CISSP LiveLessons

Watch CISSP LiveLessons

  • 2016
  • 1 Season

CISSP LiveLessons from Pearson is an extensive course designed to prepare the learners for the Certified Information Systems Security Professional (CISSP) certification exam. The course is presented by Sari Greene, an expert in the field of cybersecurity and CEO of Sage Data Security, LLC. The course is divided into 10 modules and covers all eight domains of the CISSP exam.

The course content is presented in a concise yet comprehensive format, with each module focusing on a specific domain of the CISSP exam. The modules are designed to cover all the core concepts, principles, and practices required to pass the CISSP certification exam. The course is designed for anyone looking to enter the field of cybersecurity or those who want to enhance their existing knowledge and skills.

The course covers a broad range of topics, including security and risk management, asset security, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security. Each module covers a specific domain of the CISSP exam and includes detailed explanations of the concepts and topics covered.

The presentation style of the course is engaging and interactive, with Sari Greene using real-world examples to illustrate key concepts and principles. The course features live demonstrations and discussions, providing learners with a hands-on experience of the concepts they are learning.

The course also includes multiple choice quizzes and exercises to help learners test their knowledge and reinforce their understanding of the concepts covered in the course. The quizzes are designed to mimic the format of the CISSP certification exam, giving learners a feel for the types of questions they can expect to encounter on the actual exam.

The course is available in both video and audio format and can be accessed through a variety of devices, including desktops, laptops, tablets, and smartphones. The course can be accessed on-demand, allowing learners to study at their own pace and on their own schedule. The course is designed to be flexible and adaptable to the individual learning style and preferences of each learner.

Overall, CISSP LiveLessons from Pearson is an excellent course for anyone looking to prepare for the CISSP certification exam. The course is expertly presented, comprehensive, and engaging, and provides learners with a deep understanding of the concepts and principles required to pass the CISSP exam. Whether you are an experienced cybersecurity professional or just starting in the field, this course is an essential tool for advancing your knowledge and skills in cybersecurity.

