CISSP, Second Edition

Almost 26 hours of deep-dive training covering every objective in the latest (ISC)2 CISSP exam.

CISSP, Second Edition

Course Description

CISSP Complete Video Course is an engaging self-paced video training solution that provides learners with almost 26 hours of personal training from 2017 Cybersecurity Educator of the Year, Sari Greene. With each lesson, Sari fully explains the topics associated with each CISSP exam objective. To reinforce what you’ve learned, each lesson concludes with a 3Sec Challenge to test your knowledge and a Security-in-Action case study to demonstrate how the lesson concepts apply to real-life scenarios. This combination of teaching, testing, and application will ensure that you are prepared to take the CISSP exam. CISSP Complete Video Course from Pearson contains almost 26 hours of training with content divided into 9 modules with 65 exam objective-targeted lessons and 106 related sublessons. This title covers every objective in the ne... Read More »

CISSP Complete Video Course is an engaging self-paced video training solution that provides learners with almost 26 hours of personal training from 2017 Cybersecurity Educator of the Year, Sari Greene. With each lesson, Sari fully explains the topics associated with each CISSP exam objective. To reinforce what you’ve learned, each lesson concludes with a 3Sec Challenge to test your knowledge and a Security-in-Action case study to demonstrate how the lesson concepts apply to real-life scenarios. This combination of teaching, testing, and application will ensure that you are prepared to take the CISSP exam.

CISSP Complete Video Course from Pearson contains almost 26 hours of training with content divided into 9 modules with 65 exam objective-targeted lessons and 106 related sublessons. This title covers every objective in the newly updated (ISC)2 CISSP exam and includes screencast teaching, and applied real-world scenarios. The video lessons in this course review each exam objective, so you can use it as a complete study tool for taking the CISSP exam.

Major Sections

  • Security and Risk Management
  • Asset Security
  • Security Architecture and Engineering
  • Communication and Network Security
  • Identity and Access Management (IAM)
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security
  • Becoming a CISSP

What you will learn:

  • Every objective on the (ISC)2 CISSP exam
  • Tips to prepare for and pass the exam
  • Real-world cybersecurity skills
Read Less
Course Details:

Target Audience

Primary Audience:Anyone preparing for the (ISC)2 CISSP examination.

Secondary AudienceAnyone interested in pursuing a career in cyber security.
Certificate Info:

Type of Certification

Certificate of Completion

Format of Certification

Digital and Print

Professional Association/Affiliation

This certificate is issued by Pearson LearnIT

Method of Obtaining Certification

Upon successful completion of the course, participants will receive a certificate of completion.

