Home Search Profile

Ultimate CISSP Certification Prep: Master Cybersecurity Pro 2024

Focused View

20:17:00

  • 1.1 Organizational and Professional Ethics.mp4
    09:24
  • 2.1 Information and Cybersecurity Principles.mp4
    10:52
  • 3.1 Strategic Alignment.mp4
    11:55
  • 3.2 Organizational Roles and Responsibilities.mp4
    12:41
  • 3.3 Security Control Frameworks.mp4
    11:51
  • 4.1 Regulatory and Compliance Obligations.mp4
    10:58
  • 4.2 Intellectual Property & Transborder Data Flow.mp4
    11:47
  • 4.3 Privacy Principles.mp4
    12:39
  • 4.4 Cybercrime and Data Breaches.mp4
    11:26
  • 5.1 Investigation Objectives and Requirements.mp4
    10:36
  • 6.1 Governance Documents.mp4
    09:17
  • 7.1 Business Continuity Planning.mp4
    09:43
  • 7.2 Business Impact Analysis.mp4
    12:59
  • 8.1 Workforce Lifecycle Security.mp4
    11:30
  • 8.2 Workforce and Third-party Policies and Agreements.mp4
    10:03
  • 9.1 Risk Basics.mp4
    10:07
  • 9.2 Risk Assessment.mp4
    07:32
  • 9.3 Risk Analysis.mp4
    13:23
  • 9.4 Risk Response and Treatment.mp4
    11:34
  • 9.5 Risk Mitigation Controls.mp4
    07:52
  • 9.6 Risk Monitoring, Reporting, and Maturity.mp4
    07:54
  • 10.1 Threat Actors and Attributes.mp4
    14:06
  • 10.2 Attack Vectors - Digital Infrastructure.mp4
    10:30
  • 10.3 Attack Vectors - People.mp4
    17:13
  • 10.4 Attack Vectors - Code.mp4
    09:59
  • 10.5 Threat Modeling and Intelligence.mp4
    11:08
  • 11.1 Supply Chain Relationships and Risks.mp4
    08:48
  • 11.2 Supply Chain Risk Management and Mitigation.mp4
    08:23
  • 12.1 SETA Principles and Practices.mp4
    15:12
  • 12.2 Emerging SETA Trends, Techniques, and Topics.mp4
    08:28
  • 13.1 Asset Classification.mp4
    10:11
  • 14.1 Asset Handling Requirements.mp4
    09:11
  • 15.1 Asset Management.mp4
    09:02
  • 16.1 Data Management.mp4
    08:00
  • 16.2 Data Collection, Retention, and Archiving.mp4
    09:57
  • 16.3 Data Deletion and Media Destruction.mp4
    12:05
  • 17.1 Asset Retention and Retirement.mp4
    09:38
  • 18.1 Control Baselines.mp4
    10:56
  • 18.2 Data Protection Methods.mp4
    12:37
  • 19.1 Secure Design Principles.mp4
    10:04
  • 19.2 Zero Trust and Secure Access Service Edge (SASE).mp4
    11:40
  • 20.1 Information Security Models.mp4
    11:07
  • 21.1 Security Evaluation Criteria.mp4
    09:25
  • 22.1 Trusted Computing Base.mp4
    12:55
  • 23.1 Client-based, Server-based, and Distributed Systems.mp4
    09:31
  • 23.2 Database Management Systems.mp4
    10:50
  • 23.3 Operational Technology (OT).mp4
    09:22
  • 23.4 Cloud-based Systems.mp4
    15:02
  • 23.5 Internet of Things (IoT & IIoT) Systems.mp4
    10:01
  • 23.6 Virtualization.mp4
    10:38
  • 23.7 Automation and Solution Elements.mp4
    09:56
  • 24.1 Cryptography Primer.mp4
    11:00
  • 24.2 Encryption.mp4
    14:53
  • 24.3 Hashing and Digital Signatures.mp4
    14:51
  • 24.4 PKI and Digital Certificates.mp4
    11:25
  • 24.5 Emerging Cryptography.mp4
    09:34
  • 25.1 Cryptographic Attacks.mp4
    11:18
  • 25.2 Post-Exploitation Attacks.mp4
    08:25
  • 25.3 Ransomware.mp4
    09:18
  • 26.1 Physical Security Principles.mp4
    09:09
  • 27.1 Site and Building Controls.mp4
    10:45
  • 27.2 Environmental Impact.mp4
    10:38
  • 28.1 Information System Lifecycle.mp4
    08:18
  • 29.1 Network Models.mp4
    13:08
  • 29.2 Internet Protocol (IP).mp4
    12:42
  • 29.3 Secure Protocols.mp4
    12:33
  • 29.4 Multilayer and Converged Protocols.mp4
    09:38
  • 29.5 Transport Architecture.mp4
    07:37
  • 29.6 Segmentation.mp4
    08:53
  • 29.7 Microsegmentation.mp4
    06:57
  • 29.8 Wireless Architecture.mp4
    10:27
  • 29.9 Wi-Fi Networks.mp4
    12:23
  • 29.10 Virtual Private Cloud.mp4
    08:41
  • 29.11 Continuous Monitoring.mp4
    11:04
  • 30.1 Transmission Media.mp4
    09:30
  • 30.2 Network Access Control.mp4
    13:22
  • 30.3 Endpoint Security.mp4
    08:30
  • 31.1 Voice, Video, and Collaboration (CDN).mp4
    09:31
  • 31.2 Secure Remote Access Communications.mp4
    11:31
  • 32.1 Access Control Fundamentals.mp4
    14:03
  • 33.1 Identity Management (IdM).mp4
    09:11
  • 33.2 Authentication and Credential Management.mp4
    12:41
  • 33.3 Biometric Authentication.mp4
    08:23
  • 34.1 Federated Identity Management.mp4
    11:43
  • 35.1 Authorization and Access Controls.mp4
    12:24
  • 36.1 Identity and Access Management (IAM).mp4
    11:34
  • 37.1 Implementing Authentication Systems.mp4
    12:04
  • 37.2 Authentication and Access Control Attacks.mp4
    11:32
  • 38.1 Assessment and Audit Strategies.mp4
    09:34
  • 38.2 Planning Engagements.mp4
    09:38
  • 39.1 Vulnerability Testing and Assessment.mp4
    14:19
  • 39.2 Penetration Testing and Attack Simulations.mp4
    13:49
  • 39.3 Code and Interface Testing.mp4
    10:04
  • CISSP Introduction.mp4
    07:37
  • CISSP Introduction (1).mp4
    07:37
  • Learning objectives.mp4
    00:20
  • Learning objectives (1).mp4
    00:19
  • Learning objectives (2).mp4
    00:26
  • Learning objectives (3).mp4
    00:32
  • Learning objectives (4).mp4
    00:25
  • Learning objectives (5).mp4
    00:21
  • Learning objectives (6).mp4
    00:25
  • Learning objectives (7).mp4
    00:25
  • Learning objectives (8).mp4
    00:37
  • Learning objectives (9).mp4
    00:32
  • Learning objectives (10).mp4
    00:23
  • Learning objectives (11).mp4
    00:36
  • Learning objectives (12).mp4
    00:19
  • Learning objectives (13).mp4
    00:20
  • Learning objectives (14).mp4
    00:18
  • Learning objectives (15).mp4
    00:25
  • Learning objectives (16).mp4
    00:19
  • Learning objectives (17).mp4
    00:32
  • Learning objectives (18).mp4
    00:25
  • Learning objectives (19).mp4
    00:19
  • Learning objectives (20).mp4
    00:20
  • Learning objectives (21).mp4
    00:25
  • Learning objectives (22).mp4
    00:53
  • Learning objectives (23).mp4
    00:41
  • Learning objectives (24).mp4
    00:34
  • Learning objectives (25).mp4
    00:20
  • Learning objectives (26).mp4
    00:22
  • Learning objectives (27).mp4
    00:36
  • Learning objectives (28).mp4
    00:51
  • Learning objectives (29).mp4
    00:21
  • Learning objectives (30).mp4
    00:34
  • Learning objectives (31).mp4
    00:22
  • Learning objectives (32).mp4
    00:28
  • Learning objectives (33).mp4
    00:20
  • Learning objectives (34).mp4
    00:20
  • Learning objectives (35).mp4
    00:21
  • Learning objectives (36).mp4
    00:34
  • Learning objectives (37).mp4
    00:22
  • Learning objectives (38).mp4
    00:31
  • Lessons 1-5 Deep Dive Quiz.mp4
    11:38
  • Lessons 13 - 18 Deep Dive Quiz.mp4
    21:28
  • Lessons 19 - 22 Deep Dive Quiz.mp4
    12:40
  • Lessons 26 - 28 Deep Dive Quiz.mp4
    13:44
  • Lessons 30 - 31 Deep Dive Quiz.mp4
    09:59
  • Lessons 32 - 37 Deep Dive Quiz.mp4
    16:46
  • Lessons 38 - 39 Deep Dive Quiz.mp4
    11:47
  • Lesson 6 - 9 Deep Dive Quiz.mp4
    15:44
  • Lesson 10 - 12 Deep Dive Quiz.mp4
    12:59
  • Lesson 23 Deep Dive Quiz.mp4
    14:12
  • Lesson 24 - 25 Deep Dive Quiz.mp4
    16:22
  • Lesson 29 Deep Dive Quiz.mp4
    11:40
  • Module Introduction.mp4
    01:19
  • Module Introduction (1).mp4
    00:54
  • Module Introduction (2).mp4
    01:09
  • Module Introduction (3).mp4
    01:08
  • Module Introduction (4).mp4
    00:55
  • Module Introduction (5).mp4
    00:51
  • More details


