CISSP – Certified Information Systems Security Professional

============================================================
Certified Information Systems Security Professional (CISSP)
Online Cybrary Free Course

============================================================
CISSP Module 01
============================================================

Part 1 – Intro 3:30
Part 2 – CIA and IAAA 11:46
Part 3 – Tenets of Secure Design 11:48
Part 4 – Risk Intro 7:16
Part 5 – Risk Assessment 6:24
Part 6 – Risk Analysis 8:38
Part 7 – Risk Mitigation 9:57
Part 8 – Governance vs Management 4:53
Part 9 – Frameworks and Senior Management’s Role 12:58
Part 10 – Policies Procedures Standards and Guidelines 8:09
Part 11 – Knowledge Transfer 4:37
Part 12 – Types of Laws 10:28
Part 13 – Specific Laws 7:35
Part 14 – BCP Intro 7:26
Part 15 – BCP Phases 2:03
Part 16 – BCP Roles and Responsibilities 9:01
Part 17 – BCP Subplans 3:03
Part 18 – BCP Remaining Phases 7:50
Part 19 – BIA 10:23
Part 20 – Chapter 1 Review 2:44 Business Continuity & Disaster Recovery Planning Certification Exam
Part 20 – Review –
Part 20 – Chapter 1 Review – Business Continuity & Disaster Recovery Planning Certification Exam

============================================================
CISSP Module 02
============================================================

Part 01 – Introduction 2:13
Part 02 – Roles and Responsibilities 6:36
Part 03 – Classification 4:15
Part 04 – States of Data 4:36
Part 05 – Configuration Management 9:19 Asset Security Skill Certification Exam
Part 06 – Review 1:06 Asset Security Certification Exam

============================================================
CISSP Module 03
============================================================

Part 01 – Intro 1:23
Part 02 – Trusted Computing 6:11
Part 03 – Computer Architecture CPU 8:35
Part 04 – Memory 7:22
Part 05 – Security Models and Access Control Models 15:32
Part 06 – Common Architectures 16:47
Part 07 – Cryptography Intro 3:14
Part 08 – History of Crypto 6:56
Part 09 – Security Services of Crypto 2:38
Part 10 – Crypto Definitions 14:05
Part 11 – Symmetric Cryptography 12:04
Part 12 – Asymmetric Cryptography 10:44
Part 13 – Hybrid Cryptography 6:21
Part 14 – Symmetric vs Asymmetric Cryptography 6:20
Part 15 – RSA Diffie Hellman and ECC 4:43
Part 16 – Hashing 11:29
Part 17 – Digital Signatures MACs and Hashes 4:58
Part 18 – PKI Public Key Infrastructures 17:02
Part 19 – IPSec Part I 7:09
Part 20 – IPSec Part II 8:29
Part 21 – Attacks on Cryptography 5:41
Part 22 – Cryptography Review 2:05 Security Engineering

============================================================
CISSP Module 04
============================================================

Part 01 – Intro 2:38
Part 02 – OSI Intro 7:39
Part 03 – Layer 1 Physical 8:23
Part 04 – Layer 2 Data Link Part I Media Access 10:27
Part 05 – Layer 2 Data Link Part II Switches 5:18
Part 06 – Layer 3 Network Routers VLANs Switches 4:17
Part 07 – Layer 3 Protocols and Attacks 5:08
Part 08 – Layer 4 Transport TCP and UDP 8:08
Part 09 – Layer 5 and 6 Session and Presentation 3:26
Part 10 – Layer 7 Application 5:47
Part 11 – TCP IP Model and Review 3:59
Part 12 – Common Attacks 11:11
Part 13 – Firewalls, Proxies and NAT 14:14
Part 14 – WAN 7:39
Part 15 – Wireless 7:58
Part 16 – Cloud Computing 5:55
Part 17 – Telecom Review 1:05 Communication & Network Security Certification Exam

============================================================
CISSP Module 05
============================================================

Network Devices Certification
Part 01 – Intro to ID 2:02
Part 02 – Defining Identity and Access Management 4:05
Part 03 – Core Security Requirements 3:56
Part 04 – Access Control Models 6:34
Part 05 – Authentication TYPE I 6:37
Part 06 – Authentication TYPE II 6:02
Part 07 – Authentication TYPE III 5:44
Part 08 – SSO and Kerberos 16:52
Part 09 – Access Control Methods 5:23
Part 10 – RADIUS 6:43 Authentication Protocols and Technology Certification Exam
Part 11 – Emanations 2:26
Part 12 – ID and Access Management Review 1:16 Access Control and Identity Management Certification

============================================================
CISSP Module 06
============================================================

Part 01 – Intro 1:10
Part 02 – Vulnerability and Pen Testing Overview 11:44
Part 03 – Penetration Testing 6:12
Part 04 – NDS vs HIDS 9:01
Part 05 – Analysis Engines 4:23
Part 06 – Honeypots 2:20
Part 07 – Chapter Review 1:07 Security Assessment & Testing Certification Test

============================================================
CISSP Module 07
============================================================

Part 01 – Intro 0:50
Part 02 – Incident Response 8:16
Part 03 – Intro to Forensics 2:11
Part 04 – Forensic Investigation Process 7:17
Part 05 – Types of Evidence 3:46
Part 06 – Spares and RAID 4:04
Part 07 – Clustering and Web Farms 2:46
Part 08 – Backups 4:09
Part 09 – Additional Data Redundancy 1:30
Part 10 – Review 1:48 Security Operations Skill Certification

============================================================
CISSP Module 08
============================================================

Part 01 – Intro 2:56
Part 02 – Why is Software Unsecure 6:16
Part 03 – Development Methodologies 7:08
Part 04 – Common Architectures 16:47
Part 05 – Monitoring and Auditing 9:05
Part 06 – Adversaries and Review 7:38
Part 06 – Adversaries and Review 7:38
Part 07 – OWASP 1 thru 5 15:23
Part 08 – OWASP 6 thru 10 10:07
Part 09 – Defensive Coding 11:36
Part 10 – Change Management 7:24
Part 11 – Vulnerability Scans and Penetration Testing 8:02
Part 12 – Verification Validation Certification and Accreditation 4:04
Part 13 – DB Intro 1:00
Part 14 – DB Models 2:25
Part 15 – Relational Databases 8:03 Software Development Security Skill Certification

============================================================
CISSP Module 09
============================================================

Final Course Review 4:14
Enterprise Security Architecture Certification
============================================================