CISSP Certification: Domains 5, 6, 7 & 8 Video Training-2020

  • 0.0
6.5 hours on-demand video
$ 12.99

Brief Introduction

Invest in the CISSP Certification (Domain 5, 6,7 & 8) Training Course: Video, downloadable slides & practice questions

Description

In this CISSP Domain 5, 6, 7 and 8 video training course, I will provide you the knowledge, experience and practical skills you need to pass the CISSP certification. In addition, you will get my years of experience (Over 18 years) as I translate CISSP training requirements into real-world examples.

Included in this course:

CISSP Domain 5 Videos

  • Full CISSP Domain 5 Videos (1.1 hours)

    • 5 Sections - 8 Videos

  • Slides available to download for Domain 5 (63 pages)

  • 10 CISSP practice questions

CISSP Domain 6 Videos

  • Full CISSP Domain 6 Videos (1.0 hours)

    • 5 Sections - 7 Videos

  • Slides available to download for Domain 6 (50 pages)

  • 10 CISSP practice questions

CISSP Domain 7 Videos

  • Full CISSP Domain 7 Videos (3 hours)

    • 14 Sections - 22 Videos

  • Slides available to download for Domain 7 (147 pages)

  • 10 CISSP practice questions

CISSP Domain 8 Videos

  • Full CISSP Domain 8 Videos

    • 5 Sections - 8 Videos

  • Slides available to download for Domain 8 (55 pages)

  • 10 CISSP practice questions

The curriculum in this course covers the content that will be on the most current CISSP exam (April 2018). Each objective that is required for the CISSP exam will be covered in varying degrees of complexity and competency. The next upgrade to the CISSP curriculum/exam will occur in 2021.

In Domain 5 we will cover:

  • Control Physical and Logical Access to Assets

    • Information

    • Systems

    • Devices

    • Facilities

  • Manage Identification and Authentication of People, Devices, and Services

    • Identity management implementation

    • Single/multi-factor authentication

    • Accountability

    • Session management

    • Registration and proofing of identity

    • Federated Identity Management (FIM)

    • Credential management systems

  • Integrate Identity as a Third-party Service

    • On-premise

    • Cloud

    • Federated

  • Implement and Manage Authorization Mechanisms

    • Role Based Access Control (RBAC)

    • Rule-based Access control

    • Mandatory Access Control (MAC)

    • Discretionary Access Control (DAC)

    • Attribute Based Access Control (ABAC)

  • Manage the Identity and Access Provisioning Lifecycle

    • User access review

    • System account access review

    • Provisioning and deprovisioning

In Domain 6 we will cover:

  • Design and Validate Assessment, Test, and Audit Strategies

    • Internal

    • External

    • Third Party

  • Conduct Security Control Testing

    • Vulnerability Assessment

    • Penetration Testing

    • Log Reviews

    • Synthetic Transactions

    • Code Review and Testing

    • Misuse Case Testing

    • Test Coverage Analysis

    • Interface Testing

  • Collect Security Process Data (e.g., Technical and Administrative)

    • Account Management

    • Management Review and Approval

    • Key Performance and Risk Indicators

    • Backup Verification Data

    • Training and Awareness

    • Disaster Recovery (DR) and Business Continuity (BC)

  • Analyze Test Output and Generate Report

  • Conduct or Facilitate Security Audits

    • Internal

    • External

    • Third-Party

In Domain 7 we will cover:

  • Understand and Support Investigations

    • Evidence Collection and Handling

    • Reporting and Documentation

    • Investigative Techniques

    • Digital Forensics Tools, Tactics, and Procedures

  • Understand Requirements for Investigation Types

    • Administrative

    • Criminal

    • Civil

    • Regulatory

    • Industry Standards

  • Conduct Logging and Monitoring Activities

    • Intrusion Detection and Prevention

    • Security Information and Event Management

    • Continuous Monitoring

    • Egress Monitoring

  • Securely Provisioning Resources

    • Asset Inventory

    • Asset Management

    • Configuration Management

  • Understand and Apply Foundational Security Ops Concepts

    • "Need-To-Know" / Least Privileges

    • Separation of Duties and Responsibilities

    • Privileged Account Management

    • Job Rotation

    • Information Lifecycle

    • Service Level Agreements (SLA)

