Course curriculum

    1. CISSP Week1 - CISSP High Level Overview

    2. Feedback from Nathalie After passing CISSP (19 Mar)

      FREE PREVIEW
    3. D1 - Security Fundamentals

      FREE PREVIEW
    4. Security Governance - Vision, Mission, Goal, Objectives

      FREE PREVIEW
    5. Security Governance - Value Creation and Corporate Governance

    6. Security Governance - Aligment with Enterprise Governance

      FREE PREVIEW
    7. Security Governance - What it means practially

    8. Security Governance - Misalignment Use case

    9. Security Governance - Type of plans

    10. Security Governance - Due care and Due Diligence

    11. Security Governane - Policies

    12. Security Governance - Standards and Baselines

    13. Security Governance - Procedures and Guidelines

    14. Professional Ethics

    15. NIST Cyber Security Framework (CSF) Ver 1.1

    16. NIST Risk Management Framework (RMF)

    17. ISO/IEC 27000 Series

    18. Frameworks

    19. Human Resource Security

    20. Risk Management

    21. Risk Assessment and Analysis - Brainstorming

    22. Threat Modelling

    23. Legal Systems

    24. Cybercrimes

    25. US Data Breach Regulations-

    26. OECD Privacy principles-

    27. GDPR

    28. Transborder Data Flow, Data localization and Jurisdictions

    29. Import Export Rules

    30. Intellectual Property & Software Piracy

    31. Change Management

    32. BCDR Overview

    1. Information Assets and evaluation

    2. Domain 2 - Asset Security (Whiteboarding Notes)

    3. Data Governance Policy and Standards

    4. Data Life Cycle & Controls

    5. Data Protection Methods and Controls

    6. Data Protection Methods and Controls (Contd..)

    1. Domain 3 Overview and System Architectures (Part-1)

    2. Domain 3 Overview and System Architectures (Part-2)

    3. Domain 3 Overview and System Architectures (Part -3)

      FREE PREVIEW
    4. Domain 3 - Difference between VM and Container

    5. Domain 3 - Security Architecture and Threat Modelling

      FREE PREVIEW
    6. Domain 3 - Threat Modelling - Part-2

    7. Domain 3 -Secure Desing Principles (Part-1)

    8. Domain 3 -Secure Desing Principles (Part-2)

    9. Domain 3 -Secure Design Principles (Part-3)

    10. Domain 3 -Security models - Multilevel Systems (Part-1)

    11. Domain 3 -Security models - Multilevel Systems (Part-2)

      FREE PREVIEW
    12. Domain 3 -Security models - Multilevel Systems (Part-3)

    13. Domain 3 - Security capability of Systems (TPM)

      FREE PREVIEW
    14. Domain 3 - Security capability of Systems (HSM)

    15. Domain 3 - Security capability of Systems (Bus Encryption & SED)

    16. Domain 3 - Security capability of Systems (TEE & Atomic Execution)

    17. Domain 3 - Security capability of Systems (CPU, OS & Memory)

      FREE PREVIEW
    18. Domain 3 - Security evaluation requirements

    19. Domain 3 - Security Evalutaion (TCSEC-ITSEC-Common Criteria)

    20. Physical Security Part-1

    21. Physical Security Part-2

    22. Physical Security Part-3 (Fire Suppression)

    1. Cryptology Fundamentals & History

    2. One Time Pad & Symmetric Cryptography - Block Cipher

      FREE PREVIEW
    3. Symmetric Cryptography (Pros and Cons)

    4. Asymmetric Cryptography and Comprison with Symmetric

    5. Hybrid communication and PKI

      FREE PREVIEW
    6. Hashing

    7. Hashing Algorithms

    8. Hashing and Digital Signature

      FREE PREVIEW
    9. Cryptography Key Management

    10. Attacks on cryptography

    11. Attacks on Cryptography -2

    12. Web of Trust and Quantum Cryptography

    1. Domain 4 0- OSI Model

      FREE PREVIEW
    2. D4 - Network Topologies

    3. D4- LAN-MAN-WAN

    4. D4 - Media Access Technologies

    5. Internet Protocol

    6. IPV4-IPV6 Intercommunications

    7. Network Ports & Sockets

    8. Layer 2 - Detailed

    9. Layer 2 Security Standards

    10. Layer 2 Technologies

      FREE PREVIEW
    11. TCP and UDP

    12. DHCP

    13. Layer 2 protocols

    14. Routing Protocols

    15. WAN-MAN Connectivity

    16. WAN Technologies

    17. SNMP

      FREE PREVIEW
    18. ICMP

    19. DNS

    20. Wireless Networking FHSS-DSSS-OFDM

      FREE PREVIEW
    21. Wireless Standards

    22. Wireless Standards -1

    23. Wireless Security

    24. Wireless LAN - Site Survey & Attacks on Wi-Fi

    25. Network Access Control (IEEE 802.1X)

    26. Securing the Network & Network Segmentation

    27. Microsegmentation

    28. Network Devices

    29. Firewalls

    30. Firewall Placement

    31. Proxies

    32. Load Balancers

    33. IDS IPS

    34. DLP

    35. Anti Malware Solutions

    36. Honeypots

    37. SIEM

    38. Encryption during Transmit (SSL-TLS)

    39. Link & End-to-End Encryption

    40. Multilayer Protocols

    41. Converged Protocols

    42. Remote Access Protocols, VPN and IPSEC

    43. Network Attacks

    44. Content Delivery Network (CDN)

    45. Endpoint Security

    46. Email Security

    47. Cellular Communication Security

    1. IAM Part-1

    2. IAM Part-2

      FREE PREVIEW
    3. Authentication - Something you know

    4. Authentication - Something you have

      FREE PREVIEW
    5. Authentication - Something you are

    6. Accountability

    7. Access contol Models - DAC-MAC-RBAC

    8. Access Control Model - RuBAC-ABAC-RiskBAC

    9. Session Management

    10. Identity Proofing

    11. Identity Management - SSO-AD

      FREE PREVIEW
    12. SSO-SAML

    13. Kerberos

    14. XML Standard in Access Control

    15. Remote Authentication Protocol - RADIUS

    16. Remote Authentication Protocol - Diameter and TACACS+

About this course

  • $149.00
  • 183 lessons
  • 71 hours of video content