Books & Videos

Table of Contents

Chapter: Introduction

CISSP Complete Video Course: Introduction

04m 25s

Chapter: Lesson 1: Security and Risk Management

Learning Objectives, Part 1

01m 13s

1.1 Examining Information Security Fundamentals

14m 43s

1.2 Applying Security Governance Concepts—Part 1

13m 52s

1.3 Applying Security Governance Concepts—Part 2

16m 7s

1.4 Designing and Implementing Governance Documents

20m 33s

1.5 Understanding Legal Systems and Related Laws—Part 1

07m 47s

1.6 Understanding Legal Systems and Related Laws—Part 2

14m 32s

1.7 Understanding Regulatory and Contractual Requirements—Part 1

10m 20s

1.8 Understanding Regulatory and Contractual Requirements—Part 2

15m 53s

1.9 Implementing Personnel Security

21m 10s

1.10 Implementing Third-Party Security

09m 57s

Mid-Lesson Review

10m 50s

Learning Objectives, Part 2

00m 46s

1.11 Understanding and Applying Threat Modeling

12m 20s

1.12 Understanding & Implementing Risk Management Concepts

19m 31s

1.13 Exploring Risk Assessment Methodologies

11m 29s

1.14 Conducting a Quantitative Risk Assessment

24m 52s

1.15 Conducting a Qualitative Risk Assessment

21m 38s

1.16 Selecting Controls and Countermeasures

16m 59s

1.17 Managing Supply Chain Risk

12m 8s

1.18 Implementing Business Continuity Risk Management

15m 53s

End of Lesson Review

18m 8s

Chapter: Lesson 2: Asset Security

Learning Objectives

00m 59s

2.1 Classifying Assets

18m 44s

2.2 Managing Assets

14m 13s

2.3 Protecting Data Privacy

14m 56s

2.4 Ensuring Appropriate Retention and Destruction

19m 28s

2.5 Determining Data Security Controls

16m 4s

End of Lesson Review

09m 38s

Chapter: Lesson 3: Security Engineering

Learning Objectives, Part 1

01m 7s

3.1 Implementing Secure Design Principles

19m 19s

3.2 Understanding Security Models

15m 35s

3.3 Selecting Controls Based on Systems Security Evaluation Models

12m 47s

3.4 Recognizing Information Systems Security Capabilities

15m 14s

3.5 Assessing and Mitigating Security Architecture Vulnerabilities

15m 10s

3.6 Assessing and Mitigating Cloud Vulnerabilities

11m 53s

3.7 Assessing and Mitigating Web Vulnerabilities

11m 27s

3.8 Assessing and Mitigating Mobile and Remote Computing Vulnerabilities

13m 32s

Mid-Lesson Review

09m 31s

Learning Objectives, Part 2

01m 18s

3.9 Introducing Cryptography

12m 49s

3.10 Applying Cryptography—Encryption Part 1

16m 51s

3.11 Applying Cryptography—Encryption Part 2

16m 54s

3.12 Applying Cryptography—Public Key Infrastructure

20m 4s

3.13 Applying Cryptography—Hashing and Digital Signature

24m 32s

3.14 Applying Cryptography—Cryptographic Protocols

08m 6s

3.15 Applying Cryptography—Crypto Attacks

09m 56s

3.16 Applying Secure Principles to Site and Facility Design

13m 49s

3.17 Securing Information Processing Facilities and Equipment

10m 33s

End of Lesson Review

12m 13s

Chapter: Lesson 4: Communications and Network Security

Learning Objectives

01m 36s

4.1 Reviewing OSI and TCP/IP Models

25m 57s

4.2 Understanding IP Convergence and Extensibility

08m 48s

4.3 Securing Wireless Networks

11m 13s

4.4 Using Cryptography to Maintain Communication Security

07m 8s

4.5 Securing Network Access

17m 23s

4.6 Securing Data Transmissions

15m 21s

4.7 Securing Multimedia Collaboration

12m 41s

4.8 Securing Virtual Private Networks

38m 38s

4.9 Securing Endpoints

