Buy now
৳ 2999 ৳ 30000

Includes:
  • 12:54:01 on demand videos
  • 62 lessons
  • Access on mobile

Certified Information Systems Security Professional (CISSP)

CISSP or Certified Information System Security Professional is a globally recognized certification offered by the ISC2 (International Information Systems Security Certification Consortium). The certification validates a candidate's ability and expertise in all fields of information security.

advanced 59 students enrolled
Last updated 2020-08-20 19:00:00 bengali

Curriculam for this course
62 lessons 12:54:01 Hours
  • Introduction Preview 00:19:16
  • CISSP Resources and Introduction continues 00:11:43
  • CIA & IAAA 00:13:38
  • Information Roles & Data Classification 00:14:43
  • Risk Management 00:17:22
  • Controls, Frameworks, DD vs DC 00:15:49
  • Policy, Standard, Baseline, Procedure and Guideline 00:07:56
  • Laws, Intellectual Property 00:09:33
  • Some Important Regulations 00:12:27
  • BCP-DRP-First Part 00:10:28
  • BCP-DRP-Last Part 00:13:04
  • Data Classification 00:14:48
  • Data Remanence, Removal, Scoping and Tailoring 00:12:06
  • Memory, Change and Config Management 00:09:16
  • Cryptography introduction 00:08:05
  • Cryptography Introduction part 2 00:09:42
  • Types of Ciphers 00:09:13
  • Types of cryptography . symmetric Vs Asymmetric 00:07:25
  • Symmetric Cryptography 00:11:16
  • Asymmetric Cryptography 00:11:13
  • Hashing and Digital Signature 00:12:25
  • PKI and IPSec 00:08:22
  • Cryptographic Implementation and Attacks 00:11:59
  • Security Models 00:14:57
  • Computer System Security 00:14:35
  • Evaluation Criteria and Virtualization 00:16:06
  • Physical Security 00:13:58
  • Locks, Power, HVAC 00:12:48
  • Physical Sensors and Fire Prevention 00:12:20
  • Fundamental Network Concept 00:10:23
  • OSI Model layer 1 2 ,unicast broadcast multicast and any cast traffic 00:14:36
  • OSI model 3 4 vlap, ICMP, Routing, class, Nat and pat 00:12:30
  • OSI layer 5 6 TCP IP and common application layer 00:14:12
  • DNS , Network Attacks 00:14:12
  • Firewalls 00:09:30
  • Security Zones 00:08:31
  • Circuit and Packet Switching technology 00:11:08
  • VPN and Wireless Intro 00:12:39
  • Wireless Security, Bluetooth 00:12:06
  • Introduction Preview 00:09:48
  • Authentication- Type1 and Type 2 00:12:04
  • IAAA-Type-3, Authorization, Auditing 00:12:15
  • Centralized vs Decentralized and SSO 00:06:33
  • Kerberos 00:10:30
  • SAML, SPML, XACML, 0Auth2.0, Open ID 00:10:11
  • Access Control Models 00:11:09
  • Types of Attacks on Access Control 00:09:17
  • Access Control technologies 00:07:24
  • Introduction to domain 6 00:10:32
  • Vulnerability Assessment and Penetration Testings 00:14:47
  • Software testing 00:11:19
  • Introduction, Incident response, Type of attacks Preview 00:14:35
  • Intrusion Detection System & Intrusion Prevention Systems Preview 00:16:05
  • Logging, Monitoring, Clustering, Raid Preview 00:20:17
  • Back up BCP-DRP introduction Preview 00:16:59
  • BCP-DRP part 2 Preview 00:18:20
  • Forensics Preview 00:16:19
  • Computer attack types, Enticement, Entrapment, Ethics Preview 00:09:28
  • Introduction 00:12:29
  • SDLC 00:13:56
  • Database 00:17:37
  • Application Attacks and Viruses 00:15:47

Like Our Facebook Page
+ View More
Description
The CISSP constitutes various topics under information security studies. The final examination is based upon a Common Body of Knowledge (CBK) – a taxonomy or collection of relevant topics for IS security professionals worldwide. The CBK is a large framework of terms and principles allowing professionals worldwide to debate, discuss, and solve situations relevant to common information security understanding. The exam covers 10 different areas, including: Access controls system and methodology Systems and application security development Cryptography Disaster recovery and business continuity plans Investigation laws and ethics Security models and architectures Physical security Best management practices Networking and telecommunications security Operations security