Tutorials and Online Training Videos

CISSP Tutorial


The Certified Information Systems Security Professional credential is one of the most sought after security management certifications in the profession. The CISSP certification separates the novices from the seasoned security professionals. This VTC title will help prepare you for what may be the toughest six hours of your IT security career – The CISSP exam. author Bobby Rogers will give you the key information you need to prepare for this challenging exam and increase your worth as a certified security professional. To begin learning simply click on the links.

Introduction & Course Outline

Introduction
Course Outline

Access Control

Access Control Concepts
Types of Access Control
Access Control Models
Authentication Methods
Access Control Systems & Administration
Access Control Attacks

Telecommunications & Network Security

Introduction
Network Protocols
The OSI Model
Networking Topologies
Network Transmission Media
Network Security Devices
Remote Access Protocols & Technologies
Network Security Weaknesses & Countermeasures
Wireless Security

Security & Risk Management

Security Goals & Tenets
Security Management Roles & Responsibilities
Security Policies & Procedures
Security Classification
Introduction to Risk
Risk Assessment
Risk Analysis
Risk Management

Applications Security

Introduction to Application Security
Systems Development Life Cycle
Programming Languages & Techniques
Database Security
Application Threats

Cryptography

Basics of Cryptography
Cryptography Definitions
Encryption Algorithms
Hashing
Symmetric & Asymmetric Cryptography
Public Key Infrastructure
Cryptographic Key Management
Cryptographic Threats
Cryptographic Protocols & Applications
Cryptography Demonstration

Security Architecture & Design

Security Models
System Components
Security Architecture
Security Evaluation Criteria
System Certification & Accreditation

Operations Security

Operational Security Controls
Personnel Security
Media Security
Configuration Management
Security Awareness & Training

BCP & DRP

Introduction to DRP & BCP
Organization & Contingency Planning
Disaster Recovery Planning (DRP)
Business Continuity Planning (BCP)
Contingency Operations
Plan Testing & Implementation

Law, Investigation & Ethics

Introduction to Cyberlaw
Privacy Laws
Intellectual Property
Criminal Law
Administrative/Regulatory Laws
Legal Liability & Ethical Practices
Cyber Crime Investigations

Physical Security

Safety
Fire Safety
Facility Security Pt.1
Facility Security Pt.2
Environmental Security

After the Exam

The CISSP Exam
Preparing your CISSP Resume
After the CISSP
Wrap Up

About the Author

About the Author


Related Books on CISSP







Save $80 on the
DROID BIONIC
by Motorola with Verizon Wireless service for less than from Verizon Wireless directly.
Save $80 on DROID BIONIC
More Cell Phone Discounts