Published 12/2022MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 1.78 GB | Duration: 1h 47m
The objective of this course series "Concepts of CISSP" is to cover CISSP domains in the most effective way possible. What you'll learn Understand domain 2 "Asset Security" of CISSP Get in depth practical insight into all topics, key definitions and concepts Able to memorise key points and get prepared for CISSP exam Able to get ready for Cybersecurity interviews Requirements Basic IT background Description Do you feel CISSP certification is difficult?This course will make CISSP certification fun and easy. This module of "Concepts of CISSP" series will cover domain2. We will be releasing separate domains as separate modules.Welcome to CISSP. CISSP is one of the most reputable courses in the world of information security. The CISSP covers the fundamental elements of the entire cybersecurity field – from security and risk management to communication and network security to security testing and operations. The CISSP is designed for security professionals who have spent a few years in the industry, are currently in an information security position, and want to study cybersecurity leadership and operations.We will cover CISSP syllabus here and will focus on topics to explore core concepts, looking at the wider landscape and see tips and tricks for exams questions.I will be presenting drawings and whiteboard sessions to better engage with you and make the entire journey fun. The main goal of my course is to make the material as vivid as possible.Please note that the CISSP exam outline documented on CISSP website may not appear exactly same in my video discussions. The reason is because some of the topics are already discussed in the videos and we have overlapping situations. Please comment on if there is something missing or need more explanations. I will be happy to improvise by adding new content to the module.I'm hoping you'll find this training useful and enjoyable. If you happen to have any questions and further suggestions, feel free to reach out. Overview Section 1: Introduction Lecture 1 Introduction - Asset Security 1000ft bird's eye view Section 2: Asset Security | About NIST 800-88 Rev. 1 Lecture 2 Asset Security | About NIST 800-88 Rev. 1 Section 3: Data Protection Methods Lecture 3 Data Protection Methods Section 4: PII and Data Protection Methods Lecture 4 PII and Data Protection Section 5: Data Owners, Scoping and Tailoring Lecture 5 Data Owners, Scoping and Tailoring Section 6: Quick Recap and few Important Points Lecture 6 Quick Recap and few Important Points IT professionals, Security professionals, Computer science students HomePage:
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.