Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Course Curriculum

  • 1

    Introduction

    • Introduction

    • Introduction to Domain 3 and 4

    • Why Should You Want to Get the CISSP Certification

    • The 8 CISSP Domains

    • Lecture Speed

    • Links, Important Topics, & Where to Focus on My Slides

  • 2

    CISSP Domain 3: Security Architecture and Engineering

    • Domain 3 - What We Will Be Covering

    • Security Models and Concepts

    • Security Evaluation Models

    • Secure System Design Concepts

    • Hardware Architecture

    • Secure Operating Systems and Software Architecture

    • Virtualization

    • IOT (Internet Of Things)

    • System Vulnerabilities, Threats, and Countermeasures

    • Web Architecture and Attacks

    • Database Security

    • Mobile Device Security

    • Industrial Control Systems

    • Introduction to Cryptography

    • The History of Cryptography

    • Symmetric Encryption

    • Asymmetric Encryption

    • Hashing

    • Attacks on our Cryptography

    • Digital Signatures

    • IPSec and PGP

    • MAC, HMAC, SSL, and TLS

    • Physical Security - Part 1

    • Physical Security - Part 2

    • Physical Security - Part 3

    • Site Selection

    • Media Storage

    • Electricity

    • Fire Suppression & Hot and Cold Aisles

    • Personnel Safety

    • The Fire Triangle and Fire Suppression

    • Domain 3 - What We Covered

    • Domain 3 - 30 practice Questions

  • 3

    CISSP Domain 4: Communications and Network Security

    • Domain 4 - What We Will Be Covering

    • Networking Basics and Definitions

    • The OSI Model

    • The TCP-IP Model

    • IP Addresses and Port Numbers - Part 1

    • IP Addresses and Port Numbers - Part 2

    • IP Support Protocols

    • Cable Types

    • LAN Topologies

    • WAN Protocols

    • SAN and VoIP Protocols

    • WIFI

    • Bluetooth

    • Layer 1 to 3 Networking Devices

    • Layer 3 Routing Protocols

    • Firewalls

    • Modems

    • Network Authentication Protocols

    • Secure Communications

    • Domain 4 - What We Covered

    • Domain 4 - 30 practice Questions

About the instructor

IT Manager

Eric Chu

A proven and experienced IT Manager, customer-focused and equipped with a technical background. I have over 8 years’ experience in IT Service Delivery Management and leading small to medium crossfunctional teams, and over 15 years of experience in IT Training and Sales.Through my passion for technology, science, and innovation, I have fostered extensive practical knowledge of emerging technologies, complex networks, and data centre eco-systems.I have had the opportunity to work across the Asia Pacific region as an experienced Business Development Manager and IT Project Manager delivering end to end solutions.

What others have been saying about this course:

Use your Call To Action description to encourage students to sign up for your course

You may also be interested in...