• Home
  • Members
  • Team
  • Help
  • Search
  • Register
  • Login
  • Home
  • Members
  • Help
  • Search

Krafty Internet Marketing Forum Internet Marketing Tips, Tricks, Courses & Bots! Internet Marketing Special Downloads! CISSP Certification Preparation Series

 
  • 0 Vote(s) - 0 Average
CISSP Certification Preparation Series
aretr
Offline

Posting Freak

Member
Posts: 12,299
Threads: 12,299
Joined: Mar 2019
Reputation: 5
#1
07-26-2019, 05:29 AM
[Image: 0ef646939446548d86fb245f822c6e3a.jpg]

MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1H 15M | 186 MB
Genre: eLearning | Language: English

Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium (ISC). This video series will prepare you for this certification through eight clips:
Introduction. This first clip in the CISSP video series introduces you to the expert security speaker and provides an overview to the certification and the series.
Cornerstone Security Concepts. This second clip in the CISSP video series covers core CISSP concepts including the CIA Triad (Confidentiality, Integrity, and Availability), Identity, Authentication, Authorization, Non Repudiation, Least Privilege, Need to Know, Policies, Standards, Procedures, and Guidelines.
Access Control. This third clip in the CISSP video series covers the types, categories, and techniques used to determining who (or what) can access something within our environment. Access control types include Administrative, Technical, and Physical. Access control categories include Preventive, Detective, Compensating, Corrective, Deterrent, and Recovery. Access control techniques include Mandatory Access Control, Discretionary Access Control, Rule-Based Access Control, and Role-Based Access Control.
Authentication Types. This fourth clip in the CISSP video series covers Subject and Object authentication types and their importance. Authentication types are either something that you know, something you have, something you are, or someplace you are. The different types of passwords are covered including Static Passwords, Passphrases, One Time Passwords, And Dynamic Passwords. The different types of tokens are covered, including Synchronous Dynamic Tokens and Asynchronous Dynamic Tokens. Biometric controls are covered as well, including Fingerprints, Retina Scan, Iris Scan, Hand Geometric, Keyboard Dynamics, Dynamic Signature, Voice Print, and Facial Scan.
Network Security. This fifth clip in the CISSP video series covers network security concerns including the OSI Model and its seven levels of Application, Presentation, Session, Transport, Network, Data Link, and Physical. The TCP/IP protocol is covered as well, which includes Application, Transport, Internet, and Network Access. The different network protocols are explored including SSH, Telnet, DNS, HTTP, HTTPS, FTP, and S
Vulnerabilities and Threats. This sixth clip in the CISSP video series covers vulnerabilities and threats. Vulnerabilities and threats are compared and contrasted. Examples of common security vulnerabilities include Weak Passwords, Bugs, Buffer Overflows, Use of Insecure Protocols, Missing Data Encryption, SQL Injection, and Missing Proper Authentication. Common security threats include Computer Viruses (Macro, Boot Sector, Stealth, Polymorphic, and Multipartite), Worms, Trojans, and Rootkits. Common Security Threats include Adware, Spyware, DoS and DDoS Attacks, Man in the Middle Attacks, and Phishing Attacks.
Cryptography. This seventh clip in the CISSP video series explains how cryptography can protect you from attacks. The various types of cryptography are covered including Symmetric and Asymmetric Encryption. Symmetric Encryption keys include DES, 3DES, and AES. Asymmetric Encryption keys include Diffie-Hellman and Elliptic Curve. We also discuss the benefits of Hashing.
Perimeter Defense. This eighth clip in the CISSP video series focuses on perimeter defense. Administrative (Policies, Procedures, and Standards), Tech Controls (Network, Software, and Hardware), and Physical Controls (Fences, Locks, and Guards) are explored.
DOWNLOAD

Code:
http://nitroflare.com/view/B0E604C3131C570/0um38.CISSP.Certification.Preparation.Series.rar

Code:
https://rapidgator.net/file/20750a7febd1292c309a36dfaebc9dd7/0um38.CISSP.Certification.Preparation.Series.rar
« Next Oldest | Next Newest »

Users browsing this thread: 1 Guest(s)



Possibly Related Threads…
Thread Author Replies Views Last Post
  Tommy Walker - Advanced Content Marketing For Series A & B Startups Replay Bundle smack 0 450 01-14-2025, 11:19 PM
Last Post: smack
  Grant Cardone - Advanced Sales Negotiation Certification 2024 smack 0 408 01-09-2025, 11:11 PM
Last Post: smack
  Brandon Mulrenin (ReverseSelling) - Listing Agent Certification smack 0 364 12-17-2024, 11:31 AM
Last Post: smack
  Grant Cardone - Advanced Sales Negotiation Certification smack 0 487 11-10-2024, 04:57 PM
Last Post: smack
  Richard Lindner - Email Marketing Mastery Class & Certification smack 0 429 10-26-2024, 02:47 PM
Last Post: smack
  Richard Lindner - Email Marketing Mastery Class & Certification smack 0 486 07-01-2024, 06:40 PM
Last Post: smack
  Sara Noel - The BTL Site Series Bundle smack 0 403 06-27-2024, 05:17 PM
Last Post: smack
  Mike Weinberg - New Sales. Simplified. Video Coaching Series smack 0 521 06-01-2024, 10:48 PM
Last Post: smack
  The Smart Blogger - Email Marketing Certification Program smack 0 442 05-18-2024, 06:45 PM
Last Post: smack
  Dan Kennedy - Writing For Info Marketers Training & Certification Program smack 0 496 03-18-2024, 01:37 AM
Last Post: smack

  • View a Printable Version
  • Subscribe to this thread
Forum Jump:

© Designed by D&D - Powered by MyBB

Linear Mode
Threaded Mode