Skip to navigation
Skip to navigation
Skip to search form
Skip to login form
Skip to footer
Skip to main content
MVP189
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
PAREPOS
JAVABET99
KONTAN88
PEWE128
LAGA88
SKY99IDN
BUANA88
BOXING55
DEWISRI88
DEWISRI88
DEWISRI88
MVP189
slot mania
MVP189
situs tergacor
pg slot wallet
Accessibility options
Accessibility profiles
Visual impairment
Seizure and epileptic
Color vision deficiency
ADHD
Learning
Content adjustments
Readable font
Highlight titles
Highlight links
Stop animations
Text size
+
+ +
+ + +
Line height
+
+ +
+ + +
Text spacing
+
+ +
+ + +
Color adjustments
Dark contrast
Light contrast
High contrast
High saturation
Low saturation
Monochrome
Orientation adjustments
Reading guide
Reading Mask
Big black cursor
Big white cursor
Email: it@huph.edu.vn
Email: it@huph.edu.vn
Các khóa học
Link list
Đổi giao diện
Giao diện cũ
Giao diện mới
Learning AI
Machine Learning cơ bản
en
English
Technology
Security
CISSP - The Complete Exam Guide
0 students
Last updated
Feb 2025
Enrol now
Overview
Course content
Instructors
About the course
Show more...
Course content
Sections:
1
•
Activities:
0
•
Resources:
251
Expand all
Section 1
General
001 Introduction fEqW gitir
002 Defining Security j6gP gitir
003 Supporting the Goals Mission and Objectives of the Organization mAQo gitir
004 Understanding Organizational Processes vbJU gitir
005 Defining Security Roles and Responsibilities QabZ gitir
006 Understanding Information Security Strategies fsg5 gitir
007 Ensuring Oversight Committee Representation wRS8 gitir
008 Utilizing Control Frameworks 0B1B gitir
009 Practicing Due Care and Due Diligence Yl1E gitir
010 Applying Governance Risk Management and Compliance HLil gitir
011 Ensuring Legislative and Regulatory Compliance WNro gitir
012 Complying with Privacy Requirements VSRn gitir
013 Defining Computer Cyber Crime 2BJ1 gitir
014 Licensing and Intellectual Property 3qJw gitir
015 Importing Exporting and Trans Border Data Flow A4Zh gitir
016 Protecting Privacy B6wE gitir
017 Understanding Data Breaches dcRO gitir
018 Exploring Relevant Laws and Regulations yur5 gitir
019 Exploring Topics in Computer Ethics l5Eu gitir
020 Understanding Codes of Ethics E4SL gitir
021 Defining Security Documentation h397 gitir
022 Initiating a Business Continuity and Disaster Recovery Project 1uxK gitir
023 Assessing Exposure to Outages wuYD gitir
024 Employment Candidate Screening OGYR gitir
025 Understanding Employment Agreements and Policies eNN9 gitir
026 Reviewing Employee Vendor Consultant and Contractor Controls Hccg gitir
027 Defining Organizational Risk Management Concepts eS4r gitir
028 Risk Management Concepts ltWe gitir
029 Mastering Risk Assessment Methodologies U1O2 gitir
030 Quantitative Risk Assessments ZMnR gitir
031 Responding to Risk mnw6 gitir
032 Implementing Risk Countermeasures EiwJ gitir
033 Defining Access Control Types 6vCa gitir
034 Assessing Monitoring and Measuring Controls cdww gitir
035 Discussing Risk Management Frameworks YJbb gitir
036 Threat Modeling lOfF gitir
037 Acquisition Strategy and Practice udUH gitir
038 Security Education Training and Awareness Rcdi gitir
039 Data Policy HhHM gitir
040 Roles and Responsibilities 9CmK gitir
041 Data Ownership 2aST gitir
042 Data Custodianship a1S3 gitir
043 Data Quality rDBw gitir
044 Data Documentation and Organization zNMb gitir
045 Data Lifecycle Control UlQU gitir
046 Data Specification and Modeling aDAt gitir
047 Database Maintenance kawm gitir
048 Data Audit 1bxC gitir
049 Data Storage and Archiving 79GL gitir
050 Data Security uhX2 gitir
051 Data Access Sharing and Dissemination 3I9h gitir
052 Data Publishing C681 gitir
053 Aspects of the Classification Policy 42n1 gitir
054 Classification Policy dC1c gitir
055 Managing Assets J06I gitir
056 Laws Adopted Worldwide Qema gitir
057 Media Hardware and Personnel TXDy gitir
058 Company Data Retention Policy Zjp5 gitir
059 Data at Rest x6Rm gitir
060 Data in Transit dBRu gitir
061 Baselines lSEs gitir
062 Scoping and Tailoring ykvg gitir
063 United States Resources eY2H gitir
064 International Resources dPFy gitir
065 National Cyber Security Framework Manual MwT7 gitir
066 Improving Critical Infrastructure Cybersecurity V3My gitir
