CISSP Full Course
No Student Left Behind - Enjoy FREE
A message from the instructor Fawad Bacha
How to use this course
Short Warm-up Domain 1 Introduction
Policies and Standards
Guidelines, Procedures and Baselines
Policies and Procedures Samples
What is Security Frameworks
Security Frameworks-What is ISO and IEC
Intellectual property Laws- An Introduction to Intellectual Property Laws
Intellectual property Laws- Trade Secret
Intellectual property Laws- Copyright
Intellectual property Laws- Trademark
Intellectual property Laws - Patent
Senior Management
Data Breaches and Notifications
Risk Managment-Organizational Risk Management Framework
Risk Management-Conducting Risk Assessments
Risk Management-Acceptable Level of Risk - Risk Management Options
Risk Management-Risk Management Framework-RMF
Risk Management-The Risk Management lifecycle
Risk Management-Risk Analysis and Risk Registers
Risk Management-Quantitative Risk Analysis
Types of Attackers -Anonymous
Types of Attacks and Hackers
Security Threat Model -Attack Tree
Security Threat Model and Methodology
Disaster in 3 Categories
Business Continuity Plan Part A
Business Continuity Plan Part B
Business Impact Analysis Part A
Business Impact Analysis Part B
Business Impact Analysis Part C
Personnel Security
Personnel Security 2
Personnel Security - Hiring process
Personnel Security - Onboarding
Personnel Security Employee Termination and Security Awareness Training
Ethics - CISSP Course
Domain 1 Security and Risk Managment
Quiz
Subjects and Obejcts Access
Information Life Cycle- Data Acquisition and Use
Information Life Cycle- Data Archive and Disposal
Data Classification Levels in Government
Data Classification Levels in Private Sector
Layers of Responsibility CEO CIO
Layers of Responsibility Data Owner - Custodian and Security Admin
Layers of Responsibility Auditor
Privacy is different from Security
Retention Policies
Paper Records and Disposal
Digital Records and Disposal
Protecting Privacy
Data Remanence
Types of Memory
Types of Safes
Protecting Assets – Data Loss Prevention DLP
Domain 2 Asset Security
Quiz
Short Intro of Domain 3
System Architecture
Computer Architecture and The Ring Model
Motherboard
Central Processing Unit CPU 1
CPU Thread and Processing
Buffer Overflow in Hardware and Software
Operating Systems
Virtualization
Virtualization - Hypervisor
System Security Architecture - Trusted Computing Base
System Security Architecture - Security Perimeter
System Security Architecture - Reference Monitor
Security Models Fundamental Concepts
Security Models - Bell–LaPadula Security Model
Security Models Biba Security Model
Security Models - Clark-Wilson and Non-interference Security Model
Certification vs Accreditation
Open vs Closed System
Client Based - Mobile System Security
Grid Computing and Peer to Peer Computer System
Mobile Devices Threats and Security
Cloud Computing
Cloud Computing Amazon AWS Walk-Through
IoT Embadded System
Parallel Computing
Industrial Control System - ICS Introduction
Industrial Control System ICS Remote Terminal Unit RTU - Programmable Logic Controller PLC
Distributed Control System DCS - SCADA
SCADA Threats and Security
SCADA Real Life Cyberattack
What is Cryptography
Timeline of Cryptography Part A
Timeline of Cryptography Part B
What is Cryptosystem and Algorithm
One Time Passcode Types of Cipher and Steganography
Symmetric Algorithm - DES
Symmetric Algorithm - Brute Force Attack - 3 DES
Symmetric Algorithm - AES
Asymmetric Algorithm
Introduction to Physical Security
Physical Security and Alarm and Sensor system
Front Desk Tailgating – Mantrap – Turnstiles
Contraband Check
Human or Dog Guard
Dumpster Diving
Video Surveillance System DVR NVR CCTV
Lightning Security
Fences Gates and Bollards
Types of Locks
Types of Smart Cards
Facilities Selection and Construction Check Up
Data Center
Electricity Part 1
Electricity Part 2
Fire Part 1
Fire Part 2
Domain 3 - Security Architecture and Engineering
Quiz
Short Introductions Domain 4
Network Basics and Definitions Part A
Network Basics and Definitions Part B
OSI Model
TCP_IP Model and Real World Example
TCP Further Discussion
IPv4 and IPv6 Addresses
IPv4 and IPv6 Addresses Real Life Example
Types of Ports - Analog vs Digital Signal and Asynchronous & Synchronous
Types of Cables
FHSS-Frequency Hopping Spread Spectrum - DSSS-Direct Sequence Spread Spectrum
Wireless Technology
Wireless Technology
Wireless Technology
Bluetooth and its Attacks
Best Practices for Securing WLANs
Satellite Network
Mobile Wireless Communication
Types of Network Topologies
CSMA ARP MAC_Media Access Control
Dynamic Host Configuration Protocol - DHCP and ICMP
Simple Network Management Protocol - SNMP
Domain Name System - DNS
DNS - Root Servers Around The World
Simple Mail Transfer Protocol - SMTP POP3 IMAP
Network Address Translation - NAT
What are Routers, Hubs, Switches, Bridges
What Private Branch Exchange System PBX and Phreaker - Phone Hackers
What is Firewall and Types of Firewall
What is Firewall and Types of Firewall
What is Firewall and Types of Firewall
What is a Proxy Server
What is a Honeypot
What is a VPN_ Virtual Private Network
Quiz
Introduction to Domain 5 Identity and Access Management
Subject to Objects and Access Control
Centralized and Decentralized Access Control
Authentication Something You Know Part A
Authentication Something You Know Part B
Authentication Something You Have Type 2
Authentication Something You Are Type 3
Authorization Accountability and Auditing
Identity Management System and Active Directory
Single Sign On - SSO
OAuth, SAML and Identity Provider
Kerberos - The Network Authentication Protocol
SESAME Authentication Protocol
RADIUS, DIAMETE, PAP, CHAP Authentication Protocols
Security Domain and Thin Clients
Security Domain and Auditing
Protecting Audit Logs and What is SIEM System
Access Control Mechanism - MAC and DAC
Access Control Mechanism - RBAC, ABAC and RB-RBAC
Access Control Mechanism - TACACS and Radious
Managing the Identity and Access Provisioning Life Cycle
Controlling Physical and Logical Access
Monitoring and Threats to Access Control
How long does it takes to crack your password
Domain 5 Summary
Quiz