deep Dive Quiz.mp4
15:44
Lesson 10 - 12 Deep Dive Quiz.mp4
12:59
Lesson 23 Deep Dive Quiz.mp4
14:12
Lesson 24 - 25 Deep Dive Quiz.mp4
16:22
Lesson 29 Deep Dive Quiz.mp4
11:40
Module Introduction.mp4
01:19
Module Introduction (1).mp4
00:54
Module Introduction (2).mp4
01:09
Module Introduction (3).mp4
01:08
Module Introduction (4).mp4
00:55
Module Introduction (5).mp4
00:51
More details
Course Overview
Prepare for the CISSP certification with this comprehensive 4th Edition course covering all 8 domains of information security. Gain expert-level knowledge and practical skills to pass the exam and advance your cybersecurity career.
What You'll Learn
- Master all 8 CISSP domains including Security Architecture and Risk Management
- Develop professional-level cybersecurity strategies and solutions
- Understand legal, regulatory and compliance requirements for security professionals
Who This Is For
- Aspiring CISSP certification candidates
- IT professionals transitioning to security roles
- Security analysts seeking career advancement
Key Benefits
- 20+ hours of comprehensive CISSP exam preparation
- Based on the latest (ISC)² CISSP exam outline
- Taught by cybersecurity industry experts
Curriculum Highlights
- Security and Risk Management Fundamentals
- Asset Security and Protection Mechanisms
- Security Architecture and Engineering Principles
Focused display
- language english
- Training sessions 152
- duration 20:17:00
- Release Date 2025/05/27