The package teaches students the eight domains of information system security knowledge.
File Size: 2.8 GB.
Stone River Elearning – Certified Information Systems Security Professional (CISSP 2022)
The CISSP: Certified Information Systems Security Professional Certification certification training package covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge.
The new eight domains are:
- Security and Risk Management
- Asset Security
- Security Engineering
- Communications and Network Security
- Identity and Access Management
- Security Assessment and Testing
- Security Operations
- Software Development Security
The CISSP Certification is administered by the International Information Systems Security Certification Consortium or (ISC)². (ISC)² promotes the CISSP exam as an aid to evaluating personnel performing information security functions. Candidates for this exam are typically network security professionals and system administrators with at least four years of direct work experience in two or more of the ten test domains. As the first ANSI ISO accredited credential in the field of information security, the Certified Information Systems Security Professional (CISSP) certification provides information security professionals with not only an objective measure of competence, but a globally recognized standard of achievement.
Course Curriculum
Course Introduction
ï…ª
Introduction to the course (0:18)
The CISSP Exam
ï…ª
Introduction (0:15)
ï…ª
CISSP Certification Goals (1:25)
ï…ª
Security Professional Certification Value (1:25)
ï…ª
Exam Common Body of Knowledge (0:49)
ï…ª
Becoming a CISSP (2:25)
Cryptography
ï…ª
Introduction (0:18)
ï…ª
Cryptography Concepts Part1 (6:19)
ï…ª
Cryptography Concepts Part2 (2:53)
ï…ª
History of Cryptography (6:47)
ï…ª
Cryptosystem Features (2:13)
ï…ª
Encryption Systems Part1 (6:23)
ï…ª
Encryption Systems Part2 (3:04)
ï…ª
Substitution Ciphers (1:58)
ï…ª
Symmetric Algorithms Part1 (7:19)
ï…ª
Symmetric Algorithms Part2 (5:11)
ï…ª
Asymmetric Algorithms (5:06)
ï…ª
Message Integrity (7:52)
ï…ª
Digital Signatures (1:28)
ï…ª
Public Key Infrastructure Part1 (6:19)
ï…ª
Public Key Infrastructure Part2 (2:04)
ï…ª
Trusted Platform Module (2:41)
ï…ª
Encryption Communication Levels (1:56)
ï…ª
E-Mail Security (1:47)
ï…ª
Internet Security (5:35)
ï…ª
Cryptography Attacks (5:48)
You must be <a href="https://wislibrary.org/my-account/">logged in</a> to post a review.