CISSP Lesson 1 Security and Risk Managementseeders: 1
leechers: 1
CISSP Lesson 1 Security and Risk Management (Size: 2.44 GB)
Description
Overview
CISSP Complete Video Course is an engaging self-paced video training solution that provides learners with 24 hours of personal, visual instruction from an expert trainer who has more than a decade of practical teaching experience. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of the new April 2015 revised CBK and CISSP exam as well as a deeper understanding of security, allowing you to master the key foundational principles for securing a network and managing risk. Description CISSP Complete Video Course contains 24 hours of training with content divided into 9 lessons with 94 video sub-lessons. The videos consist of live trainer discussions, screencasts, animations, and live demos. The video lessons in this course review each exam objective so you can use this course as a complete study tool for taking the CISSP exam. Instruction throughout offers detailed explanations, demos, tips, and more. Also includes end-of-lesson quizzes and a full practice exam. Major sections are as follows: Lesson 1: Security and Risk Management Lesson 2: Asset Security Lesson 3: Security Engineering Lesson 4: Communications and Network Security Lesson 5: Identity and Access Management Lesson 6: Security Assessment and Testing Lesson 7: Security Operations Lesson 8: Software Development Security Lesson 9: Preparing for the Exam About the Instructor Sari Greene is an information security practitioner, author, and entrepreneur. She founded Sage Data Security in 2002 and has amassed thousands of hours in the field, working with a spectrum of technical, operational, and management personnel, as well as boards of directors, regulators, and service providers. Sari provided expert witness testimony in the groundbreaking PATCO v. Ocean National Bank case. From 2006 through 2010, she served as the managing director for the MEAPC, a coalition of 24 financial institutions that embrace a mission of preventing information theft and fraud through public education and awareness. Since 2010, she has served as the chair of the annual Cybercrime Symposium held in Portsmouth, New Hampshire. Sari’s first text was Tools and Techniques for Securing Microsoft Networks, commissioned by Microsoft to train its partner channel, followed soon after by the first edition of Security Policies and Procedures: Principles and Practices. She has published a number of articles and whitepapers related to information security and has been quoted in The New York Times, Wall Street Journal, CNN, and on CNBC. She speaks regularly at security conferences and workshops around the country and is a frequent guest lecturer. Sari has an MBA from the University of New Hampshire system and has earned an array of government and industry certifications and accreditations, including ISACA Certification in Risk and Information Systems Control (CRISC), ISACA Certification in Security Management (CISM), (ISC)2 Certification in Information Systems Security (CISSP), and Microsoft Certified Network Engineer (MCSE), and is certified by the National Security Agency to conduct NSA-IAM assessments for federal government agencies and contractors. You can contact Sari at sari@sarigreene.com or follow her on Twitter at @sari_greene. Skill Level Beginning to intermediate Who Should Take This Course Primary audience: CISSP certification candidates Secondary audience: Anyone in an information security role looking to gain a practical understanding of computer security, including administrators, technicians, and network engineers who are responsible for securing IT infrastructure; personnel in management or sales roles who deal with information security topics; or government workers and contractors looking to work in security. Course Requirements Five years of experience in IT networking, network storage, or data center administration Table of Contents Lesson 1: Security and Risk Management Learning Objectives, Part 1 1.1: Examining Information Security Fundamentals 1.2: Applying Security Governance Concepts–Part 1 1.3: Applying Security Governance Concepts–Part 2 1.4: Designing and Implementing Governance Documents 1.5: Understanding Legal Systems and Related Laws–Part 1 1.6: Understanding Legal Systems and Related Laws–Part 2 1.7: Understanding Regulatory and Contractual Requirements–Part 1 1.8: Understanding Regulatory and Contractual Requirements–Part 2 1.9: Implementing Personnel Security 1.10: Implementing Third-Party Security Mid-Lesson Exam Review Learning Objectives, Part 2 1.11: Understanding and Applying Threat Modeling 1.12: Understanding & Implementing Risk Management Concepts 1.13: Exploring Risk Assessment Methodologies 1.14: Conducting a Quantitative Risk Assessment 1.15: Conducting a Qualitative Risk Assessment 1.16: Selecting Controls and Countermeasures 1.17: Managing Supply Chain Risk 1.18: Implementing Business Continuity Risk Management End of Lesson Review Sharing Widget |