  • Apply Resource Protection Techniques

    • Media Management

    • Hardware and Software Asset Management

  • Conduct Incident Management

    • Detection

    • Response

    • Mitigation

    • Reporting

    • Recovery

    • Remediation

    • Lessons Learned

  • Operate and Maintain Detective and Preventative Measures

    • Firewalls

    • Intrusion Detection and Prevention Systems

    • Whitelisting/Blacklisting

    • Third-Party Provided Security Services

    • Sandboxing

  • Implement and Support Patch and Vulnerability Management

  • Understand and Participate in Change Management Processes

  • Implement Recovery Strategies

    • Backup Storage Strategies

    • Recovery Site Strategies

    • Multiple Processing Sites

    • System Resilience, High Availability, Quality of Service (QOS), and Fault Tolerance

  • Implement Disaster Recovery (DR) Processes

    • Response

    • Personnel

    • Communications

    • Assessment

    • Restoration

    • Training and Awareness

  • Test Disaster Recovery Plans (DRP)

    • Read-Through/Checklist

    • Structured Walk-Through (Table-Top)

    • Simulation Test

    • Parallel Test

    • Full Interruption Test

  • Participate in Business Continuity (BC) Planning and Exercises

  • Implement and Manage Physical Security

    • Perimeter Security Controls

    • Internal Security Controls

  • Address Personnel Safety and Security Concerns

    • Travel

    • Security Training and Awareness

    • Emergency Management

    • Duress

In Domain 8 we will cover:

  • Design and Validate Assessment, Test, and Audit Strategies

    • Internal

    • External

    • Third Party

  • Conduct Security Control Testing

    • Vulnerability Assessment

    • Penetration Testing

    • Log Reviews

    • Synthetic Transactions

    • Code Review and Testing

    • Misuse Case Testing

    • Test Coverage Analysis

    • Interface Testing

  • Collect Security Process Data (e.g., Technical and Administrative)

    • Account Management

    • Management Review and Approval

    • Key Performance and Risk Indicators

    • Backup Verification Data

    • Training and Awareness

    • Disaster Recovery (DR) and Business Continuity (BC)

  • Analyze Test Output and Generate Report

  • Conduct or Facilitate Security Audits

    • Internal

    • External

    • Third-Party

Notes / Disclaimers:

  • In order for you to pass the CISSP test you need to have the substantial knowledge through experience and knowledge.

  • The test was originally written in English, but there are other language versions available

  • Answering the questions you need to consider the "perfect world" scenario and that work around options may be technically correct, but they may not meet (ISC)2 point of view

  • You need to be able to spot the keywords (DR, BCP, Policy, Standards, etc.) as well as the indicators (First, Best, Last, Least, Most)

  • Understand and answer every question from the Manager, CISO, or Risk Advisers Point of View (PoV). Answering the questions from a CIO or technical perspective will place your thinking too high or down in the weeds too far.

  • Understand that you are to answer the questions based on being proactive within your environment. Enable a Vulnerability Management Program before you have vulnerability issues.

  • The English version of the CISSP exam, utilizes the Computerized Adaptive Testing (CAT) format and is 3 hours long with 100-150 questions

  • Most people studying for CISSP certification will various media sources, test banks, and various books to enhance their test taking experience.

  • Don’t rely on one source to teach you all that you need to know for the CISSP….Invest in multiple training opportunities. The future payoff is worth the time and energy.

Requirements

  • Requirements
  • Desire to pass the Information Systems Security Professional CISSP Certification Exam and not sure how to do it
  • Desire to gain more insight and knowledge around IT, Information, and Cyber Security from a management/senior leader perspective
$ 12.99
English
Available now
6.5 hours on-demand video
Shon Gerber
Udemy

Instructor

Share
Saved Course list
Cancel
Get Course Update
Computer Courses