This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Information Systems Security Professional
Course Overview and Introductions
001 Certification Path Introduction (0:51)
001 Course Introduction (1:24)
001 Course Summary (8:38)
001 Introduction to Asset Security (0:26)
001 Introduction to Communication and Network Security (0:29)
001 Introduction to Identity and Access Management (0:28)
001 Introduction to Security and Risk Management (1:10)
001 Introduction to Security Architecture and Engineering (0:27)
001 Introduction to Security Assessment and Testing (0:25)
001 Introduction to Security Operations (0:32)
001 Introduction to Software Development Security (0:31)
Foundational Concepts and Core Principles
002 About the Training Architect (1:24)
002 Assessment Testing and Auditing (12:09)
002 Conclusion and Whats Next (1:05)
002 Confidentiality Integrity and Availability (6:18)
002 Information Classification and Data Roles (9:35)
002 Investigations (14:51)
002 Networking Basics and Wi-Fi (14:53)
002 Networking (0:39)
002 Physical and Logical Access Controls (14:01)
002 Secure Design Principles (14:06)
002 Software Development Lifecycle (SDLC) (13:23)
Advanced Security Concepts and Exam Preparation
003 Data Security (11:39)
003 Exam Information and Prerequisites (11:31)
003 Governance and Compliance (14:50)
003 Identification and Authentication (13:06)
003 Intelligence and Kill Chain (10:15)
003 Network Protocols (12:33)
003 Penetration Testing (9:55)
003 Security Models (15:09)
003 Security (0:27)
003 Software Coding Concepts (11:55)
Practical Security Measures and Ethical Practices
004 Asset Retention Handling and Disposal (11:07)
004 Certified Ethical Hacker (0:25)
004 Firewalls (10:22)
004 Identity Attacks and Access Lifecycle (14:59)
004 Legal Privacy and Ethics (14:44)
004 Logging and Monitoring (13:57)
004 Security Control Testing (14:00)
004 Security Controls in Development Environments (10:37)
004 System Vulnerabilities (14:39)
Data Security, Encryption, and Process Management
005 Collecting Security Process Data (11:13)
005 Asset Security Summary (5:48)
005 Databases (13:36)
005 Encryption and Hashing (14:59)
005 Implementing Authentication Systems (15:18)
005 Network Attacks (14:13)
005 Patch and Change Management (12:44)
005 Security Policies Standards Procedures and Guidelines (6:18)
Resilience, Encryption, and Secure Communication
006 Disaster Recovery (DR) (15:31)
006 Business Continuity (BC) (11:56)
006 Identity and Access Management Summary (10:49)
006 Security Assessment and Testing Summary (10:02)
006 Symmetric Encryption (13:04)
006 VPN and Secure Communication (14:07)
006 Web App Attacks (9:51)
Incident Response, Risk Management, and Secure Systems
007 Incident Management and Response (9:22)
007 Asymmetric Encryption (14:39)
007 Risk Management Concepts (13:00)
007 Secure Network Components (15:14)
007 Software Development Security Summary (13:20)
Network Security, Risk Frameworks, and Operations
008 Communication and Network Security Summary (12:45)
008 Risk Frameworks (13:30)
008 Security Operations Summary (14:43)
008 Site and Facility Security (12:18)
Security Architecture and Professional Training
009 Security Architecture and Engineering Summary (13:58)
009 Security Training (14:26)
Security and Risk Management Summary
010 Security and Risk Management Summary (8:27)
001 Introduction to Asset Security
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock