429$

71$




Review
    (0)

    5/0.0

Categories
Security

Overview

  • Quizzes No
  • Skill level Advance
  • Language Bangla
  • Duration 12:52:24 H
  • Total Enrollments: 7

Course Description

CISSP validates an information security professional which is deep technical and managerial knowledge and experience to effectively design, engineer, and manage the overall security posture of an organization.  

CISSP is developed by the International Information System Security Certification Consortium, also known as (ISC)²  

Certification

Yes

Learning Outcomes

    ·         You will maximize your earning potential

    ·         You will maximize your career potential

    ·         You will stand tall among your peers

    ·         You will have demonstrated years of hands-on cybersecurity experience

    ·         You will become a member of the largest association of cybersecurity professionals in the world today

Curriculum

Domain 1 (Security and Risk Management)

02:25:59 Hours

    Introduction
    00:19:16
    CISSP Resources and Introduction Continues
    00:11:43
    CIA & IAAA
    00:13:38
    Information Roles & Data Classification
    00:14:43
    Risk Management
    00:17:22
    Controls, Frameworks, DD vs DC
    00:15:49
    Policy, Standard, Baseline, Procedure and Guideline
    00:07:56
    Laws, Intellectual Property
    00:09:33
    Some Important Regulations
    00:12:27
    BCP-DRP-First Part
    00:10:28
    BCP-DRP-Last Part
    00:13:04

Domain 2 (Asset Security)

00:36:10 Hours

    Data Classification
    00:14:48
    Data Remanence, Removal, Scoping and Tailoring
    00:12:06
    Memory, Change and Config Management
    00:09:16

Domain 3 (Security Architecture and Engineering)

02:52:47 Hours

    Cryptography Introduction
    00:08:05
    Cryptography Introduction Part 2
    00:08:05
    Types of Ciphers
    00:09:13
    Types of Cryptography . Symmetric Vs Asymmetric
    00:07:25
    Symmetric Cryptography
    00:11:16
    Asymmetric Cryptography
    00:11:13
    Hashing and Digital Signature
    00:12:25
    PKI and IPSec
    00:08:22
    Cryptographic Implementation and Attacks
    00:11:59
    Security Models
    00:14:57
    Computer System Security
    00:14:35
    Evaluation Criteria and Virtualization
    00:16:06
    Physical Security
    00:13:58
    Locks, Power, HVAC
    00:12:48
    Physical Sensors and Fire Prevention
    00:12:20

Domain 4 (Communication and Network Security)

01:59:47 Hours

    Fundamental Network Concept
    00:10:23
    OSI Model layer 1 2 ,unicast broadcast multicast and any cast traffic
    00:14:36
    OSI model 3 4 vlap, ICMP, Routing, class, Nat and pat
    00:12:30
    OSI layer 5 6 TCP IP and common application layer
    00:14:12
    DNS , Network Attacks
    00:14:12
    Firewalls
    00:09:30
    Security Zones
    00:08:31
    Circuit and Packet Switching Technology
    00:11:08
    VPN and Wireless Intro
    00:12:39
    Wireless Security, Bluetooth
    00:12:06

Domain 5 (Identity and Access Management)

01:29:11 Hours

    Introduction
    00:09:48
    Authentication- Type1 and Type 2
    00:12:04
    IAAA-Type-3, Authorization, Auditing
    00:12:15
    Centralized vs Decentralized and SSO
    00:06:33
    Kerberos
    00:10:30
    SAML, SPML, XACML, 0Auth2.0, Open ID
    00:10:11
    Access Control Models
    00:11:09
    Types of Attacks on Access Control
    00:09:17
    Access Control technologies
    00:07:24

Domain 6 (Security Assessment and Testing)

00:36:38 Hours

    Introduction to Domain 6
    00:10:32
    Vulnerability Assessment and Penetration Testings
    00:14:47
    Software testing
    00:11:19

Domain 7 (Security Operation)

01:52:03 Hours

    Introduction, Incident response, Type of attacks
    00:14:35
    Intrusion Detection System & Intrusion Prevention Systems
    00:16:05
    Logging, Monitoring, Clustering, Raid
    00:20:17
    Back up BCP-DRP introduction
    00:16:59
    BCP-DRP part 2
    00:18:20
    Forensics
    00:16:19
    Computer Attack Types, Enticement, Entrapment, Ethics
    00:09:28

Domain 8 (Software Development Security

00:59:49 Hours

    Introduction
    00:12:29
    SDLC
    00:13:56
    Database
    00:17:37
    Application Attacks and Viruses
    00:15:47




FAQ



Instructor

Reviews

Write your own review

 
Rating