TECHXTREME

Kharghar, Navi Mumbai, India

Email : info@techxtreme.co & rajeshpc@techxtreme.co

Please reload

Recent Posts

Pearson IT Certification - CISSP Complete Video Course

December 10, 2017

 

Duration
24 Hours of Video Instruction


Overview

CISSP Complete Video Course is an engaging self-paced video training solution that provides learners with 24 hours of personal, visual instruction from an expert trainer who has more than a decade of practical teaching experience. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of the new April 2015 revised CBK and CISSP exam as well as a deeper understanding of security, allowing you to master the key foundational principles for securing a network and managing risk.


Description

CISSP Complete Video Course contains 24 hours of training with content divided into 9 lessons with 94 video sub-lessons. The videos consist of live trainer discussions, screencasts, animations, and live demos. The video lessons in this course review each exam objective so you can use this course as a complete study tool for taking the CISSP exam. Instruction throughout offers detailed explanations, demos, tips, and more. Also includes end-of-lesson quizzes and a full practice exam.


Major sections are as follows:

  1. Lesson 1: Security and Risk Management

  2. Lesson 2: Asset Security

  3. Lesson 3: Security Engineering

  4. Lesson 4: Communications and Network Security

  5. Lesson 5: Identity and Access Management

  6. Lesson 6: Security Assessment and Testing

  7. Lesson 7: Security Operations

  8. Lesson 8: Software Development Security

  9. Lesson 9: Preparing for the Exam


About the Instructor

Sari Greene is an information security practitioner, author, and entrepreneur. She founded Sage Data Security in 2002 and has amassed thousands of hours in the field, working with a spectrum of technical, operational, and management personnel, as well as boards of directors, regulators, and service providers. Sari provided expert witness testimony in the groundbreaking PATCO v. Ocean National Bank case. From 2006 through 2010, she served as the managing director for the MEAPC, a coalition of 24 financial institutions that embrace a mission of preventing information theft and fraud through public education and awareness. Since 2010, she has served as the chair of the annual Cybercrime Symposium held in Portsmouth, New Hampshire. Sariâ™s first text was Tools and Techniques for Securing Microsoft Networks, commissioned by Microsoft to train its partner channel, followed soon after by the first edition of Security Policies and Procedures: Principles and Practices. She has published a number of articles and whitepapers related to information security and has been quoted in The New York Times, Wall Street Journal, CNN, and on CNBC. She speaks regularly at security conferences and workshops around the country and is a frequent guest lecturer. Sari has an MBA from the University of New Hampshire system and has earned an array of government and industry certifications and accreditations, including ISACA Certification in Risk and Information Systems Control (CRISC), ISACA Certification in Security Management (CISM), (ISC)2 Certification in Information Systems Security (CISSP), and Microsoft Certified Network Engineer (MCSE), and is certified by the National Security Agency to conduct NSA-IAM assessments for federal government agencies and contractors. You can contact Sari at [email protected] or follow her on Twitter at @sari_greene.


Skill Level;
Beginning to intermediate


Who Should Take This Course;
Primary audience: CISSP certification candidates

Secondary audience: Anyone in an information security role looking to gain a practical understanding of computer security, including administrators, technicians, and network engineers who are responsible for securing IT infrastructure; personnel in management or sales roles who deal with information security topics; or government workers and contractors looking to work in security.


Course Requirements;
Five years of experience in IT networking, network storage, or data center administration

 

Files

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.14 Conducting a Quantitative Risk Assessment - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.15 Conducting a Qualitative Risk Assessment - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.4 Designing and Implementing Governance Documents - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/End of Lesson Review - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.9 Implementing Personnel Security - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.12 Understanding & Implementing Risk Management Concepts - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.16 Selecting Controls and Countermeasures - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.18 Implementing Business Continuity Risk Management - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.3 Applying Security Governance Concepts--Part 2 - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.8 Understanding Regulatory and Contractual Requirements--Part 2 - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.1 Examining Information Security Fundamentals - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.6 Understanding Legal Systems and Related Laws--Part 2 - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.2 Applying Security Governance Concepts--Part 1 - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.17 Managing Supply Chain Risk - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.11 Understanding and Applying Threat Modeling - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.13 Exploring Risk Assessment Methodologies - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.7 Understanding Regulatory and Contractual Requirements--Part 1 - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.10 Implementing Third-Party Security - CISSP_2.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.10 Implementing Third-Party Security - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/1.5 Understanding Legal Systems and Related Laws--Part 1 - CISSP.mp4

