CISSP, Second Edition

Almost 26 hours of deep-dive training covering every objective in the latest (ISC)2 CISSP exam.

Overview
CISSP Complete Video Course is an engaging self-paced video training solution that provides learners with almost 26 hours of personal training from 2017 Cybersecurity Educator of the Year, Sari Greene. With each lesson, Sari fully explains the topics associated with each CISSP exam objective. To reinforce what you’ve learned, each lesson concludes with a 3Sec Challenge to test your knowledge and a Security-in-Action case study to demonstrate how the lesson concepts apply to real-life scenarios. This combination of teaching, testing, and application will ensure that you are prepared to take the CISSP exam.

Description
CISSP Complete Video Course contains almost 26 hours of training with content divided into 9 modules with 65 exam objective—targeted lessons and 106 related sublessons. This title covers every objective in the newly updated (ISC)2 CISSP exam and includes screencast teaching, quizzes, and applied real-world scenarios. Each module also provides one or more 10-question quizzes to solidify your understanding of the content that is covered for each CISSP domain.

The video lessons in this course review each exam objective, so you can use it as a complete study tool for taking the CISSP exam.

Major sections are as follows:

* Security and Risk Management
* Asset Security
* Security Architecture and Engineering
* Communication and Network Security
* Identity and Access Management (IAM)
* Security Assessment and Testing
* Security Operations
* Software Development Security
* Becoming a CISSP

Skill Level
Beginning

What You Will Learn
* Every objective on the (ISC)2 CISSP exam
* Tips to prepare for and pass the exam
* Real-world cybersecurity skills

Who Should Take This Course
Primary audience: Anyone preparing for the (ISC)2 CISSP examination.
Secondary audience: Anyone interested in pursuing a career in cybersecurity.

About LiveLessons Video Training
Pearson’s LiveLessons video training series publishes the industry’s leading video tutorials for IT pros, developers, sys admins, devops, network engineers, and certification candidates. LiveLessons feature the highest-quality professional skills training led by recognized author instructors published by Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include IT certification, programming, development, networking, software skills for the home, office, and business, and more. Your purchase provides you with lifetime online access to the content.

http://www.pearsonitcertification.com/livelessons


Your Instructor


Sari Greene
Sari Greene

Sari Greene is an information security practitioner, author, and entrepreneur. In 2003, Sari founded one of the first dedicated cybersecurity consultancies. She is a recognized leader in the field of cybersecurity and has amassed thousands of hours in the field working with a spectrum of technical, operational, compliance and management personnel as well as board of directors, regulators, service providers, and law enforcement agencies.

Sari’s first text was Tools and Techniques for Securing Microsoft Networks, commissioned by Microsoft to train its partner channel, followed soon after by the first edition of Security Policies and Procedures: Principles and Practices. The second edition of Security Program and Policies: Principles and Practices is currently being used in undergraduate and graduate programs nationwide. She is also the author and presenter of the best-selling CISSP Complete Video Course, CISSP Exam Prep Video Course, and CISA Complete Video Course. Sari has published a number of articles related to cybersecurity; has been quoted in The New York Times, The Wall Street Journal, CNN, and on CNBC; speaks regularly at cybersecurity, legal, financial and healthcare conferences and workshops around the country; and is a frequent guest lecturer.

Sari serves on the Bangor Savings Bank Board of Directors, and is chair of the Enterprise Risk Management Committee. She provided expert witness testimony in the groundbreaking PATCO v. Ocean National Bank case, represents industry on the Massachusetts Bankers Association Cybersecurity Task Force, and is a member of the American Bankers Association cybersecurity faculty.

Sari earned her MBA from the University of New Hampshire system. She holds multiple industry accreditations including CISSP-ISSMP, CRISC, CISM, CISA, MCSE, and NSA/IAM. She is also certified in Offshore Emergency Medicine. Learn more at sarigreene.com.


