Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Course Curriculum

  • 1

    Introduction

    • Introduction

    • Introduction to Domain 5 and 6

    • Why Should You Want to Get the CISSP Certification

    • The 8 CISSP Domains

    • Lecture Speed

    • Links, Important Topics, and Where to Focus on My Slides

  • 2

    CISSP Domain 5: Identity and Access Management (IAM)

    • Domain 5 - What We Will Be Covering

    • Introduction to Access Control

    • Type 1 Authentication - "Something You Know" or "Knowledge Factors"

    • Type 2 Authentication - "Something You Have or "Possession Factors"

    • Type 3 Authentication - "Something You Are" or "Biometrics"

    • Authorization

    • Accountability

    • Access Control Systems

    • Identity and Access Provisioning

    • Authentication Protocols

    • Domain 5 - What We Covered

    • Domain 5 - 30 Practice Questions

  • 3

    CISSP Domain 6: Security Assessment and Testing

    • Domain 6 - What We Will Be Covering

    • Domain 6 Key Concepts

    • Security Assessments

    • Security Audits

    • Security Audit Logs

    • Vulnerability Scanners

    • Penetration testing

    • Social Engineering Attacks

    • Penetration Testing Tools

    • Software Testing

    • Domain 6 - What We Covered

    • Domain 6 - 30 Practice Questions

About the instructor

IT Manager

Eric Chu

A proven and experienced IT Manager, customer-focused and equipped with a technical background. I have over 8 years’ experience in IT Service Delivery Management and leading small to medium crossfunctional teams, and over 15 years of experience in IT Training and Sales.Through my passion for technology, science, and innovation, I have fostered extensive practical knowledge of emerging technologies, complex networks, and data centre eco-systems.I have had the opportunity to work across the Asia Pacific region as an experienced Business Development Manager and IT Project Manager delivering end to end solutions.

What others have been saying about this course:

Use your Call To Action description to encourage students to sign up for your course

You may also be interested in...