    Course Overview

    Prepare for the CISSP certification with this comprehensive 4th Edition course covering all 8 domains of information security. Gain expert-level knowledge and practical skills to pass the exam and advance your cybersecurity career.

    What You'll Learn

    • Master all 8 CISSP domains including Security Architecture and Risk Management
    • Develop professional-level cybersecurity strategies and solutions
    • Understand legal, regulatory and compliance requirements for security professionals

    Who This Is For

    • Aspiring CISSP certification candidates
    • IT professionals transitioning to security roles
    • Security analysts seeking career advancement

    Key Benefits

    • 20+ hours of comprehensive CISSP exam preparation
    • Based on the latest (ISC)² CISSP exam outline
    • Taught by cybersecurity industry experts

    Curriculum Highlights

    1. Security and Risk Management Fundamentals
    2. Asset Security and Protection Mechanisms
    3. Security Architecture and Engineering Principles
    Focused display
    • language english
    • Training sessions 152
    • duration 20:17:00
    • Release Date 2025/05/27

    Courses related to CISSP - Certified Information Systems Security Professional

    Subtitles
    CISSP Challenge: 125 Advanced Questions 2025
    CISSP Challenge: 125 Advanced Questions 2025
    33:10
    English subtitles
    01/27/2025
    Subtitles
    CISSP Mastery: 125 Expert-Level Questions 2025
    CISSP Mastery: 125 Expert-Level Questions 2025
    33:10
    English subtitles
    01/27/2025