CISSP - Video Training Tutorial DVD

£5.95 Buy It Now 18d 22h, FREE Shipping, 14-Day Returns, eBay Money Back Guarantee

Seller: Top-Rated Seller daber56 (1,943) 97.8%, Location: Slough, Berkshire, Ships to: Worldwide, Item: 223223309967 Certified Information Systems Security Professional (CISSP) Professional Video Training on DVD with exercise files. You can use this DVD only on PC and MAC (not working on standalone DVD player). Includes free VLC Media Player to play video lessons on computer (version for Windows and Mac-OS). Dispatch withing 24h (Mon-Sat) - FREE 1st class UK Royal Mail Please don't hesitate to contact us regarding any of our listing, postage discount, item inquiry etc. THIS DVD comes with 14 days Money Back Guarantee. You have to send the item back within 14 days of delivery in original unused excellent condition. Please note: Postage is Non-Refundable & Buyer will bear the return postage. CONTENTS 1.CISSP Asset Security 01.Introduction CISSP® - Asset Security What's Asset Security and What's Next? 02.Information and Asset Classification Introduction to Information and Asset Classification Common Classification Levels CMDB and Classification Classification Impacts to Access Control Decisions Based on Classification Conclusion 03.Data and System Ownership Introduction to Data and System Ownership What Is Data and System Ownership? How to Identify Data and System Ownership Structured Is Easier to Determine than Unstructured CMDB and Ownership Conclusion 04.Privacy Protection Introduction to Privacy Protection What Is Privacy Protection? What Type of Data Is Related to Privacy Protection? How Is Privacy Protection Related to Data Classification? International Privacy Landscape CMDB and Privacy Protection Conclusion 05.Appropriate Retention Introduction to Appropriate Retention What Is Appropriate Retention? Common Data Retention Requirements Shouldn’t I Keep My Data Forever? Destruction of Data CMDB and Appropriate Retention Conclusion 06.Data Security Controls Introduction to Data Security Controls What Are Data Security Controls? Classification and Data Security Controls Access Control Methodologies Cryptography Methods Automation Is Your Friend for Data Security Controls Conclusion 07.Handling Requirements Introduction to Handling Requirements What Are Handling Requirements? How Does Classification Impact Handling Requirements? Common Handling Requirements Conclusion 2.CISSP Communications and Network Security 01.Course Overview Course Overview 02.Introduction CISSP® - Communications and Network Security What Is Communications and Network Security and What's Next? 03.Secure Network Architecture and Design Introduction to Secure Network Architecture and Design Network Security Defined The Open System Interconnect (OSI) Model Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer OSI Model vs. TCP/IP Model Internet Protocol (IP) Networking IP Classes and CIDR Ports Network Topologies High-level Network Zone Concepts Common Network Services Summary and What’s Next 04.Supervisory Control and Data Acquisition (SCADA) Introduction to Supervisory Control and Data Acquisition Supervisory Control and Data Acquisition Defined Components of SCADA SCADA Security Concerns Summary and What’s Next 05.Network Protocols Introduction to Network Protocols Network Protocols Defined Storage-focused Network Protocols Multi-protocol Label Switching (MPLS) Voice Over Internet Protocol (VoIP) Wireless Connectivity Cryptography Defined Forms of Cryptography Benefits of Asymmetric Cryptography Public Key Infrastructure (PKI) Digital Signatures Certificate Hierarchies and Chains Summary and What’s Next 06.Securing Network Components Introduction to Securing Network Components Securing Network Components Defined High Security Value Network Components Routers Switches Virtual Private Network (VPN) Concentrators Modems Common Transmission Mediums Common Firewall Types Packet Filtering Firewalls Stateful Inspection Firewalls Application Firewalls 'Next Generation' Firewalls Address Translation Proxies Summary and What’s Next 07.Communication Channels Introduction to Communication Channels Circuit vs. Packet Networks Carrier Sense Multiple Access Token