  • CISSP Complete Video Course/Lesson 1 Security and Risk Management/Lesson 1- Security and Risk Management - CISSP.mp4

  • CISSP Complete Video Course/Lesson 2 Asset Security/End of Lesson Review - CISSP_2.mp4

  • CISSP Complete Video Course/Lesson 2 Asset Security/2.4 Ensuring Appropriate Retention and Destruction - CISSP.mp4

  • CISSP Complete Video Course/Lesson 2 Asset Security/2.1 Classifying Assets - CISSP.mp4

  • CISSP Complete Video Course/Lesson 2 Asset Security/2.5 Determining Data Security Controls - CISSP.mp4

  • CISSP Complete Video Course/Lesson 2 Asset Security/2.3 Protecting Data Privacy - CISSP.mp4

  • CISSP Complete Video Course/Lesson 2 Asset Security/2.2 Managing Assets - CISSP.mp4

  • CISSP Complete Video Course/Lesson 2 Asset Security/Lesson 2 - Asset Security - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.10 Applying Cryptography--Encryption Part 1 - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.11 Applying Cryptography--Encryption Part 2 - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.16 Applying Secure Principles to Site and Facility Design - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.9 Introducing Cryptography - CISSP_2.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/End of Lesson Review - CISSP_3.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.17 Securing Information Processing Facilities and Equipment - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.14 Applying Cryptography--Cryptographic Protocols - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.13 Applying Cryptography--Hashing and Digital Signature - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.1 Implementing Secure Design Principles - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.12 Applying Cryptography--Public Key Infrastructure - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.2 Understanding Security Models - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.4 Recognizing Information Systems Security Capabilities - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.5 Assessing and Mitigating Security Architecture Vulnerabilities - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.3 Selecting Controls Based on Systems Security Evaluation Models - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.8 Assessing and Mitigating Mobile and Remote Computing Vulnerabilities - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.9 Introducing Cryptography - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.6 Assessing and Mitigating Cloud Vulnerabilities - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.7 Assessing and Mitigating Web Vulnerabilities - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/3.15 Applying Cryptography--Crypto Attacks - CISSP.mp4

  • CISSP Complete Video Course/Lesson 3 Security Engineering/Lesson 3- Security Engineering - CISSP.mp4

  • CISSP Complete Video Course/Lesson 4 Communications and Network Security/4.10 Preventing and Mitigating Network Attacks - CISSP.mp4

  • CISSP Complete Video Course/Lesson 4 Communications and Network Security/4.1 Reviewing OSI and TCP_IP Models - CISSP.mp4

  • CISSP Complete Video Course/Lesson 4 Communications and Network Security/4.5 Securing Network Access - CISSP.mp4

  • CISSP Complete Video Course/Lesson 4 Communications and Network Security/4.8 Securing Virtual Private Networks - CISSP.mp4

  • CISSP Complete Video Course/Lesson 4 Communications and Network Security/4.9 Securing Endpoints - CISSP.mp4

  • CISSP Complete Video Course/Lesson 4 Communications and Network Security/4.6 Securing Data Transmissions - CISSP.mp4

  • CISSP Complete Video Course/Lesson 4 Communications and Network Security/End of Lesson Review - CISSP_4.mp4

  • CISSP Complete Video Course/Lesson 4 Communications and Network Security/4.7 Securing Multimedia Collaboration - CISSP.mp4

  • CISSP Complete Video Course/Lesson 4 Communications and Network Security/4.3 Securing Wireless Networks - CISSP.mp4

  • CISSP Complete Video Course/Lesson 4 Communications and Network Security/4.2 Understanding IP Convergence and Extensibility - CISSP.mp4

