Quantcast
Channel: Free Ebooks and Video Training
Viewing all articles
Browse latest Browse all 3192

Learnkey – CISSP Certification Course Training

$
0
0

1552d75430e418aeb36b84d2acd3989c Learnkey   CISSP Certification Course Training

Learnkey – CISSP (Certified Information Systems Security Professional) Certification Course
English | 7 CDs (ISO) | Elearning | 1.28 GB


LearnKey understands that security certification is highly desired by students. Partnering with International Information Systems Security Certification Consortium or (ISC)², enables LearnKey to compile a comprehensive CISSP course that covers the topics in the (ISC)² exam such as, Access Control Systems, Cryptography, and Security Management Practices. This enables students to confidently prepare for the (ISC)² CISSP exam.

7 CDs In ISO format

Original Source UN

LearnKey – Cissp Security Management Practices
LearnKey – CISSP Security Architecture And Models
LearnKey – CISSP Operations Security
LearnKey – CISSP Law Investigation and Ethics
LearnKey – CISSP Cryptography
LearnKey – CISSP Applications and Systems Development Security
LearnKey – CISSP Access Control Systems and Methodology

LearnKey – Cissp Security Management Practices

http://www.learnkey.com/store/images/cisspsecmanpract.asp

Session 1
Section A: Introduction
· CD Tour
· Why CISSP?
· Requirements
· Required Domains

Section B: The Security Triangle
· Securing the System
· Confidentiality
· Integrity
· Availability

Section C: Security Management Training
· Security Administration
· Organizational
· Physical Risks
· Human Risks
· Risk Management Terms
· Risk Management Options
· Legal Responsibility
· Risk Assessment Team

Section D: Risk Assessment
· Cost vs. Benefit
· Single Loss Expectancy
· Annual Loss Expectancy
· Calculating Overall Risk
· Pros & Cons
· Qualitative Assessment
· Selecting Controls

Section E: Data Classification
· Classification Criteria
· Data Responsibility
· Commercial Data
· Government Data

Section F: Security Policy
· Security Policy Types
· Standards
· Guidelines
· Procedures

Section G: Job Policies & Training
· Hiring Practices
· Termination Practices
· Job Descriptions
· Job Activities
· Security Awareness
· Tailoring Training

LearnKey – CISSP Security Architecture And Models

http://www.learnkey.com/store/images/cisspsecarchmod.asp

Session 1
Section A: Organization
· CPU
· RAM
· ROM
· Erasable PROM
· Memory Addressing
· Cache Memory
· Virtual Memory

Section B: Machine Operation
· Hardware/Software
· Machine Types
· Execution Cycle
· Scalar Processors
· CPU Types
· Capabilities

Section C: Operating Modes/Protection Mechanisms
· Operating States
· Operating Modes
· Storage Types
· Layering
· Abstraction
· Least Privilege
· Accountability
· Definitions

Section D: Evaluation Criteria
· Orange Book
· TCSEC
· Other Criteria
· International Criteria

Section E: Security Models
· State Machine Model
· Bell-LaPadula Model
· Biba Model
· Clark-Wilson Model
· Information Flow Model
· Noninterference Model

Section F: Common Flaws & Issues
· Covert Channels
· Initialization State
· Parameter Checking
· Maintenance Hooks
· Programming
· Timing Issues
· EMR

LearnKey – CISSP Operations Security

http://www.learnkey.com/store/images/cisspopersec.asp

Session 1
Section A: Administrative Management
· Duty Separation
· Least Access
· Accountability
· Privacy & Protection
· Legal Requirements
· Illegal Activities

Section B: Operation Controls
· Record Attention
· Backups
· Data Removal
· Anti-Virus
· Privileged Functions
· Resource Protection

Section C: Auditing
· Frequency
· Audit Trails
· Audit Reporting
· Sampling
· Retention

Section D: Monitoring
· Categories
· Warning Banners
· Keystroke Monitoring
· Traffic Analysis
· Trend Analysis
· Tools
· Failure Recognition

Section E: Intrusion Detection
· Intrusion Prevention
· IDS Types
· Penetration Testing
· Inappropriate Activity

Section F: Threats & Countermeasures
· Interception
· Human Factors
· Fraud & Theft
· Employee Sabotage
· Disaster Recovery
· Hackers
· Espionage
· Malicious Code

LearnKey – CISSP Law Investigation and Ethics

http://www.learnkey.com/store/images/cissplawinvestethics.as…

Session 1
Section A: Types of Computer Crime
· Military Attacks
· Business Attacks
· Financial Attacks
· Terrorist Attacks
· Grudge Attacks
· “Fun” Attacks
· Hacking/Cracking

Section B: Categories of Law
· Criminal Law
· Civil Law
· Administrative/Regulatory Law
· Intellectual Property Law
· Trade Secrets
· Copyrights
· Trademarks
· Patents

Section C: Computer Laws
· Technology Threat
· Government Intervention
· Fraud & Abuse Act
· Security Act
· Amended Security Act
· Security Reform Act
· Privacy Acts
· Patriot Act