Passing Common Layer Two Networking Protocols Ethernet Token Ring Fiber Distributed Data Interface Wide Area Networking Integrated Services Digital Network Asynchronous Transfer Mode Digital Subscriber Line Cable Modem X.25 Frame Relay T, E, and OC Common Electronic Communication Methods Analog vs. Digital Voice Communication Channel Email Instant Messaging and Chat Rooms Peer to Peer Sharing Virtual Meetings Common Virtual Private Network Methods Point to Point Tunneling Protocol Layer Two Tunneling Protocol Internet Protocol Security Transport Mode vs. Tunnel Mode Secure Sockets Layering Common Remote Access Methods Telnet rlogin Secure Shell Terminal Services Virtual Local Area Networks Private VLANs Secondary VLAN Subtypes Summary and What’s Next 08.Network Attacks Introduction to Network Attacks Themes of Network Attacks Reconnaissance Spamming Spoofing Packet Manipulation Session Hijacking Denial of Service Tools and Techniques for Network Defense Intrusion Detection / Prevention Systems Security Information and Event Management Vulnerability Management and Penetration Testing Summary and What’s Next 3.CISSP Physical Environmental Security 01.Physical Security Design Introduction The Role of Physical Security Safety Confidentiality, Integrity, and Availability Design Considerations Design Considerations Part 2 Physical Security Assessment Threat Types Balanced Approach Countermeasure Types Control Categories CPTED Designing Physical Security for a Gas Station References and Conclusion 02.Physical Security Perimeter Introduction Perimeter Security Controls Barriers Windows Intro to Lighting Light Measurement Lighting Types Introduction to CCTV Camera Types Camera Lenses Camera Mounting, Cabling, and Power Intrusion Detection Systems Guards Conclusion 03.Internal Physical Security Introduction to Internal Security Alarms, Access Cards, Biometrics, and Locks Lock Grades and Bypass Methods Key Controls and Failure Modes Man-traps, Safes, Vaults, and Turnstiles Administrative Controls Diagram Review and Module Summary 04.Safe and Secure Facility Operations Introduction HVAC, Water, Gas, Steam Electrical Power Fire Suppression and Detection Systems and Module Conclusion 05.Securing and Protecting Equipment Introduction Environmental Alarms Protecting Equipment Part 1 Protecting Equipment Part 2 Protecting Mobile Equipment Dealing with Equipment Failure Device Inventory and Module Conclusion 06.Personnel Privacy and Safety Introduction Privacy Safety Duress Procedures and Travel Safety and Security Administrative Safety Concerns and Module Conclusion 4.CISSP Security and Risk Management 01.Course Overview Course Overview 02.Introduction Introduction 03.Fundamental Security Principles Introduction Security and Risk Management Fundamentals Balancing Business and Security The CIA Triad Accountability and Assurance Control Types Delaying, Preventing, or Detecting Attacks Due Care and Due Diligence Ethics Conclusion 04.Legal and Regulatory Introduction Legal Systems Criminal and Civil Law Administrative Law Important Laws Summary 05.Computer Crime Introduction Computers Can Be Used for EVIL Some Hack Just Because They Can It's All About the Money Spies Are Real Payback and Government Hackers Theft, Vandalism, and Trespass Fraud, Spam, and Slander Conclusion 06.Intellectual Property Introduction Patents Trademarks and Trade Secrets Copyrights Summary 07.Privacy Introduction Privacy Matters Privacy Law Examples Conclusion 08.Licensing Introduction Reasons for Licensing License Types Open Versus Closed Source Licensing Commercial Versus Non-commercial Licensing End User License Agreements Free Software Demo and Trial Licenses Shareware Academic Software Licensing Summary 09.Trans-border Data Flow Introduction Trans-border Data Flow Import and Export Controls Summary 10.Security Awareness Introduction Develop a Culture of Security Awareness Types of Security Awareness Expected Impact of Training Awareness Validation Summary 11.Aligning Security to the Organization Introduction Governance Roles and Responsibilities Organizational Objectives Security Goals Security Mission Conclusion 12.Creating Policies, Procedures, Guidelines, and Baselines Introduction