ITP Course Lab : CISSP - Certified Information Systems Security Professional
ITP Course Lab : CISSP - Certified Information Systems Security Professional
Click to enlarge
Author(s): Abernathy, Robin
ISBN No.: 9780137312863
Year: 202011
Format: E-Book
Price: $ 182.72
Status: Out Of Print

Module 1: Domain 1 Security and Risk Management Module 1: Introduction Lesson 1: Understand and Apply Concepts of Confidentiality, Integrity and Availability Lesson 1: Learning Objectives 1.1 Information Security Fundamentals Interactive Exercise: Security Fundamentals Lesson 1: Review Lesson 1 Flashcards Lesson 1 Quiz Lesson 1: Interactive Labs Lesson 2: Evaluate and Apply Security Governance Principles Lesson 2 Learning Objectives 2.1 Frameworks, Benchmarks, and Guidelines 2.2 Leadership Roles and Responsibilities Interactive Exercise: Governance Roles and Responsibilities Lesson 2: Review Lesson 2 Flashcards Lesson 2 Quiz Lesson 2: Interactive Labs Lesson 3: Determine Compliance Requirements Lesson 3 Learning Objectives 3.1 Regulatory and Contractual Obligations 3.2 Privacy and Data Protection Lesson 3: Review Lesson 3 Flashcards Lesson 3 Quiz Lesson 3: Interactive Labs Lesson 4: Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context Lesson 4 Learning Objectives 4.1 Cybercrime and Data Breaches 4.2 Licensing and Intellectual Property Law Lesson 4: Review Lesson 4 Flashcards Lesson 4 Quiz Lesson 4: Interactive Labs Lesson 1-4 Assessment Lesson 5: Understand, Adhere to and Promote Professional Ethics Lesson 5 Learning Objectives 5.


1 Organizational and Professional Ethics Lesson 5: Review Lesson 5 Flashcards Lesson 5 Quiz Lesson 5: Interactive Labs Lesson 6: Develop, Document and Implement Security Policy, Standards, Procedures and Guidelines Lesson 6 Learning Objectives 6.1 Information Security Policy Lesson 6: Review Lesson 6 Flashcards Lesson 6 Quiz Lesson 6: Interactive Labs Lesson 7: Identify, Analyze, and Prioritize Business Continuity (BC) Requirements Lesson 7 Learning Objectives 7.1 Business Continuity Planning 7.2 Business Impact Analysis Interactive Exercise: Business Impact Analysis Metrics_From AR (LMS) Lesson 7: Review Lesson 7 Flashcards Lesson 7 Quiz Lesson 7: Interactive Labs Lesson 8: Contribute to and Enforce Personnel Security Policies and Procedures Lesson 8 Learning Objectives 8.1 Personnel Policies and Agreements Lesson 8: Review Lesson 8 Flashcards Lesson 8 Quiz Lesson 8: Interactive Labs Lesson 5-8 Assessment Lesson 9: Understand and Apply Risk Management Concepts Lesson 9 Learning Objectives 9.1 Risk Management Concepts 9.2 Risk Assessment Interactive Exercise: Quantitative Assessment 9.3 Countermeasure Selection Interactive Exercise: Identifying Control Categories Lesson 9: Review Lesson 9 Flashcards Lesson 9 Quiz Lesson 9: Interactive Labs Lesson 10: Understand and Apply Threat Modeling Concepts and Methodologies Lesson 10 Learning Objectives 10.


1 Threat Modeling 10.2 Attack Vectors Exercise: Threats, Vulnerabilties and Exploits Lesson 10: Review Lesson 10 Flashcards Lesson 10 Quiz Lesson 10: Interactive Labs Lesson 11: Apply Risk Management Concepts to the Supply Chain Lesson 11 Learning Objectives 11.1 Supply Chain Risk Management Lesson 11: Review Lesson 11 Flashcards Lesson 11 Quiz Lesson 11: Interactive Labs Lesson 12: Establish and Maintain a Security Awareness, Education, and Training Program Lesson 12 Learning Objectives 12.1 SETA Principles and Practices 12.2 Social Engineering Training Interactive Exercise: Social Engineering Lesson 12: Review Lesson 12 Flashcards Lesson 12 Quiz Lesson 12: Interactive Labs Lesson 9-12 Assessment Module 2: Domain 2 Asset Security Module 2: Introduction Lesson 13: Identify and Classify Information and Assets Lesson 13 Learning Objectives 13.1 Classification Frameworks Interactive Exercise: Classification Lesson 13: Review Lesson 13 Flashcards Lesson 13 Quiz Lesson 13: Interactive Labs Lesson 14: Determine and Maintain Information and Asset Ownership Lesson 14 Learning Objectives 14.1 Asset Ownership and Management Lesson 14: Review Lesson 14 Flashcards Lesson 14 Quiz Lesson 14: Interactive Labs Lesson 15: Protect Privacy Lesson 15 Learning Objectives 15.1 Privacy Principles Interactive Exercise: Privacy Principles Lesson 15: Review Lesson 15 Flashcards Lesson 15 Quiz Lesson 15: Interactive Labs Lesson 16: Ensure Appropriate Asset Retention Lesson 16 Learning Objectives 16.


