(ISC)2 CISSP 2015 Год выпуска: 2015 Производитель: CBT Nuggets Сайт производителя: www.cbtnuggets.com/it-training/isc2-cissp-2015 Автор: Keith Barker Продолжительность: 10h Тип раздаваемого материала: Видеоурок Язык: Английский Описание: Это (ISC)2 CISSP). подготовка кадров с Кейт Бейкер предназначена для тех, кто готовится к сертификации CISSP). в сфере информационной безопасности, в том числе темы из восьми доменов (на базе 2015 года план), что будет опробован в CISSP сертификационного экзамена.-This (ISC)2 CISSP training with Keith Barker is designed for those who are preparing for a CISSP certification in information security, including topics from eight security domains (based on the 2015 blueprint), that will be tested in the CISSP certification exam. Related Area of Expertise: IT Security Recommended skills: At least 5 years of experience in two of the following domains, and exposure to the others: Security and Risk Management, Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, Software Development Security Recommended equipment: None Related certifications: CISSP® - Certified Information Systems Security Professional Related job functions: Security consultant Security analyst Security manager Security systems engineer IT director Chief information security officer Security auditor Security architect Network architect CISSP certification one of the most respected certifications available, and is currently in great demand by a wide variety organizations. From banking and financial institutions to government and public utilities, as well as high-tech and hospitality, the skills of a CISSP are needed by nearly every industry. In this new CISSP 2015 training, you'll focus on the eight security domains that will be tested in the CISSP certification exam, based on the 2015 blueprint from ISC(2). Benefits of being a CISSP include: Demonstrated working knowledge of information security Confirmed commitment to profession A career differentiator, with enhanced credibility and marketability All trademarks and copyrights are the property of their respective holders.
Содержание
1. Welcome to CISSP (16 min) 2. CIA Concepts (4 min) 3. Policies (13 min) 4. Risk (13 min) 5. Control Types (17 min) 6. Security Awareness Training (6 min) 7. Ethical Hacking (13 min) 8. Symmetric Cryptography (19 min) 9. Asymmetric Cryptography (24 min) 10. Fire (16 min) 11. Physical Security (13 min) 12. Electric Power (12 min) 13. OSI Lower Layers (29 min) 14. OSI Upper Layers (24 min) 15. Firewalls (21 min) 16. VPNs (27 min) 17. Attacks (21 min) 18. Authentication Concepts (9 min) 19. Multifactor Authentication (15 min) 20. Centralized Management (17 min) 21. SSO and Security Threats (25 min) 22. Computing System Evaluations (15 min) 23. Security Model Details (11 min) 24. Availability and Integrity Design (14 min) 25. IDS and IPS (17 min) 26. Controls for Operational Security (19 min) 27. Separation of Duties (18 min) 28. Backups and Media (16 min) 29. DR and BC (20 min) 30. Malware (14 min) 31. Evidence (12 min) 32. Laws and Liability (10 min) 33. Incident Response (15 min) 34. System and Software Security (16 min) 35. Virtualization and Cloud (13 min) 36. 2700x (6 min) 37. Federated Identities (11 min) 38. EPA (16 min) 39. Monitoring and More (12 min)
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum You cannot attach files in this forum You can download files in this forum