Course Outline

  • Learning objectives
  • 2.1 Frameworks, Benchmarks, and Guidelines
  • 2.2 Leadership Roles and Responsibilities
  • Learning objectives
  • 3.1 Regulatory and Contractual Obligations
  • 3.2 Privacy and Data Protection
  • Learning objectives
  • 4.1 Cybercrime and Data Breaches
  • 4.2 Licensing and Intellectual Property Law
  • Lesson 1-4 Assessment
  • Learning objectives
  • 5.1 Organizational and Professional Ethics
  • Learning objectives
  • 7.1 Business Continuity Planning
  • 7.2 Business Impact Analysis
  • Learning objectives
  • 8.1 Personnel Policies and Agreements
  • Lesson 5-8 Assessment
  • Learning objectives
  • 9.1 Risk Management Concepts
  • 9.2 Risk Assessment
  • 9.3 Countermeasure Selection
  • Learning objectives
  • 10.1 Threat Modeling
  • 10.2 Attack Vectors
  • Learning objectives
  • 11.1 Supply Chain Risk Management
  • Learning objectives
  • 12.1 SETA Principles and Practices
  • 12.2 Social Engineering Training
  • Lesson 9-12 Assessment
  • Learning objectives
  • 13.1 Classification Frameworks
  • Learning objectives
  • 14.1 Asset Ownership and Management
  • Learning objectives
  • 15.1 Privacy Principles
  • Learning objectives
  • 16.1 Data Retention and Destruction
  • Learning objectives
  • 17.1 Data Security Standards and Selection
  • Learning objectives
  • 18.1 Labeling and Handling Standards
  • Lesson 13-18 Assessment
  • Learning objectives
  • 20.1 Information Security Models
  • Learning objectives
  • 21.1 Security Evaluation Models
  • Learning objectives
  • 22.1 Information Systems Security Capabilities
  • Lesson 19-22 Assessment
  • Learning objectives
  • 23.1 Traditional Computing Environments
  • 23.2 Cloud Computing
  • Learning objectives
  • 25.1 Mobile Systems Vulnerabilities
  • Learning objectives
  • 26.1 Embedded Systems Vulnerabilities
  • Lesson 23-26 Assessment
  • Learning objectives
  • 27.1 Cryptographic Fundamentals
  • 27.2 Symmetric Encryption
  • 27.3 Asymmetric Encryption
  • 27.4 Hashing and Digital Signatures
  • 27.5 PKI and Digital Certificates
  • 27.6 Cryptographic Attacks and Vulnerabilities
  • Learning objectives
  • 28.1 Physical Security Principles
  • Learning objectives
  • 29.1 Site and Facility Security Controls
  • 29.2 Environmental Issues and Controls
  • Lesson 27-29 Assessment
  • Learning objectives
  • 30.1 Network Models and IP Convergence
  • 30.2 Non-IP Multilayer Protocols
  • 30.3 Wireless Networks
  • Learning objectives
  • 31.1 Transmission and Connectivity
  • 31.2 Network Access Control Devices
  • 31.3 Endpoint Security
Learning objectives 00:00:2631.1 Transmission and Connectivity 00:17:1831.2 Network Access Control Devices 00:16:2731.3 Endpoint Security 00:09:58
  • Learning objectives
  • 32.1 Voice and Multimedia
  • 32.2 Remote Access
  • 32.3 Data Communications
  • 32.4 Virtualization and Software-defined
  • Networks
  • Lesson 30-32 Assessment
  • Learning objectives
  • 33.1 Access Control Fundamentals
  • Learning objectives
  • 34.1 Identification and Authentication
  • 34.2 Identity and Access Services
  • Learning objectives
  • 35.1 Identity Management (IdM)
  • Learning objectives
  • 36.1 Access Control Models
  • Learning objectives
  • 37.1 Identity and Access Management (IAM)
  • Lesson 33-37 Assessment
  • Learning objectives
  • 38.1 Assessment and Testing Overview
  • 38.2 Planning Engagements
  • Learning objectives
  • 39.1 Infrastructure Assessments
  • 39.2 Code Testing and Analysis
  • Learning objectives
  • 40.1 Activity and Error Reporting
  • 40.2 Information Security Continuous Monitoring
  • Learning objectives
  • 41.1 Metrics, KPIs, and Business Intelligence
  • Learning objectives
  • 42.1 Managing Third-party Audits and Examinations
  • Lesson 38-42 Assessment
  • Learning objectives
  • 43.1 Evidence Handling
  • 43.2 Forensic Investigative Techniques
  • Learning objectives
  • 44.1 Investigation Objectives and Requirements
  • Learning objectives
  • 45.1 Logging and Analysis
  • Lesson 43-45 Assessment
  • Learning objectives
  • 46.1 Configuration Management
  • Learning objectives
  • 48.1 Media Management
  • 48.2 Mobile Device Management
  • Learning objectives
  • 49.1 Incident Management Planning
  • 49.2 Incident Response
  • Lesson 46-49 Assessment
  • Learning objectives
  • 50.1 Detective and Preventative Solutions
  • 50.2 Firewalls and Filters
  • 50.3 IDS/IPS
  • 50.4 Anti-Malware Techniques
  • Learning objectives
  • 51.1 Vulnerability Management
  • 51.2 Patch Management
  • 51.3 Threat Intelligence and Information Sharing
  • Learning objectives
  • 53.1 Site Recovery Strategies
  • 53.2 Data Backup and Restoration
  • 53.3 Resiliency and Fault Tolerance
  • Lesson 50-53 Assessment
  • Learning objectives
  • 54.1 DR Planning and Response
  • Learning objectives
  • 55.1 DRP Training and Testing
  • Learning objectives
  • 57.1 Perimeter and Internal Security Controls
  • Learning objectives
  • 58.1 Personnel and Workplace Safety
  • Lesson 54-58 Assessment
  • Learning objectives
  • 59.1 Software Development Life Cycle
  • 59.2 Secure DevOps
  • Learning objectives
  • 60.1 Staging and Deployment Strategies
  • Learning objectives
  • 61.1 Assessing the Effectiveness of Software Security
  • Learning objectives
  • 62.1 Software Procurement and Acquisition
  • Learning objectives
  • 63.1 Source Code Weaknesses
  • 63.2 Secure Coding Techniques
  • Lesson 59-63 Assessment
  • Learning objectives
  • 64.1 Understanding the Exam Structure
  • 64.2 Test-Taking Strategies
  • 64.3 Preparing for Test Day
  • Learning objectives
  • 65.1 What to Expect at the Testing Center
  • 65.2 Attaining and Maintaining Your CISSP Certification

DON'T HAVE TIME?

We can send you everything you need to know about this course through email.
We respect your privacy. Your information is safe and will never be shared.