CISSP Lesson 1 Security and Risk Management

seeders: 1
leechers: 1
Added on March 8, 2016 by bardin Other > Tutorials
Torrent verified.



CISSP Lesson 1 Security and Risk Management (Size: 2.44 GB)
 Lesson 1- Security and Risk Management - CISSP.flv11.78 MB
 1.5 Understanding Legal Systems and Related Laws--Part 1 - CISSP.flv57.82 MB
 1.10 Implementing Third-Party Security - CISSP.flv73.9 MB
 1.10 Implementing Third-Party Security - CISSP_2.flv73.9 MB
 1.7 Understanding Regulatory and Contractual Requirements--Part 1 - CISSP.flv81.15 MB
 1.13 Exploring Risk Assessment Methodologies - CISSP.flv85.24 MB
 1.11 Understanding and Applying Threat Modeling - CISSP.flv99.24 MB
 1.17 Managing Supply Chain Risk - CISSP.flv100.83 MB
 1.2 Applying Security Governance Concepts--Part 1 - CISSP.flv105.85 MB
 1.6 Understanding Legal Systems and Related Laws--Part 2 - CISSP.flv114.83 MB
 1.1 Examining Information Security Fundamentals - CISSP.flv123.58 MB
 1.8 Understanding Regulatory and Contractual Requirements--Part 2 - CISSP.flv124.41 MB
 1.3 Applying Security Governance Concepts--Part 2 - CISSP.flv132.19 MB
 1.18 Implementing Business Continuity Risk Management - CISSP.flv134.13 MB
 1.16 Selecting Controls and Countermeasures - CISSP.flv147.4 MB
 1.12 Understanding & Implementing Risk Management Concepts - CISSP.flv151.37 MB
 1.9 Implementing Personnel Security - CISSP.flv158.4 MB
 End of Lesson Review - CISSP.flv171.56 MB
 1.4 Designing and Implementing Governance Documents - CISSP.flv172.92 MB
 1.15 Conducting a Qualitative Risk Assessment - CISSP.flv190.02 MB
 1.14 Conducting a Quantitative Risk Assessment - CISSP.flv191.56 MB

Description

Overview

CISSP Complete Video Course is an engaging self-paced video training solution that provides learners with 24 hours of personal, visual instruction from an expert trainer who has more than a decade of practical teaching experience. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of the new April 2015 revised CBK and CISSP exam as well as a deeper understanding of security, allowing you to master the key foundational principles for securing a network and managing risk.

Description

CISSP Complete Video Course contains 24 hours of training with content divided into 9 lessons with 94 video sub-lessons. The videos consist of live trainer discussions, screencasts, animations, and live demos. The video lessons in this course review each exam objective so you can use this course as a complete study tool for taking the CISSP exam. Instruction throughout offers detailed explanations, demos, tips, and more. Also includes end-of-lesson quizzes and a full practice exam.

Major sections are as follows:

Lesson 1: Security and Risk Management

Lesson 2: Asset Security

Lesson 3: Security Engineering

Lesson 4: Communications and Network Security

Lesson 5: Identity and Access Management

Lesson 6: Security Assessment and Testing

Lesson 7: Security Operations

Lesson 8: Software Development Security

Lesson 9: Preparing for the Exam

About the Instructor

Sari Greene is an information security practitioner, author, and entrepreneur. She founded Sage Data Security in 2002 and has amassed thousands of hours in the field, working with a spectrum of technical, operational, and management personnel, as well as boards of directors, regulators, and service providers. Sari provided expert witness testimony in the groundbreaking PATCO v. Ocean National Bank case. From 2006 through 2010, she served as the managing director for the MEAPC, a coalition of 24 financial institutions that embrace a mission of preventing information theft and fraud through public education and awareness. Since 2010, she has served as the chair of the annual Cybercrime Symposium held in Portsmouth, New Hampshire. Sari’s first text was Tools and Techniques for Securing Microsoft Networks, commissioned by Microsoft to train its partner channel, followed soon after by the first edition of Security Policies and Procedures: Principles and Practices. She has published a number of articles and whitepapers related to information security and has been quoted in The New York Times, Wall Street Journal, CNN, and on CNBC. She speaks regularly at security conferences and workshops around the country and is a frequent guest lecturer. Sari has an MBA from the University of New Hampshire system and has earned an array of government and industry certifications and accreditations, including ISACA Certification in Risk and Information Systems Control (CRISC), ISACA Certification in Security Management (CISM), (ISC)2 Certification in Information Systems Security (CISSP), and Microsoft Certified Network Engineer (MCSE), and is certified by the National Security Agency to conduct NSA-IAM assessments for federal government agencies and contractors. You can contact Sari at sari@sarigreene.com or follow her on Twitter at @sari_greene.

Skill Level

Beginning to intermediate

Who Should Take This Course

Primary audience: CISSP certification candidates

Secondary audience: Anyone in an information security role looking to gain a practical understanding of computer security, including administrators, technicians, and network engineers who are responsible for securing IT infrastructure; personnel in management or sales roles who deal with information security topics; or government workers and contractors looking to work in security.

Course Requirements

Five years of experience in IT networking, network storage, or data center administration

Table of Contents

Lesson 1: Security and Risk Management

Learning Objectives, Part 1

1.1: Examining Information Security Fundamentals

1.2: Applying Security Governance Concepts–Part 1

1.3: Applying Security Governance Concepts–Part 2

1.4: Designing and Implementing Governance Documents

1.5: Understanding Legal Systems and Related Laws–Part 1

1.6: Understanding Legal Systems and Related Laws–Part 2

1.7: Understanding Regulatory and Contractual Requirements–Part 1

1.8: Understanding Regulatory and Contractual Requirements–Part 2

1.9: Implementing Personnel Security

1.10: Implementing Third-Party Security

Mid-Lesson Exam Review

Learning Objectives, Part 2

1.11: Understanding and Applying Threat Modeling

1.12: Understanding & Implementing Risk Management Concepts

1.13: Exploring Risk Assessment Methodologies

1.14: Conducting a Quantitative Risk Assessment

1.15: Conducting a Qualitative Risk Assessment

1.16: Selecting Controls and Countermeasures

1.17: Managing Supply Chain Risk

1.18: Implementing Business Continuity Risk Management

End of Lesson Review

Sharing Widget


Download torrent
2.44 GB
seeders:1
leechers:1
CISSP Lesson 1 Security and Risk Management