CISSP Certification: CISSP Domain 7 & 8 Video Boot Camp 2019
This is a subtitle. Get more detailed about your course here!
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.
Introduction
Introduction to Domain 7 and 8
Why Should You Want to Get the CISSP Certification
The 8 CISSP Domains
Lecture Speed
Links, Important Topics, and Where to Focus on My Slides
Domain 7 - What We Will Be Covering
Domain 7 - Key Concepts
Administrative Personnel Controls
Digital Forensics
Spinning Disk Forencics
Network and Software Forencics
Incident Management Definitions
Incident Management
Intrusion Detection and Prevention Systems
SIEM (Security Information and Event Management
Application Whitelisting
Honeynets and Honeypots
Configuration Management
Patch Management
Change Management
0-day Attacks
Backups
RAID (Redundant Array of Independent Disks).
Redundancy
BCP and DRP
Warfare, Terrorism, Sabotage, and Ransomware
Personnel
DRP Basics
Developing our BCP and DRP
BIA (Business Impact Analysis)
Supply and Infrastructure Redundancy
Disaster Recovery Sites
Other BCP Sub Plans
Employee Redundancy
Testing the Plans
After a Disruption
Domain 7 - What We Covered
Domain 7 - 30 Practice Questions
Domain 8 - What We Will Be Covering
Designing Security into Our Software
Programming Concepts
Software Development Methodologies - Part 1
Software Development Methodologies - Part 2
Databases - Part 1
Databases - Part 2
OWASP - Part 1
OWASP - Part 2
Software Vulnerabilities and Attacks
Capability Maturity Model (CMM)
Buying Software from Other Companies
Artificial Intelligence (AI)
Domain 8 - What We Covered
Domain 8 - 30 Practice Questions
Eric Chu