  • CISSP Complete Video Course/Lesson 4 Communications and Network Security/4.4 Using Cryptography to Maintain Communication Security - CISSP.mp4

  • CISSP Complete Video Course/Lesson 4 Communications and Network Security/Lesson 4- Communications and Network Security - CISSP.mp4

  • CISSP Complete Video Course/Lesson 5 Identity and Access Management/5.3 Understanding Authentication Options - CISSP.mp4

  • CISSP Complete Video Course/Lesson 5 Identity and Access Management/5.2 Examining Identification Schemas - CISSP.mp4

  • CISSP Complete Video Course/Lesson 5 Identity and Access Management/5.1 Understanding Access Control Fundamentals - CISSP.mp4

  • CISSP Complete Video Course/Lesson 5 Identity and Access Management/5.5 Implementing Access and Authorization Criteria - CISSP.mp4

  • CISSP Complete Video Course/Lesson 5 Identity and Access Management/5.7 Implementing Access Control Techniques and Technologies - CISSP.mp4

  • CISSP Complete Video Course/Lesson 5 Identity and Access Management/5.4 Understanding Authentication Systems - CISSP.mp4

  • CISSP Complete Video Course/Lesson 5 Identity and Access Management/5.6 Implementing Access Control Models - CISSP.mp4

  • CISSP Complete Video Course/Lesson 5 Identity and Access Management/5.8 Identity and Accessing Provisioning - CISSP.mp4

  • CISSP Complete Video Course/Lesson 5 Identity and Access Management/End of Lesson Review - CISSP_5.mp4

  • CISSP Complete Video Course/Lesson 5 Identity and Access Management/Lesson 5- Identity and Access Management - CISSP.mp4

  • CISSP Complete Video Course/Lesson 6 Security Assessment and Testing/6.4 Conducting Security Testing--Target Identificaton - CISSP.mp4

  • CISSP Complete Video Course/Lesson 6 Security Assessment and Testing/6.7 Understanding Log Analysis - CISSP.mp4

  • CISSP Complete Video Course/Lesson 6 Security Assessment and Testing/6.1 Testing and Examination (T&E) Overview - CISSP.mp4

  • CISSP Complete Video Course/Lesson 6 Security Assessment and Testing/6.8 Implementing Information Security Continuous Monitoring (ISCM) - CISSP.mp4

  • CISSP Complete Video Course/Lesson 6 Security Assessment and Testing/6.6 Security Assessment Testing--Penetration Testing - CISSP.mp4

  • CISSP Complete Video Course/Lesson 6 Security Assessment and Testing/6.9 Understanding Third-Party Audits and Examinations - CISSP.mp4

  • CISSP Complete Video Course/Lesson 6 Security Assessment and Testing/6.2 Security Assessment Planning - CISSP.mp4

  • CISSP Complete Video Course/Lesson 6 Security Assessment and Testing/6.3 Conducting Security Examinations - CISSP.mp4

  • CISSP Complete Video Course/Lesson 6 Security Assessment and Testing/End of Lesson Review - CISSP_6.mp4

  • CISSP Complete Video Course/Lesson 6 Security Assessment and Testing/6.5 Conducting Security Testing--Password Cracking - CISSP.mp4

  • CISSP Complete Video Course/Lesson 6 Security Assessment and Testing/Lesson 6- Security Assessment and Testing - CISSP.mp4

  • CISSP Complete Video Course/Lesson 7 Security Operations/7.13 Supporting Incident Management - CISSP.mp4

  • CISSP Complete Video Course/Lesson 7 Security Operations/7.4 Implementing and Supporting Vulnerability and Patch Management - CISSP.mp4

  • CISSP Complete Video Course/Lesson 7 Security Operations/7.2 Operating and Maintaining Firewalls and IDS_IPS - CISSP.mp4

  • CISSP Complete Video Course/Lesson 7 Security Operations/7.5 Implementing and Supporting Malware Management - CISSP.mp4

  • CISSP Complete Video Course/Lesson 7 Security Operations/7.11 Understanding and Supporting Investigations - CISSP.mp4

