Video description
The fast, powerful way to prepare for your CISSP exam!
30+ hours of personal video training from leading security
expert Shon Harris
Achieving the (ISC)2’s globally recognized CISSP can give
your IT career a lift. In this DVD, the world’s #1 CISSP trainer
brings her legendary five-day boot camp to your computer screen.
Packed with over 30 hours of instruction adapted from Shon’s
classes, this video course includes realistic labs, scenarios, case
studies, and animations designed to build and test your knowledge
in real-word settings. Preparing for the CISSP has never been this
easy or convenient.
Master the skills and concepts you need for all ten CISSP
common body of knowledge domains:
Access Control
Application Security
Business Continuity and Disaster Recovery Planning
Cryptography
Information Security and Risk Management
Legal, Regulations, Compliance, and Investigations
Operations Security
Physical (Environmental) Security
Security Architecture and Design
Telecommunications and Network Security
System Requirements
OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4
(Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card
with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more
Table of Contents
Course Introduction
00:07:24
Domain 1 – Information Security and Risk Management
00:01:32
Mainframe Days
00:03:17
Today’s Environment
00:01:36
Security Definitions
00:02:01
Examples of Some Vulnerabilities that Are Not Always Obvious
00:02:10
Risk – What Does It Really Mean?
00:02:10
Relationships
00:02:02
Who Deals with Risk?
00:03:32
AIC Triad
00:03:33
Who Is Watching?
00:02:05
Social Engineering
00:04:06
What Security People Are Really Thinking
00:01:14
Security Concepts
00:01:00
Security?
00:04:57
The Bad Guys Are Motivated
00:02:38
Open Standards
00:01:56
Without Standards
00:01:04
Controls
00:04:42
Holistic Security
00:03:38
Different Types of Law
00:03:22
How Is Liability Determined?
00:01:22
Due Diligence and Due Care
00:02:01
Prudent Person Rule
00:05:14
Risk Management
00:06:34
Planning Stage –Scope
00:02:04
Planning Stage – Analysis Method
00:01:01
Risk Management Tools
00:01:50
Defining Acceptable Levels
00:02:24
Acceptable Risk Level
00:00:52
Collecting and Analyzing Data Methods
00:01:04
What Is a Company Asset?
00:00:48
Data Collection – Identify Assets
00:01:01
Data Collection – Assigning Values
00:01:34
Asset Value
00:01:03
Data Collection – Identify Threats
00:01:20
Data Collection – Calculate Risks
00:01:38
Scenario Based – Qualitative
00:00:43
Risk Approach
00:00:40
Qualitative Analysis Steps
00:00:56
Want Real Answers?
00:00:53
Qualitative Risk Analysis
00:03:17
ARO Values
00:07:46
Can a Purely Quantitative Analysis Be Accomplished?
00:01:25
Risk Types
00:00:39
Losses
00:01:25
Cost/Benefit Analysis
00:00:58
Cost of a Countermeasure
00:01:21
Cost/Benefit Analysis Countermeasure Criteria
00:02:55
Calculating Cost/Benefit
00:01:01
Controls II
00:02:01
Quantitative Analysis
00:02:58
Can You Get Rid of All Risk?
00:02:34
Uncertainty Analysis
00:01:11
Dealing with Risk
00:01:20
Management’s Response to Identified Risks
00:01:51
Risk Acceptance
00:01:42
Risk Analysis Process Summary
00:01:08
Components of Security Program
00:00:49
A Layered Approach
00:01:22
In Security, You Never Want Any Surprises
00:00:52
Building Foundation
00:00:46
Security Roadmap
00:03:30
Functional and Assurance Requirements
00:00:56
Most Organizations
00:04:14
Silo Security Structure
00:02:27
Security Is a Process
00:01:06
Approach to Security Management
00:01:05
Result of Battling Management
00:00:27
Industry Best Practices Standards
00:01:29
Pieces and Parts
00:00:54
Numbering
00:01:11
New ISO Standards
00:01:27
COBIT
00:02:23
Measurements
00:00:29
Information Technology Infrastructure Library
00:01:54
Security Governance
00:05:00
Security Program Components
00:00:28
Policy Framework
00:05:13
Standards
00:03:32
Data Collection for Metrics
00:02:26
Tying Them Together
00:01:45
Entity Relationships
00:00:13
Senior Management’s Role
00:01:05
Security Roles
00:04:07
Information Classification
00:00:55
Data Leakage
00:00:45
Do You Want to End Up In the News?
00:00:53
Types of Classification Levels
00:00:47
Data Protection Levels
00:00:53
Classification Program Steps
00:03:04
Classification Levels
00:03:14
Information Owner Requirements
00:00:50
Clearly Labeled
00:01:01
Testing Classification Program
00:00:59
Employee Management
00:00:18
Employee Position and Management
00:00:47
Hiring and Firing Issues
00:02:36
Unfriendly Termination
00:02:13
Security Awareness and Training
00:01:52
Training Characteristics
00:01:13
Security Enforcement Issues
00:00:53
Answer This Question
00:02:19
Domain 1 Review
00:03:12