Network Security

CISSP Video Bundle


Course Description

This bundle includes over 11 hours of Network Security training designed to prepare you for the CISSP exam. Our downloadable video training delivers instant access to hours upon hours of quality lectures and in-depth hands-on examples. These courses are viewable on your computer or any MP4-compatible mobile device.

This training bundle includes:

This course is designed to prepare viewers for Domain 1 of the CISSP exam. Topics include Confidentiality, integrity, and availability concepts, Security governance principles, Compliance, Legal and regulatory issues, Professional ethic, Security policies, standards, procedures and guidelines. Stay tuned for the rest of the CISSP exam preparation courses releasing in the near future!

This course is designed to prepare viewers for Domain 2 of the CISSP exam. Topics include Classification, Categorization, Data Policy, Quality Control, Quality Assurance, Types of Errors, Data Quality,etc.

On the security engineering module we are going to explain the different security model types and security models such as Bell LaPadula and Biba, likewise cryptography concepts such as symmetric and asymmetric encryption will be explained and to finish the course we will be exploring physical security.

This module reviews the details of the network security, such as the OSI and the TCP models, likewise reviews network topologies, network devices and protocols working on the different OSI layers.

This module describes the different authentication mechanisms such as something you know, have and are and the importance about not just relying on a single one, the second half of this module explains the different access control technologies available nowadays.

The Security Assessment and testing module examines the different kinds of assessments that you might need to do in the security controls in order to ensure that proper measures are being applied, therefore on this we are going to review different assessments such as the ones that can be done on the technical and administrative area.

This module describes the importance of different steps when a Forensics analysis has to be carried out, so that the evidence be admissible, on the second part of the videos we will review the steps to follow when a disaster affects the companies and how they could recover from this.

Software nowadays is highly important because we can do pretty much everything with it, from controlling huge things such as airplanes to small thing like cell phones, however the industry has paid more attention to functionally rather than security, therefore on this module we are going to review how security can be added to the software creation.

  • Domain 1
    • Security & Risk Management introduction
      • Course Introduction
    • Security Concepts
      • CIA Triad
      • Identity, Authentication, Authorization, & Accounting
      • Least Privilege, Need to Know & Non-Repudiation
      • Objects & Subjects
      • Defense in Depth
    • Access control
      • Access Control Types & Categories
    • Security Attacks
      • Security Attacks
    • Personnel Security
      • Personnel Security
    • Intellectual Property
      • Intellectual Property Rights
    • Ethics & Codes
      • Ethics & Codes
    • Risk Management
      • Risk Management Concepts
      • Risk Assessment :: Part 1
      • Risk Assessment :: Part 2
      • Risk Treatment
    • Security Policy & Related Documents
      • Security Policy & Related Documents
    • Laws & Regulations
      • Laws & Regulations
  • Domain 2
    • Asset Security Introduction
      • Course Introduction
    • Ownership
      • Data Ownership
      • Information Life Cycle
    • Memory Security
      • Memory & Remanence
      • Taking Care of Data Remanence
    • Data Classification
      • Data Classification
    • Security Controls
      • Data Security Controls
    • Asset Protection
      • Protecting Assets
  • Domain 3
    • Security Engineering
      • Course Introduction
    • Securty Systems
      • Security Sytems & Architecture Vulnerabilities
    • Security Models
      • Security Models Types
      • Bell La-Padula & Biba Models
      • Security Models :: TCB
      • TCSEC & Common Criteria
    • Cryptography
      • Cryptography :: Part 1
      • Cryptography :: Part 2
    • Physical Security
      • Physical Security
  • Domain 4
    • Communication And Network Security
      • Course Introduction
      • OSI & TCP-IP Model
      • Mac & IP Addresses
      • Protocols & Utilities
      • Network Devices
      • Network Topologies
  • Domain 5
    • Identity & Access Management
      • Module Introduction
    • Authentication Controls
      • Authentication :: Something You Know
      • Authentication :: Something You Have
      • Authentication :: Something You Are
    • Access Control Technologies
      • Access Control Technologies
  • Domain 6
    • Security Assessment & Testing
      • Course Introduction
    • Auditing Controls
      • Auditing Controls :: Vulnerability Testing
      • Auditing Controls :: Penetration Testing
    • Log Assessment
      • Log Assessment
    • Software Assesment Controls
      • Software Assesment Controls
    • Administrative Assessment Controls
      • Administrative Assessment Controls
  • Domain 7
    • Security Operations
      • Course Introduction
    • Forensics
      • Forensics
      • Incident Response
    • Recovery Strategies
      • Recovery Strategies
      • Disaster Response
  • Domain 8
    • Topic
      • Course Introduction
      • Software Development Methods
      • Software Operations
      • Software Security Control
      • Software Security Acceptance
    • Regular price $399.99
    • Save