  • CISSP Complete Video Course/Lesson 7 Security Operations/7.10 Managing DR Plan Maintenance - CISSP.mp4

  • CISSP Complete Video Course/Lesson 7 Security Operations/7.12 Understanding Digital Forensics - CISSP.mp4

  • CISSP Complete Video Course/Lesson 7 Security Operations/7.1 Managing Privileged Accounts - CISSP.mp4

  • CISSP Complete Video Course/Lesson 7 Security Operations/7.3 Conducting Logging and Monitoring Activities - CISSP.mp4

  • CISSP Complete Video Course/Lesson 7 Security Operations/7.14 Securing People and Places - CISSP.mp4

  • CISSP Complete Video Course/Lesson 8 Software Development Security/8.3 Understanding Source Code Security Issues - CISSP.mp4

  • CISSP Complete Video Course/Lesson 8 Software Development Security/8.4 Managing Database Security - CISSP.mp4

  • CISSP Complete Video Course/Lesson 8 Software Development Security/End of Lesson Review - CISSP_8.mp4

  • CISSP Complete Video Course/Lesson 8 Software Development Security/8.5 Assessing the Security Impact of Acquired Software - CISSP.mp4

  • CISSP Complete Video Course/Lesson 8 Software Development Security/8.1 Managing the Software Development Lifecycle - CISSP.mp4

  • CISSP Complete Video Course/Lesson 8 Software Development Security/8.2 Understanding Software Development Approaches, Models, and Tools - CISSP.mp4

  • CISSP Complete Video Course/Lesson 8 Software Development Security/Lesson 8- Software Development Security - CISSP.mp4

  • CISSP Complete Video Course/Lesson 9 Preparing for the Exam/9.2 Asset Security Domain- Review and Study Roadmap - CISSP.mp4

  • CISSP Complete Video Course/Lesson 9 Preparing for the Exam/9.1 Security and Risk Management Domain- Review and Study Roadmap - CISSP.mp4

  • CISSP Complete Video Course/Lesson 9 Preparing for the Exam/9.3 Security Engineering Domain- Review and Study Roadmap - CISSP.mp4

  • CISSP Complete Video Course/Lesson 9 Preparing for the Exam/9.7 Security Operations Domain- Review and Study Roadmap - CISSP.mp4

  • CISSP Complete Video Course/Lesson 9 Preparing for the Exam/9.4 Communications and Network Security Domain- Review and Study Roadmap - CISSP.mp4

  • CISSP Complete Video Course/Lesson 9 Preparing for the Exam/9.6 Security Assessment and Testing Domain- Review and Study Roadmap - CISSP.mp4

  • CISSP Complete Video Course/Lesson 9 Preparing for the Exam/9.5 Identity and Access Domain- Review and Study Roadmap - CISSP.mp4

  • CISSP Complete Video Course/Lesson 9 Preparing for the Exam/9.9 Taking the CISSP Examination - CISSP.mp4

  • CISSP Complete Video Course/Lesson 9 Preparing for the Exam/9.8 Software Development Security Domain- Review and Study Roadmap - CISSP.mp4

  • CISSP Complete Video Course/Lesson 9 Preparing for the Exam/Lesson 9- Preparing for the Exam - CISSP.mp4

  • CISSP Complete Video Course/Learning Objectives, Part 2 - CISSP_2.mp4

  • CISSP Complete Video Course/Mid-Lesson Review - CISSP_2.mp4

  • CISSP Complete Video Course/Mid-Lesson Exam Review - CISSP.mp4

  • CISSP Complete Video Course/Mid-Lesson Review - CISSP.mp4

  • CISSP Complete Video Course/Introduction - CISSP.mp4

  • CISSP Complete Video Course/Summary - CISSP.mp4

  • CISSP Complete Video Course/Learning Objectives, Part 2 - CISSP_3.mp4

  • CISSP Complete Video Course/Learning Objectives, Part 2 - CISSP.mp4

Share on Facebook
Share on Twitter
Please reload

Please reload

Archive
Please reload

Category