Filter by Source
No sources available
Do you have Hulu?
What are you waiting for?
Nice! Browse Hulu with Yidio.
Ad Info - This show may not be available on Hulu
Seasons
Lesson 9: Preparing for the Exam
9. Lesson 9: Preparing for the Exam
November 8, 2016
Lesson 9 is designed to be both a review and a study roadmap. Each sub-lesson includes exam categories, topic and cross-references. You can use Lesson 9 to design a study roadmap or to review your knowledge. In the very last lesson‚ you'll find information on exam preparation, format, logistics, and what to do on test day!
Lesson 9: Preparing for the Exam
9. Lesson 9: Preparing for the Exam
November 8, 2016
Lesson 9 is designed to be both a review and a study roadmap. Each sub-lesson includes exam categories, topic and cross-references. You can use Lesson 9 to design a study roadmap or to review your knowledge. In the very last lesson‚ you'll find information on exam preparation, format, logistics, and what to do on test day!
Lesson 8: Software Development Security
8. Lesson 8: Software Development Security
November 8, 2016
Lesson 8, Software Development Security explores the traditional software development lifecycle, the emerging security development lifecycle, development tools, techniques and tests, database security and privacy, and the impact of acquired software. The lesson concludes with a secure software acquisition and implementation walkthrough.
Lesson 8: Software Development Security
8. Lesson 8: Software Development Security
November 8, 2016
Lesson 8, Software Development Security explores the traditional software development lifecycle, the emerging security development lifecycle, development tools, techniques and tests, database security and privacy, and the impact of acquired software. The lesson concludes with a secure software acquisition and implementation walkthrough.
Lesson 7: Security Operations
7. Lesson 7: Security Operations
November 8, 2016
Part 1 focuses on the daily and ongoing operational tasks of custodians and security operations personnel. Part 2 focuses on incident management and business continuity including resiliency, fault tolerance, disaster recovery planning and plan maintenance, incident preparation, detection and response, forensic investigation, and business continuity strategies.
Lesson 7: Security Operations
7. Lesson 7: Security Operations
November 8, 2016
Part 1 focuses on the daily and ongoing operational tasks of custodians and security operations personnel. Part 2 focuses on incident management and business continuity including resiliency, fault tolerance, disaster recovery planning and plan maintenance, incident preparation, detection and response, forensic investigation, and business continuity strategies.
Lesson 6: Security Assessment and Testing
6. Lesson 6: Security Assessment and Testing
November 8, 2016
Lesson 6, Security Assessment and Testing explores testing and examination objectives, techniques, targets, results and recommendations. The lesson also incorporates three complementary topics -information security continuous monitoring (ICSM), audit fundamentals and regulatory examinations.
Lesson 6: Security Assessment and Testing
6. Lesson 6: Security Assessment and Testing
November 8, 2016
Lesson 6, Security Assessment and Testing explores testing and examination objectives, techniques, targets, results and recommendations. The lesson also incorporates three complementary topics -information security continuous monitoring (ICSM), audit fundamentals and regulatory examinations.
Lesson 5: Identity and Access Management
5. Lesson 5: Identity and Access Management
November 8, 2016
Lesson 5, Identity and Access Management begins with a review of access control fundamentals. Subsequent topics include local and cloud-based identity management, authentication factors and processes, access control models, access and authorization criteria, techniques and technologies, user lifecycle provisioning, and access control attack mitigation.
Lesson 5: Identity and Access Management
5. Lesson 5: Identity and Access Management
November 8, 2016
Lesson 5, Identity and Access Management begins with a review of access control fundamentals. Subsequent topics include local and cloud-based identity management, authentication factors and processes, access control models, access and authorization criteria, techniques and technologies, user lifecycle provisioning, and access control attack mitigation.
Lesson 4: Communications and Network Security
4. Lesson 4: Communications and Network Security
November 8, 2016
Lesson 4, Communication and Network Security addresses OSI and TCP/IP models, IP convergence and extensibility, multimedia security, virtual private networks, end point protection and network attack method. The lesson concludes with examining a unified attack prevention and mitigation approach.
Lesson 4: Communications and Network Security
4. Lesson 4: Communications and Network Security
November 8, 2016
Lesson 4, Communication and Network Security addresses OSI and TCP/IP models, IP convergence and extensibility, multimedia security, virtual private networks, end point protection and network attack method. The lesson concludes with examining a unified attack prevention and mitigation approach.
Lesson 3: Security Engineering
3. Lesson 3: Security Engineering
November 8, 2016
Part 1 focuses on design principles and models, systems architecture, and assessing and mitigating vulnerabilities. Part 2 concentrates on cryptographic systems, techniques, and protocols including encryption, hashing, digital signature and the Public Key Infrastructure. Also included in Part 2 is secure site and facility design principles and practical application.
Lesson 3: Security Engineering
3. Lesson 3: Security Engineering
November 8, 2016
Part 1 focuses on design principles and models, systems architecture, and assessing and mitigating vulnerabilities. Part 2 concentrates on cryptographic systems, techniques, and protocols including encryption, hashing, digital signature and the Public Key Infrastructure. Also included in Part 2 is secure site and facility design principles and practical application.
Lesson 2: Asset Security
2. Lesson 2: Asset Security
November 8, 2016
CISSP candidates are expected to be well versed in information asset ownership, classification, management and protection. Lesson 2, Asset Security focuses on the classifying, managing and securing information assets and supporting infrastructure throughout its lifecycle with an emphasis on privacy protection.
Lesson 2: Asset Security
2. Lesson 2: Asset Security
November 8, 2016
CISSP candidates are expected to be well versed in information asset ownership, classification, management and protection. Lesson 2, Asset Security focuses on the classifying, managing and securing information assets and supporting infrastructure throughout its lifecycle with an emphasis on privacy protection.
Lesson 1: Security and Risk Management
1. Lesson 1: Security and Risk Management
November 8, 2016
Part 1 explores a broad spectrum of security and privacy concepts, governance principles, global legal and regulatory environments, personnel security requirements, and third-party due diligence and oversight. Part 2 explores an array of risk management topics.
Lesson 1: Security and Risk Management
1. Lesson 1: Security and Risk Management
November 8, 2016
Part 1 explores a broad spectrum of security and privacy concepts, governance principles, global legal and regulatory environments, personnel security requirements, and third-party due diligence and oversight. Part 2 explores an array of risk management topics.
Description
  • Premiere Date
    November 8, 2016