Section D: Types of Incidents
· Incident Categories
· Scanning Incidents
· Compromise Incidents
· More Compromise Incidents
· Malicious Code Incidents
· DoS Incidents

Section E: Incident Handling
· Knowledge
· Response
· Contain Damage
· Reporting

Section F: Investigation & Evidence
· Evidence Handling
· Evidence Types
· Evidence Admissibility
· Search & Seizure

Section G: Ethics
· Code of Ethics
· Ten Commandments
· RFC 1087
· GASSP

LearnKey – CISSP Cryptography

http://www.learnkey.com/store/images/cisspcryptography.asp

Session 1
Section A: History & Goals of Cryptography
· Ancient History
· Modern History
· Confidentiality
· Integrity
· Authentication
· Non-Repudiation

Section B: Concepts & Methodologies
· Transposition Cipher
· Substitution Cipher
· Cipher Categories
· Cipher Process
· Symmetric Algorithms
· Asymmetric Alogorithms
· Message Authentication

Section C: Cryptographic Algorithms
· DES
· Triple DES
· Other Symmetric Algorithms
· AES
· Asymmetric Algorithms
· Hashing Algorithms

Section D: Cryptographic Practices
· Digital Signatures
· Signature Types
· Key Distribution
· Steganography
· Public Key Infrastructure

Section E: System Architecture
· PEM
· MOSS
· S/MIME
· SSL
· HTTPS
· SET
· IPSEC
· ISAKMP

Section F: Methods of Attack
· Brute Force
· Known Plaintext
· Chosen Ciphertext
· Chose Plaintext
· Meet-in-the-middle
· Man-in-the-middle
· Birthday
· Replay

LearnKey – CISSP Applications and Systems Development Security

http://www.learnkey.com/store/images/CISSPAppSysDevSec.asp

Session 1
Section A: Application Issues
· Software Development
· Application Environments
· Malicious Code
· Agents
· applets
· objects

Section B: Databases & Data Warehousing
· Databases
· Relational Database
· Record Identification
· Query Language
· Data Warehouses
· Aggregation
· Interference
· Polyinstantiation

Section C: Data & Information Storage
· Data Handling
· Data Storage
· Virtual Memory
· Information Retrieval
· Knowledge-based Systems

Section D: System Development Controls
· Coding Controls
· Development Life Cycle
· Design
· Certification
· Certification Standards

Section E: Security Development Controls
· Isolation Architecture
· Administration Control
· Design Control
· System Control
· Modes of Operation
· Integrity Levels
· Service Level Agreement

Section F: Malicious Code
· Players
· Viruses
· Virus Types
· OS Vulnerability
· Other Malicious Code
· Anti-virus Protection

Section G: Methods of Attack
· Brute Force
· Social Engineering
· DoS/DDoS
· Spoofing
· Pseudo Flaw
· Buffer Overflows
· TOC/TOU
· Tool Kits

LearnKey – CISSP Access Control Systems and Methodology

http://www.learnkey.com/store/images/cisspaccconsysmeth.asp

Session 1
Section A: Access Control Basics
· Access Control
· Least Privilege
· Accountability
· Physical Access
· Administrative Access
· Logical Access

Section B: Access Control Techniques
· Control Types
· Control Categories
· Security Labels
· Discretionary
· Mandatory
· Nondiscretionary
· Access Control Lists

Section C: Access Control Implementation
· Centralized Authentication
· RADIUS
· TACACS
· Decentralized
· Hybrid Model

Section D: Identification & Authentication
· Phases
· Type 1 Authentication
· Type 2 Authentication
· Type 3 Authentication
· Single Sign-on
· Kerberos
· Kerberos Process
· SESAME

Section E: Attack & Monitor
· Brute Force
· Dictionary
· Denial of Service
· Spoofing
· Man-in-the-Middle
· Monitoring
· Intrusion Detection
· Penetration Testing

With a Premium account you can download files having Fullspeed,no waiting !
[Uploaded]

http://uploaded.net/file/2evl6pj0/1989life.CISSP.part1.rar

http://uploaded.net/file/ihwozcax/1989life.CISSP.part2.rar

http://uploaded.net/file/x01keptf/1989life.CISSP.part3.rar

[Lumfile]

http://lumfile.com/td4f9i9s5h2m/1989life.CISSP.part1.rar.html

http://lumfile.com/x6uzxd6i4ze8/1989life.CISSP.part2.rar.html

http://lumfile.com/8leljldekbnh/1989life.CISSP.part3.rar.html

[Extabit]

http://extabit.com/file/279u4bs0kqr8c/1989life.CISSP.part1.rar

http://extabit.com/file/279u4bs0kquh8/1989life.CISSP.part2.rar

http://extabit.com/file/279u4bs0kquho/1989life.CISSP.part3.rar

The post Learnkey – CISSP Certification Course Training appeared first on Free Ebooks and Video Training.


Viewing all articles
Browse latest Browse all 3192

Trending Articles