[Pearson IT Certification, LiveLessons] CISSP Complete Video Course [2015, ENG]

Страницы:  1
Ответить
 

jagdeep

Top Seed 07* 2560r

Стаж: 11 лет 9 месяцев

Сообщений: 4240

jagdeep · 17-Окт-16 17:27 (8 лет 6 месяцев назад, ред. 20-Окт-16 03:50)

CISSP Complete Video Course

Год выпуска: 2015
Производитель: Pearson IT Certification, LiveLessons
Сайт производителя: pearsonitcertification.com/store/cissp-complete-video-course-9780789755414
Автор: Sari Greene
Продолжительность: 23:13:10
Тип раздаваемого материала: Видеоурок
Язык: Английский


Описание: CISSP Полный Видео курс содержит 24 часов обучения с содержанием, разделенном на 9 уроков с 94 видео подразделам уроков. Видео состоит из живых дискуссий тренер, видеоролики, анимации и живых демонстраций. Видео уроки этого курса обзор каждой цели экзамена, так что вы можете использовать этот курс как полный инструмент исследования для сдачи экзамена CISSP. Инструкция по всему предлагает подробные объяснения, демонстрации, советы и многое другое. Также включает в связи с прекращением урока викторины и полный экзамен практике.
CISSP Complete Video Course contains 24 hours of training with content divided into 9 lessons with 94 video sub-lessons. The videos consist of live trainer discussions, screencasts, animations, and live demos. The video lessons in this course review each exam objective so you can use this course as a complete study tool for taking the CISSP exam. Instruction throughout offers detailed explanations, demos, tips, and more. Also includes end-of-lesson quizzes and a full practice exam.
Содержание
Major sections are as follows:
Lesson 1: Security and Risk Management
Learning Objectives, Part 1
1.1: Examining Information Security Fundamentals
1.2: Applying Security Governance Concepts–Part 1
1.3: Applying Security Governance Concepts–Part 2
1.4: Designing and Implementing Governance Documents
1.5: Understanding Legal Systems and Related Laws–Part 1
1.6: Understanding Legal Systems and Related Laws–Part 2
1.7: Understanding Regulatory and Contractual Requirements–Part 1
1.8: Understanding Regulatory and Contractual Requirements–Part 2
1.9: Implementing Personnel Security
1.10: Implementing Third-Party Security
Mid-Lesson Exam Review
Learning Objectives, Part 2
1.11: Understanding and Applying Threat Modeling
1.12: Understanding & Implementing Risk Management Concepts
1.13: Exploring Risk Assessment Methodologies
1.14: Conducting a Quantitative Risk Assessment
1.15: Conducting a Qualitative Risk Assessment
1.16: Selecting Controls and Countermeasures
1.17: Managing Supply Chain Risk
1.18: Implementing Business Continuity Risk Management
End of Lesson Review
Lesson 2: Asset Security
Learning Objectives
2.1: Classifying Assets
2.2: Managing Assets
2.3: Protecting Data Privacy
2.4: Ensuring Appropriate Retention and Destruction
2.5: Determining Data Security Controls
End of Lesson Review
Lesson 3: Security Engineering
Learning Objectives, Part 1
3.1: Implementing Secure Design Principles
3.2: Understanding Security Models
3.3: Selecting Controls Based on Systems Security Evaluation Models
3.4: Recognizing Information Systems Security Capabilities
3.5: Assessing and Mitigating Security Architecture Vulnerabilities
3.6: Assessing and Mitigating Cloud Vulnerabilities
3.7: Assessing and Mitigating Web Vulnerabilities
3.8: Assessing and Mitigating Mobile and Remote Computing Vulnerabilities
Mid-Lesson Exam Review
Learning Objectives, Part 2
3.9: Introducing Cryptography
3.10: Applying Cryptography–Encryption Part 1
3.11: Applying Cryptography–Encryption Part 2
3.12: Applying Cryptography–Public Key Infrastructure
3.13: Applying Cryptography–Hashing and Digital Signature
3.14: Applying Cryptography–Cryptographic Protocols
3.15: Applying Cryptography–Crypto Attacks
3.16: Applying Secure Principles to Site and Facility Design
3.17: Securing Information Processing Facilities and Equipment
End of Lesson Review
Lesson 4: Communications and Network Security
Learning Objectives
4.1: Reviewing OSI and TCP/IP Models
4.2: Understanding IP Convergence and Extensibility
4.3: Securing Wireless Networks
4.4: Using Cryptography to Maintain Communication Security
