CISSP Bootcamp: The fastest way
Buy now
Learn more
Introductions
Intro to CyberFirst Academy
About this course
CISSP Intro
Exam Outline Domains
Exam Outline Experience Requirements
Exam Outline Length of exam
Exam Outline Exam weights
Exam Outline pdf
Domain 1: Security and Risk Management
1.1 Understanding, Adhering to, and Promoting Professional Ethics
CISSP Code of Ethics
1.2 Understanding and Applying Security Concepts
Confidentiality, Integrity, and Availability
Identification Authentication Authorization Accountability
Repudiation and Non-Repudiation
1.3 Evaluating and Applying Security Governance Principles
Alignment of the Security Function to Business Strategy, Goals, Mission, and Objectives
Organizational processes (e.g., acquisitions, divestitures, governance committees)
Roles and Responsibilities_key Points
Divestitures and SpinOffs
Governance Committees
Information Security Officer
End User
Security Control Frameworks
Strategic Planning: Strategic, Tactical and Operational
Roles and Responsibilities
Due Care/Due Diligence
1.4 Determining Compliance and Other Requirements
Contractual, Legal, Industry Standards, and Regulatory Requirements
Privacy
Privacy Continued
1.5 Understanding Legal and Regulatory Issues Regarding Information Security in a Holistic Context
1.6 Understanding Requirements for Investigation Types
Administrative, Criminal, Civil, Regulatory, Industry Standards
1.7 Developing, Documenting, and Implementing Security Policy, Standards, Procedures, and Guidelines
Policies Standards Baselines and Procedures and Guidelines
1.8 Identifying, Analyzing, and Prioritizing Business Continuity (BC) Requirements
Business Continuity Plan (BCP)
Business Impact Analysis (BIA)
1.9 Contributing to and Enforcing Personnel Security Policies and Procedures
Security Awareness Training
Encryption
Defense-in-Depth
Data Classification and Declassification
Change Control
Separation of Duties
Job Rotation and Mandatory Leave
Vulnerabilities, Threats and Risk
Risk Assessment formulas
Risk Responses
Risk Assessment Formulas 2
Computer Crime
Applying Risk Management Concepts: Qualitative, Quantitative, and Hybrid Risks
Types of Controls
Threat Modeling
Cloud Computing: SaaS, PaaS, IaaS
Conducting Risk Assessments
Domain 2: Asset Security
Securing Assets
Sensitive Information
Sanitization of Data
Products
Course
Section
Lesson
Defense-in-Depth
Defense-in-Depth
CISSP Bootcamp: The fastest way
Buy now
Learn more
Introductions
Intro to CyberFirst Academy
About this course
CISSP Intro
Exam Outline Domains
Exam Outline Experience Requirements
Exam Outline Length of exam
Exam Outline Exam weights
Exam Outline pdf
Domain 1: Security and Risk Management
1.1 Understanding, Adhering to, and Promoting Professional Ethics
CISSP Code of Ethics
1.2 Understanding and Applying Security Concepts
Confidentiality, Integrity, and Availability
Identification Authentication Authorization Accountability
Repudiation and Non-Repudiation
1.3 Evaluating and Applying Security Governance Principles
Alignment of the Security Function to Business Strategy, Goals, Mission, and Objectives
Organizational processes (e.g., acquisitions, divestitures, governance committees)
Roles and Responsibilities_key Points
Divestitures and SpinOffs
Governance Committees
Information Security Officer
End User
Security Control Frameworks
Strategic Planning: Strategic, Tactical and Operational
Roles and Responsibilities
Due Care/Due Diligence
1.4 Determining Compliance and Other Requirements
Contractual, Legal, Industry Standards, and Regulatory Requirements
Privacy
Privacy Continued
1.5 Understanding Legal and Regulatory Issues Regarding Information Security in a Holistic Context
1.6 Understanding Requirements for Investigation Types
Administrative, Criminal, Civil, Regulatory, Industry Standards
1.7 Developing, Documenting, and Implementing Security Policy, Standards, Procedures, and Guidelines
Policies Standards Baselines and Procedures and Guidelines
1.8 Identifying, Analyzing, and Prioritizing Business Continuity (BC) Requirements
Business Continuity Plan (BCP)
Business Impact Analysis (BIA)
1.9 Contributing to and Enforcing Personnel Security Policies and Procedures
Security Awareness Training
Encryption
Defense-in-Depth
Data Classification and Declassification
Change Control
Separation of Duties
Job Rotation and Mandatory Leave
Vulnerabilities, Threats and Risk
Risk Assessment formulas
Risk Responses
Risk Assessment Formulas 2
Computer Crime
Applying Risk Management Concepts: Qualitative, Quantitative, and Hybrid Risks
Types of Controls
Threat Modeling
Cloud Computing: SaaS, PaaS, IaaS
Conducting Risk Assessments
Domain 2: Asset Security
Securing Assets
Sensitive Information
Sanitization of Data
Lesson unavailable
Please
login to your account
or
buy the course
.