067 Systems Engineering R3GE gitir
068 Common System Components F6ro gitir
069 Enterprise Security Architecture zULV gitir
070 Common Architecture Frameworks YviB gitir
071 Introducing Types of Security Models kDbv gitir
072 The Bell LaPadula Confidentiality Model sa5s gitir
073 The Biba Integrity Model g3B1 gitir
074 The Clark Wilson Integrity Model Zos2 gitir
075 Other Types of Security Models OYd1 gitir
076 Capturing and Analyzing Requirements 7D9Q gitir
077 Creating and Documenting Security Architecture 40LP gitir
078 Common Formal Security Models tXmH gitir
079 Trusted Computer System Evaluation Criteria XCDV gitir
080 Information Technology Security Evaluation Criteria YjTl gitir
081 The Common Criteria 9npV gitir
082 Industry and International Security Implementation Guidelines gvRl gitir
083 Access Control Mechanisms zayE gitir
084 Secure Memory Management jTI9 gitir
085 Systems CMkz gitir
086 Technology and Process Integration f02z gitir
087 Single Point of Failure SPOF Tb5g gitir
088 Client Based Vulnerabilities mkE7 gitir
089 Server Based Vulnerabilities 9q1T gitir
090 Database Security hBMV gitir
091 Large Scale Parallel Data Systems 5tTR gitir
092 Distributed Systems PR4A gitir
093 Rapid Elasticity Ynai gitir
094 Cryptographic Systems 7d5j gitir
095 Stream Based Ciphers c3YJ gitir
096 Block Ciphers BqJC gitir
097 Defining Symmetric Cryptography AsI4 gitir
098 Symmetric Cryptography qJyt gitir
099 Counter Mode Algorithms VZHB gitir
100 Defining Asymmetric Cryptography yz0x gitir
101 Asymmetric Cryptography uXYk gitir
102 Hashing and Hybrid Cryptography 7Fk9 gitir
103 Web Based Vulnerabilities and Threats J9ym gitir
104 Risks from Remote Computing L6Pr gitir
105 Risks from Mobile Workers mycA gitir
106 Embedded Cyber Physical Systems CPS tmtV gitir
107 The History of Cryptography issW gitir
108 Emerging Technology cDYw gitir
109 Core Information Security Principles OFLO gitir
110 Additional Features of Cryptographic Systems Ub49 gitir
111 The Cryptographic Lifecycle ajZl gitir
112 Public Key Infrastructure PKI mYG5 gitir
113 Key Management Process BtGO gitir
114 Creation and Distribution of Keys 684G gitir
115 Digital Signatures sl46 gitir
116 Digital Rights Management DRM 3ohd gitir
117 Non Repudiation c8oF gitir
118 Hashing CLkx gitir
119 Hash Functions C0We gitir
120 Methods of Cryptanalytic Attacks OBV2 gitir
121 Roadway Design kQXW gitir
122 Crime Prevention through Environmental Design QdDZ gitir
123 Windows sbVO gitir
124 Garages 9asO gitir
125 Location Threats EBlh gitir
126 Federal Emergency Management Agency FEMA Publications dYsG gitir
127 Communications and Server Rooms pAQ6 gitir
128 Restricted and Work Area Security 3AFX gitir
129 Data Center Security jG18 gitir
130 Introducing OSI and TCP IP 6wJB gitir
131 OSI and TCP IP Lower Layers 7GYC gitir
132 OSI and TCP IP Upper Layers iOE5 gitir
133 IP Networking Part 1 WJ4y gitir
134 IP Networking Part 2 4zRQ gitir
135 Directory Services oUkI gitir
136 SCADA CRCr gitir
137 Implementation SUh0 gitir
138 Voice over Internet Protocol VoIP ZzUH gitir
139 Wireless EJlS gitir
140 Wireless Security Issues hVfx gitir
141 Cryptography Used to Maintain Communications Security 0buM gitir
142 Introductory Concepts 8avm gitir
143 Hardware W6Tk gitir
144 Transmission Media WkGL gitir
145 Network Access Control Devices WuVD gitir
146 End Point Security DD0p gitir
147 Content Distribution Networks IAbZ gitir
148 Voice DWFX gitir
149 Multimedia Collaboration gUM0 gitir
150 Open Protocols Applications and Services Kc9F gitir
151 Remote Access 5dbO gitir
152 Data Communications MlNL gitir
153 Virtualized Networks lzmP gitir
154 The Network as an Enabler of Channel of Attack p3f9 gitir
155 The Network as a Bastion of Defense snbl gitir
156 Network Security Objectives and Attack Modes PM7p gitir
157 Scanning Techniques Nd6o gitir
158 Security Event Management SEM NW9h gitir
159 IP Fragmentation Attacks and Crafted Packets qNZG gitir
160 DOS and DDOS Attacks Wtiw gitir
161 Spoofing jvmL gitir
162 Session Highjack BRUq gitir
163 Physical and Logical Access G1gA gitir
164 Identification Authentication and Authorization SLTO gitir
165 Password Account Profile and Directory Management 1NiM gitir