Security Frameworks Introduction Effective Policies and Procedures Policy Sections Procedures Guidelines Baselines Summary 13.Continuity Planning and Disaster Recovery Introduction Business Continuity Process Conducting a Business Impact Analysis Disaster Recovery Planning vs. Business Continuity Planning Testing Your Plans Disaster Events Recovering from Disaster Disaster Recovery Controls Conclusion 14.Threat Modeling Introduction Threat Modeling Overview Threat Modeling Focus Threat Model - Scoping Reviewing the Architecture Decomposing Threat Identification using STRIDE Defining and Documenting Countermeasures Prioritization with DREAD Summary 15.Risk Assessment Concepts Introduction Threats Threat Source Vulnerabilities Risk Risk Assessments Risk Assessment Methodologies Real World Threats and Vulnerabilities Assessment Approach Analysis Approach Risk Acceptance and Assignment Common Calculations Conclusion 16.Countermeasure Selection Process Introduction What Is a Countermeasure? Control Variations Control Types Control Considerations Assessing Control Strength Countermeasure Assurance Example Countermeasures Conclusion 17.Frameworks Introduction Risk Management Framework Leveraging Frameworks NIST Risk Management Framework RMF FAIR OCTAVE Allegro Summary 5.CISSP Security Assessment and Testing 01.Course Overview Course Overview 02.Assessment and Testing Strategies Course Introduction Ensuring Objectives Have Been Met Resource Constraints Security Assessment Foundations Security Assessment Program Assessment Viewpoints Assessment Types Summary 03.Security Control Effectiveness Testing Introduction Vulnerability Assessment Detection Identification Analysis Reporting Mitigation Intro to Penetration Testing Penetration Testing Test Process Walkthrough Selecting Target Surface Destructing and Non-destructive Testing Penetration Testing Frameworks CISSP Exam Tip Penetration Testing Process Scoping the Test Enumeration Identification Security Assessment Techniques Source Code Review Summary 04.Security Process Data Collection Introduction Key Performance Risk Indicators Management Review Training and Awareness Account Management Disaster Recovery and Business Continuity Backup Data Verification Summary 05.Test Result Analysis Introduction Vulnerability Assessment Vulnerability Assessment Dashboards Targeted Reporting Data Analysis Penetration Testing Reports Reporting Challenges Penetration Testing Report Anatomy Summary 06.Third-party Assessment Introduction Third-party Vendors Evaluating Guidelines Audit Reports SSAE16 Audit Stages Summary 07.Information Security Continuous Monitoring Introduction What Is ISCM? ISCM Strategy Defining Your ISCM Program Strategy Establishing Your ISCM Program Strategy Implementing Your ISCM Program Strategy Analyzing Your ISCM Program Strategy Respond to ISCM Findings Review Your ISCM Program Strategy Summary 6.CISSP Security Engineering 01.Introduction CISSP® - Security Engineering What's Security Engineering and What's Next? 02.Secure Design Principles and Processes Introduction to Secure Design Principles and Processes Software/System Design Lifecycle Requirements Phase Design Phase Implementation Phase Integration and Testing Phase Transition to Operations Phase NIST Security Engineering Principles Security Foundation Principles Risk Based Principles Ease of Use Principles Increase Resilience Principles Reduce Vulnerabilities Principles Design with Network in Mind Principles Summary and What’s Next 03.Fundamental Concepts of Security Models Introduction to Fundamental Concepts of Security Models Type of Security Models Information Flow Security Model Matrix-based Security Model Multi-level Lattice Security Model Non-interference Security Model State Machine Security Model Common Security Model Examples Bell-LaPadula Confidentiality Security Model Biba Integrity Security Model Brewer-Nash (The Chinese Wall) Security Model Clark Wilson Security Model Graham-Denning Security Model Security Architecture Frameworks The Open Group Architecture Framework (TOGAF) Zachman Framework Sherwood Applied Business Security Architecture (SABSA) Summary and What’s Next 04.Security Evaluation Models Introduction to Security Evaluation Models Certification and Accreditation Product Evaluation Models Trusted Computer System Evaluation Criteria (TCSEC) Information Technology Security Evaluation Criteria (ITSEC) The Common Criteria Security Implementation Guidelines ISO/IEC 27001 and 27002 Security Standards Control Objects for Information and Related Technology (COBIT) Payment Card Industry Data Security Standard (PCI-DSS) Summary and What’s Next 05.Security Capabilities of Information Systems Introduction to Security Capabilities of Information Systems Access Control Mechanisms Secure Memory Management State and Layering Cryptographic Protections Host Firewalls and Intrusion Prevention Auditing and Monitoring Controls Virtualization Summary and What’s Next 06.Vulnerabilities in Security Architecture and Technology Components Introduction to Vulnerabilities in Security Architecture and Technology Components Completely Secure Any System Vulnerability Types The CIA Triad Security Architecture Vulnerabilities Technology Component Vulnerabilities Summary and What’s Next 07.Cryptography Introduction to Cryptography Cryptography Is Typically Bypassed, Not Penetrated Basic Concept of Cryptography Cryptography Isn’t New! The CIA Triad Key Length Cipher Types Forms of Cryptography Symmetric Cryptography Data Encryption Standard (DES) Double DES (2DES) Triple DES (3DES) Advanced Encryption Standard (Rijndael) Asymmetric Cryptography Hashing Functions Hashing Attacks Methods of Cryptanalytic Attacks Cryptographic Lifecycle Cryptography Law Summary and What’s Next 08.Site and Facility Secure Design Introduction to Site and Facility Secure Design Physical Security Control Design Crime Prevention Through Environmental Design Physical Security Requirements and Resources Key Facility Protection Points Facility Access Support Equipment Rooms Server and Technology Component Rooms Restricted Work Areas Summary and What’s Next 7.CISSP Software Development Security 01.Introduction Introduction Overview 02.Application Security Overview The Importance of Application Security Governance Controls, Versioning, and Change Control Process Improvement Personnel and Conclusion 03.Development Life Cycle Introduction Terminology and Introduction to SDLC Injecting Security into the SDLC Why Use Software Development Models? Common Software Development Models Agile Methodologies Conclusion 04.Security Impact of Acquired Software Introduction Impact of Acquired Software Governance References and Conclusion 05.Software Threats Introduction Misconfigurations, Buffer Overflows, Injection Path Traversal, Covert Channels, DOS, Trap Doors, Flaws Social Engineering, Errors, XSS, Brute Force, CSRF File Inclusion, Violations, Undocumented Functionality Metadata and Conclusion 06.Programming Language Concepts and Concerns Introduction Programming Language Concepts Introduction to Object Oriented Programming Distributed Programming and Course Conclusion 07.Secure Coding and Security Control Concepts Introduction The Cause of Software Vulnerabilities Defense in Depth and Input Validation Outputs, Cryptography, and Fail Secure Memory Protection, Architecture, and Code Review Code Reuse, Security Testing, and Patching Deployment and Well Defined Systems Separation of Duties and Anti-malware Audit Trails and Course Conclusion NOTICE: This listing complies with all eBay rules and regulations. The item does NOT infringe upon any trademark, copyright, or any other rights, nor does it infringe upon any eBay listing or spam policies. The contents of this DVD are distributed freely and globally under the terms of the GNU Public License, the GNU Lesser General Public Licence (LGPL), or the Mozilla Public Licence. We have a full and legal right to redistribute this product. This is NOT a digital download – the item will be sent to the buyer on solid form DVD media. Condition: New Insights Exclusive
  •  Popularity - 61 views, 5.1 views per day, 12 days on eBay. High amount of views. 0 sold, 5 available.
  •  Price -
  •  Seller - 1,943+ items sold. 2.2% negative feedback. Top-Rated Seller! Ships on time with tracking, 0 problems with past sales.
Similar Items
SitemapAndra Day | Read more | Ojousama wa Oyomesama