1 Data Retention and Destruction Interactive Exercise: Retention and Destruction Lesson 16: Review Lesson 16 Flashcards Lesson 16 Quiz Lesson 16: Interactive Labs Lesson 17: Determine Data Security Controls Lesson 17 Learning Objectives 17.1 Data Security Standards and Selection Lesson 17: Review Lesson 17 Flashcards Lesson 17 Quiz Lesson 17: Interactive Labs Lesson 18: Establish Information and Asset Handling Requirements Lesson 18 Learning Objectives 18.1 Labeling and Handling Standards Lesson 18: Review Lesson 18 Flashcards Lesson 18 Quiz Lesson 18: Interactive Labs Lesson 13-18 Assessment Module 3: Domain 3 Security Architecture and Engineering Module 3: Introduction Lesson 19: Implement and Manage Engineering Processes Using Secure Design Principles Lesson 19 Learning Objectives 19.1 Security Design Principles Lesson 19: Review Lesson 19 Flashcards Lesson 19 Quiz Lesson 19: Interactive Labs Lesson 20: Understand the Fundamental Concepts of Security Models Lesson 20 Learning Objectives 20.1 Information Security Models Interactive Exercise: Security Models Lesson 20: Review Lesson 20 Flashcards Lesson 20 Quiz Lesson 20: Interactive Labs Lesson 21: Select Controls Based Upon Systems Security Requirements Lesson 21 Learning Objectives 21.1 Security Evaluation Models Lesson 21: Review Lesson 21 Flashcards Lesson 21 Quiz Lesson 21: Interactive Labs Lesson 22: Understand Security Capabilities of Information Systems Lesson 22 Learning Objectives 22.1 Information Systems Security Capabilities Lesson 22: Review Lesson 22 Flashcards Lesson 22 Quiz Lesson 22: Interactive Labs Lesson 19-22 Assessment Lesson 23: Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements Lesson 23 Learning Objectives 23.1 Traditional Computing Environments 23.


2 Cloud Computing Interactive Exercise: Cloud Delivery Models Lesson 23: Review Lesson 23 Flashcards Lesson 23 Quiz Lesson 23: Interactive Labs Lesson 24: Assess and Mitigate Vulnerabilities in Web-based Systems Lesson 24 Learning Objectives 24.1 Web Vulnerabilities Interactive Exercise: Web Vulnerabilities Lesson 24: Review Lesson 24 Flashcards Lesson 24 Quiz Lesson 24: Interactive Labs Lesson 25: Assess and Mitigate Vulnerabilities in Mobile Systems Lesson 25 Learning Objectives 25.1 Mobile Systems Vulnerabilities Lesson 25: Review Lesson 25 Flashcards Lesson 25 Quiz Lesson 25: Interactive Labs Lesson 26: Assess and Mitigate Vulnerabilities in Embedded Systems Lesson 26 Learning Objectives 26.1 Embedded Systems Vulnerabilities Lesson 26: Review Lesson 26 Flashcards Lesson 26 Quiz Lesson 26: Interactive Labs Lesson 27: Apply Cryptography Lesson 27 Learning Objectives 27.1 Cryptographic Fundamentals 27.2 Symmetric Encryption Interactive Exercise: Encryption Ciphers 27.3 Asymmetric Encryption 27.4 Hashing and Digital Signatures Interactive Exercise: Digital Signatures 27.


5 PKI and Digital Certificates 27.6 Cryptographic Attacks and Vulnerabilities Interactive Exercise: Crypto Attacks Lesson 27: Review Lesson 27 Flashcards Lesson 27 Quiz Lesson 27: Interactive Labs Lesson 28: Apply Security Principles to Site and Facility Design Lesson 28 Learning Objectives 28.1 Physical Security Principles Lesson 28: Review Lesson 28 Flashcards Lesson 28 Quiz Lesson 28: Interactive Labs Lesson 29: Implement Site and Facility Se.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...