26m 16s

4.10 Preventing and Mitigating Network Attacks

25m 14s

End of Lesson Review

15m 53s

Chapter: Lesson 5: Identity and Access Management

Learning Objectives

01m 7s

5.1 Understanding Access Control Fundamentals

11m 50s

5.2 Examining Identification Schemas

15m 43s

5.3 Understanding Authentication Options

22m 42s

5.4 Understanding Authentication Systems

08m 54s

5.5 Implementing Access and Authorization Criteria

11m 57s

5.6 Implementing Access Control Models

14m 17s

5.7 Implementing Access Control Techniques and Technologies

11m 37s

5.8 Identity and Access Provisioning

13m 35s

End of Lesson Review

11m 50s

Chapter: Lesson 6: Security Assessment and Testing

Learning Objectives

01m 9s

6.1 Testing and Examination (T&E) Overview

13m 35s

6.2 Security Assessment Planning

12m 46s

6.3 Conducting Security Examinations

12m 5s

6.4 Conducting Security Testing—Target Identificaton

12m 49s

6.5 Conducting Security Testing—Password Cracking

09m 59s

6.6 Conducting Security Testing—Penetration Testing

12m 56s

6.7 Understanding Log Analysis

14m 24s

6.8 Implementing Information Security Continuous Monitoring (ISCM)

12m 48s

6.9 Understanding Third-Party Audits and Examinations

12m 52s

End of Lesson Review

10m 24s

Chapter: Lesson 7: Security Operations

Learning Objectives, Part 1

01m 21s

7.1 Managing Privileged Accounts

12m 55s

7.2 Operating and Maintaining Firewalls and IDS/IPS

18m 6s

7.3 Conducting Logging and Monitoring Activities

12m 16s

7.4 Implementing and Supporting Vulnerability and Patch Management

21m 38s

7.5 Implementing and Supporting Malware Management

17m 19s

7.6 Implementing and Supporting Media Management

12m 10s

7.7 Participating in the Configuration Management Process

12m 47s

Mid-Lesson Review

10m 4s

Learning Objectives, Part 2

00m 52s

7.8 Managing System Resilience and Fault Tolerance

19m 37s

7.9 Implementing Disaster Recovery Processes

16m 11s

7.10 Managing DR Plan Maintenance

13m 18s

7.11 Understanding and Supporting Investigations

15m 19s

7.12 Understanding Digital Forensics

12m 58s

7.13 Supporting Incident Management

21m 37s

7.14 Securing People and Places

10m 43s

End of Lesson Review

13m 49s

Chapter: Lesson 8: Software Development Security

Learning Objectives

01m 12s

8.1 Managing the Software Development Lifecycle

15m 0s

8.2 Understanding Software Development Approaches, Models, and Tools

14m 19s

8.3 Understanding Source Code Security Issues

13m 17s

8.4 Managing Database Security

13m 34s

8.5 Assessing the Security Impact of Acquired Software

08m 55s

End of Lesson Review

12m 44s

Chapter: Lesson 9: Preparing for the Exam

Learning Objectives

00m 36s

9.1 Security and Risk Management Domain: Review and Study Roadmap

08m 47s

9.2 Asset Security Domain: Review and Study Roadmap

02m 44s

9.3 Security Engineering Domain: Review and Study Roadmap

06m 38s

9.4 Communications and Network Security Domain: Review and Study Roadmap

04m 33s

9.5 Identity and Access Domain: Review and Study Roadmap

03m 15s

9.6 Security Assessment and Testing Domain: Review and Study Roadmap

03m 36s

9.7 Security Operations Domain: Review and Study Roadmap

05m 34s

9.8 Software Development Security Domain: Review and Study Roadmap

03m 9s

9.9 Taking the CISSP Examination

04m 35s

Chapter: Summary

CISSP Complete Video Course: Summary

00m 36s