166 Directory Technologies sZY0 gitir
167 Single Multi Factor Authentication x2Gd gitir
168 Accountability IqXa gitir
169 Session Management 0Azm gitir
170 Registration and Proof of Identity UhJi gitir
171 Credential Management Systems a8vL gitir
172 Identity as a Service IDaaS uBQv gitir
173 Integrating Third Party Identity Services lPb6 gitir
174 Role Based Access Control 29MT gitir
175 Rule Based Access Control hwk8 gitir
176 Mandatory Access Controls MACs iyri gitir
177 Discretionary Access Controls DACs lNbX gitir
178 Prevent or Mitigate Access Control Attacks KVfZ gitir
179 Identity and Access Provisioning Lifecycle QEqk gitir
180 Software Development as Part of System Design YwE4 gitir
181 Log Reviews 1Mlo gitir
182 Synthetic Transactions O5oW gitir
183 Code Review and Testing 01jQ gitir
184 Negative Testing Misuse Case Testing o9te gitir
185 Interface Testing Y6jq gitir
186 Collecting Security Process Data qUNX gitir
187 Service Organization Control SOC Reporting Options HfJG gitir
188 The Crime Scene M04O gitir
189 Policy Roles and Responsibilities qZTY gitir
190 Incident Handling and Response gb6v gitir
191 Recovery Phase lqvQ gitir
192 Evidence Collection and Processing KUIb gitir
193 Continuous and Egress Monitoring 65ME gitir
194 Data Leak Loss Prevention DLP Ud1s gitir
195 Provisioning of Resources through Configuration Management m80h gitir
196 Key Themes Ikpx gitir
197 Controlling and Managing Privileged Accounts Groups and Roles lYN6 gitir
198 Separations of Duties and Responsibilities Dm7O gitir
199 Monitor Special Privileges and Job Rotation NqEn gitir
200 Managing the Information Lifecycle Xc1t gitir
201 Service Level Agreements SLAs VuN5 gitir
202 Resource Protection XabL gitir
203 IR Concepts zPCp gitir
204 IR Phases kORg gitir
205 Unauthorized Disclosure z2dQ gitir
206 Network Intrusion Detection System Architecture SPmG gitir
207 Other Preventative Measures against Attacks iWub gitir
208 Patch and Vulnerability Management mUNh gitir
209 Change Management XMAJ gitir
210 Configuration Management rNZ5 gitir
211 Recovery Site Strategies Wfij gitir
212 System Resilience and Fault Tolerance Requirements bPXu gitir
213 Documenting the Plan Nhwd gitir
214 Response ir6t gitir
215 Personnel and Communications CxbW gitir
216 Recovery Concepts 26Yi gitir
217 Exercise Assess and Maintaining the Plan mLyK gitir
218 Tabletop Exercise Structured Walk Through Test TnIj gitir
219 Walk Through Drill Simulation Test rNMg gitir
220 Functional Drill Parallel Test IPid gitir
221 Full Interruption Full Scale Test uNPu gitir
222 Update and Maintenance of the Plan Yvoh gitir
223 Implementation and Operation of Perimeter Security lqkI gitir
224 Card Types lgX8 gitir
225 Closed Circuit TV cioz gitir
226 Interior Intrusion Detection Systems kBGz gitir
227 Building and Inside Security yw2H gitir
228 Personnel Safety jLaP gitir
229 Development Life Cycle y2wQ gitir
230 Maturity Models cPz9 gitir
231 Operation and Maintenance 3Oa3 gitir
232 Software Development Methods 2cah gitir
233 The Database and Data Warehousing Environment vCyX gitir
234 Database Vulnerabilities and Threats cLIE gitir
235 DBMS Controls 4YHb gitir
236 Knowledge Management and Web Application Environment 7Gig gitir
237 Applications Development and Programming Concepts eEHl gitir
238 The Software Environment cgXq gitir
239 Libraries Toolsets HlHN gitir
240 Security Issues in Source Code f2Wl gitir
241 Malicious Software Malware EPY0 gitir
242 Malware Protection gpDd gitir
243 Security Kernels Reference Monitors and the TCB dqGl gitir
244 Configuration Management 7ooi gitir
245 Security of Code Repositories JAXH gitir
246 Security of Application Programming Interfaces API c9H7 gitir
247 Certification and Accreditation AlRj gitir
248 Auditing and Logging of Changes vyQG gitir
249 Risk Analysis and Mitigation 8DJk gitir
250 Assess Software Acquisition Security NvdA gitir
251 Course Recap 0C3o gitir
Instructors
Enrolment options
CISSP - The Complete Exam Guide
Course modified date:
5 Feb 2025
Enrolled students:
There are no students enrolled in this course.
Guests cannot access this course. Please log in.
Continue
Enrol now
This course includes
Resources
Share this course
Scroll to top
×
Close
×
Close