4.5: Securing Network Access
4.6: Securing Data Transmissions
4.7: Securing Multimedia Collaboration
4.8: Securing Virtual Private Networks
4.9: Securing Endpoints
4.10: Preventing and Mitigating Network Attacks
End of Lesson Review
Lesson 5: Identity and Access Management
Learning Objectives
5.1: Understanding Access Control Fundamentals
5.2: Examining Identification Schemas
5.3: Understanding Authentication Options
5.4: Understanding Authentication Systems
5.5: Implementing Access and Authorization Criteria
5.6: Implementing Access Control Models
5.7: Implementing Access Control Techniques and Technologies
5.8: Identity and Access Provisioning
End of Lesson Review
Lesson 6: Security Assessment and Testing
Learning Objectives
6.1: Testing and Examination (T&E) Overview
6.2: Security Assessment Planning
6.3: Conducting Security Examinations
6.4: Security Assessment Testing–Target Identification
6.5: Security Assessment Testing–Password Cracking
6.6: Conducting Security Assessments–Penetration Testing
6.7: Understanding Log Analysis
6.8: Implementing Information Security Continuous Monitoring (ISCM)
6.9: Understanding Third-Party Audits and Examinations
End of Lesson Review
Lesson 7: Security Operations
Learning Objectives, Part 1
7.1: Managing Privileged Accounts
7.2: Operating and Maintaining Firewalls and IDS/IPS
7.3: Conducting Logging and Monitoring Activities
7.4: Implementing and Supporting Vulnerability and Patch Management
7.5: Implementing and Supporting Malware Management
7.6: Implementing and Supporting Media Management
7.7: Participating in the Configuration Management Process
Mid-Lesson Exam Review
Learning Objectives, Part 2
7.8: Managing System Resilience and Fault Tolerance
7.9: Implementing Disaster Recovery Processes
7.10: Managing DR Plan Maintenance
7.11: Understanding and Supporting Investigations
7.12: Understanding Digital Forensics
7.13: Supporting Incident Management
7.14: Securing People and Places
End of Lesson Review
Lesson 8: Software Development Security
Learning Objectives
8.1: Managing the Software Development Cycle
8.2: Understanding Software Development Approaches, Models, and Tools
8.3: Understanding Source Code Security Issues
8.4: Managing Database Security
8.5 Assessing the Security Impact of Acquired Software
End of Lesson Review
Lesson 9: Preparing for the Exam
Learning Objectives
9.1: Security and Risk Management Domain: Review and Study Roadmap
9.2: Asset Security Domain: Review and Study Roadmap
9.3: Security Engineering Domain: Review and Study Roadmap
9.4: Communications and Network Domain: Review and Study Roadmap
9.5: Identity and Access Domain: Review and Study Roadmap
9.6: Security Assessment and Testing Domain: Review and Study Roadmap
9.7: Security Operations Domain: Review and Study Roadmap
9.8: Software Development Security Domain: Review and Study Roadmap
9.9: Taking the CISSP Examination
Файлы примеров: отсутствуют
Формат видео: MP4
Видео: AVC, 1280x720 (16:9), 25.000 fps, ~1 110 Kbps avg, 0.030 bit/pixel
Аудио: 44.1 KHz, AAC LC, 2 ch, CBR, ~116 Kbps
Download
Rutracker.org не распространяет и не хранит электронные версии произведений, а лишь предоставляет доступ к создаваемому пользователями каталогу ссылок на торрент-файлы, которые содержат только списки хеш-сумм
Как скачивать? (для скачивания .torrent файлов необходима регистрация)
[Профиль]  [ЛС] 

jagdeep

Top Seed 07* 2560r

Стаж: 11 лет 9 месяцев

Сообщений: 4240

jagdeep · 17-Окт-16 17:31 (спустя 3 мин.)

need time for proper edit... wait till that
[Профиль]  [ЛС] 

sabbir1123

Стаж: 8 лет 8 месяцев

Сообщений: 2


sabbir1123 · 18-Окт-16 18:18 (спустя 1 день)

jagdeep писал(а):
71630574need time for proper edit... wait till that
hello jagdeep
can you upload this xamarin course?
https://www.udemy.com/xamarin-forms-course/
its from a top instructor of xamarin, mosh hamedani.
its also a top rated course.Thanks
[Профиль]  [ЛС] 

olegzzzzz

Стаж: 16 лет 4 месяца

Сообщений: 8


olegzzzzz · 22-Сен-20 21:14 (спустя 3 года 11 месяцев, ред. 22-Сен-20 21:14)

почему написано 4 личей, а у меня сутки висит - скачано 0?
jagdeep
встаньте на раздачу please!
[Профиль]  [ЛС] 
 
Ответить
Loading...
Error