Class Curriculum


  Introduction
Available in days
days after you enroll
  Module 1: Domain 1 Security and Risk Management
Available in days
days after you enroll
  Lesson 1: Understand and Apply Concepts of Confidentiality, Integrity and Availability
Available in days
days after you enroll
  Lesson 2: Evaluate and Apply Security Governance Principles
Available in days
days after you enroll
  Lesson 4: Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context
Available in days
days after you enroll
  Lesson 5: Understand, Adhere to and Promote Professional Ethics
Available in days
days after you enroll
  Lesson 6: Develop, Document and Implement Security Policy, Standards, Procedures and Guidelines
Available in days
days after you enroll
  Lesson 7: Identify, Analyze, and Prioritize Business Continuity (BC) Requirements
Available in days
days after you enroll
  Lesson 8: Contribute to and Enforce Personnel Security Policies and Procedures Learning objectives
Available in days
days after you enroll
  Lesson 10: Understand and Apply Threat Modeling Concepts and Methodologies
Available in days
days after you enroll
  Lesson 11: Apply Risk Management Concepts to the Supply Chain
Available in days
days after you enroll
  Lesson 12: Establish and Maintain a Security Awareness, Education, and Training Program
Available in days
days after you enroll
  Module 2 Domain 2 Asset Security
Available in days
days after you enroll
  Lesson 13: Identify and Classify Information and Assets
Available in days
days after you enroll
  Lesson 14: Determine and Maintain Information and Asset Ownership
Available in days
days after you enroll
  Lesson 15: Protect Privacy
Available in days
days after you enroll
  Lesson 16: Ensure Appropriate Asset Retention
Available in days
days after you enroll
  Lesson 17: Determine Data Security Controls
Available in days
days after you enroll
  Lesson 18: Establish Information and Asset Handling Requirements
Available in days
days after you enroll
  Module 3 Domain 3 Security Architecture and Engineering
Available in days
days after you enroll
  Lesson 19: Implement and Manage Engineering Processes Using Secure Design Principles
Available in days
days after you enroll
  Lesson 20: Understand the Fundamental Concepts of Security Models
Available in days
days after you enroll
  Lesson 21: Select Controls Based Upon Systems Security Requirements
Available in days
days after you enroll
  Lesson 22: Understand Security Capabilities of Information Systems
Available in days
days after you enroll
  Lesson 23: Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Available in days
days after you enroll
  Lesson 24: Assess and Mitigate Vulnerabilities in Web-based Systems
Available in days
days after you enroll
  Lesson 25: Assess and Mitigate Vulnerabilities in Mobile Systems
Available in days
days after you enroll
  Lesson 26: Assess and Mitigate Vulnerabilities in Embedded Systems
Available in days
days after you enroll
  Lesson 28: Apply Security Principles to Site and Facility Design
Available in days
days after you enroll
  Module 4 Domain 4 Communication and Network Security
Available in days
days after you enroll
  Module 5 Domain 5 Identity and Access Management (IAM)
Available in days
days after you enroll
  Lesson 33: Control Physical and Logical Access to Assets
Available in days
days after you enroll
  Lesson 34: Manage Identification and Authentication of People, Devices, and Services
Available in days
days after you enroll
  Lesson 35: Integrate Identify as a Third-party Service
Available in days
days after you enroll
  Lesson 36: Implement and Manage Authorization Mechanisms
Available in days
days after you enroll
  Lesson 37: Manage the Identity and Access Provisioning Lifecycle
Available in days
days after you enroll
  Module 6 Domain 6 Security Assessment and Testing
Available in days
days after you enroll
  Lesson 38: Design and Validate Assessment, Test, and Audit Strategies
Available in days
days after you enroll
  Lesson 39: Conduct Security Control Testing
Available in days
days after you enroll
  Lesson 41: Analyze Test Output and Generate Report
Available in days
days after you enroll
  Module 7 Domain 7 Security Operations
Available in days
days after you enroll
  Lesson 43: Understand and Support Investigations
Available in days
days after you enroll
  Lesson 44: Understand Requirements for Investigation Types
Available in days
days after you enroll
  Lesson 45: Conduct Logging and Monitoring Activities
Available in days
days after you enroll
  Lesson 46: Securely Provisioning Resources
Available in days
days after you enroll
  Lesson 47: Understand and Apply Foundational Security Operations Concepts
Available in days
days after you enroll
  Lesson 48: Apply Resource Protection Techniques
Available in days
days after you enroll
  Lesson 52: Understand and Participate in Change Management Processes
Available in days
days after you enroll
  Lesson 54: Implement Disaster Recovery (DR) Processes
Available in days
days after you enroll
  Lesson 55: Test Disaster Recovery Plans (DRP)
Available in days
days after you enroll
  Lesson 56: Participate in Business Continuity (BC) Planning and Exercises
Available in days
days after you enroll
  Lesson 57: Implement and Manage Physical Security
Available in days
days after you enroll
  Lesson 58: Address Personnel Safety and Security Concerns
Available in days
days after you enroll
  Module 8 Domain 8 Software Development Security
Available in days
days after you enroll
  Lesson 59: Understand and Integrate Security in the Software Development Life Cycle (SDLC)
Available in days
days after you enroll
  Lesson 60: Identify and Apply Security Controls in Development Environments
Available in days
days after you enroll
  Lesson 61: Assess the Effectiveness of Software Security
Available in days
days after you enroll
  Lesson 62: Assess Security impact of Acquired Software
Available in days
days after you enroll
  Module 9: Becoming a CISSP
Available in days
days after you enroll
  Summary
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Get started now!