The 2023 CISSP Security & Risk Management Training Bundle

Ending In:
Add to Cart - $39.99
Add to Cart ($39.99)
$1,600
97% off
wishlist
Courses
8
Lessons
264
Enrolled
101

What's Included

Product Details

Access
Lifetime
Content
4.0 hours
Lessons
39

CISSP (Domain 1): Security & Risk Management (Advanced)

Understand the Core Concepts Around Assessing & Managing the Wide Array of Risks on Information Security

By Intellezy Learning | in Online Courses

CISSP is the gold standard for security certifications. It covers the breadth of information security’s deep technical and managerial concepts. Learning to effectively design, engineer, and manage the overall security posture of an organization. This course covers Domain 1 - Security and Risk Management. This domain is one of the most important domains in the CISSP exam. It lays the foundation, covering security concepts that all the other domains build upon. Understanding exactly what security means and the core concepts around assessing and managing the wide array of risks we face is fundamental to every domain in the CISSP.

5.0/5 average rating: ★ ★ ★ ★ ★

  • Access 39 lectures & 4 hours of content 24/7
  • Gain a clear understanding of CISSP Domain 1
  • Understand organizational processes & information security strategies
  • Protect your privacy & your identity from cyber attacks
  • Master all the risk assessment methodologies
Intellezy Learning
4.4/5 Instructor Rating: ★ ★ ★ ★

Intellezy collaborates with organizations to help implement and adopt technology to its maximum potential. From their change management consulting to their learning and development services, Intellezy uses both culture and education to drive the ROI of any organization. Their online videos and quick reference guides are designed to educate and empower individuals, right when they need it. In today’s rapidly evolving workplace, it is imperative to make sure you have the skills and expertise required to succeed. Their library, recognized by top influencers such as eLearning Journal and The Craig Weiss Group, provides dynamic and task-focused videos right at your fingertips, right when you need them.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • A basic understanding and knowledge of computers, networks, IT, and cyber security

Course Outline

  • Your First Program

  • Introduction

    • Introduction - 5:54
  • Defining Security

    • Defining Security - 4:11
  • Security Governance

    • Supporting the Goals, Mission, and Objectives of the Organization - 7:06
    • Understanding Organizational Processes - 8:59
    • Defining Security Roles and Responsibilities - 9:55
    • Understanding Information Security Strategies - 3:48
  • Designing an Effective Security Program

    • Ensuring Oversight Committee Representation - 5:16
    • Utilizing Control Frameworks - 12:46
    • Practicing Due Care and Due Diligence - 8:26
  • Compliance

    • Applying Governance, Risk Management, and Compliance - 6:27
    • Ensuring Legislative and Regulatory Compliance - 3:05
    • Complying with Privacy Requirements - 4:47
  • Global Legal and Regulatory Issues

    • Defining Computer Cyber Crime - 3:23
    • Licensing and Intellectual Property - 8:41
    • Importing Exporting and Trans-Border Data Flow - 7:01
    • Protecting Privacy - 4:00
    • Understanding Data Breaches - 3:54
    • Exploring Relevant Laws and Regulations - 3:36
  • Understanding Professional Ethics

    • Exploring Topics in Computer Ethics - 8:54
    • Understanding Codes of Ethics - 7:12
  • Developing and Implementing Security Policy

    • Defining Security Documentation - 6:42
  • Business Continuity and Disaster Recovery Requirements

    • Initiating a Business Continuity and Disaster Recovery Project - 11:09
    • Assessing Exposure to Outages - 8:30
  • Managing Personnel Security

    • Employment Candidate Screening - 4:44
    • Understanding Employment Agreements and Policies - 7:47
    • Reviewing Employee, Vendor, Consultant, and Contractor Controls - 11:17
  • Understanding Risk Management Concepts

    • Defining Organizational Risk Management Concepts - 6:06
    • Risk Management Concepts - 8:04
    • Mastering Risk Assessment Methodologies - 7:14
    • Quantitative Risk Assessments - 7:40
    • Responding to Risk - 6:27
    • Implementing Risk Countermeasures - 10:12
    • Defining Access Control Types - 13:13
    • Assessing Monitoring and Measuring Controls - 11:38
    • Discussing Risk Management Frameworks - 3:08
  • Threat Modeling

    • Threat Modeling - 7:51
  • Acquisition Strategy and Practice

    • Acquisition Strategy and Practice - 12:43
  • Security Education, Training, and Awareness

    • Security Education, Training, and Awareness - 7:09
  • Conclusion

    • Course Recap - 2:57

View Full Curriculum


Access
Lifetime
Content
2.0 hours
Lessons
30

CISSP (Domain 2): Asset Security (Advanced)

Learn About Data Standards, Classification, Regulations, Retention & Controls to Protect Organizational Value

By Intellezy Learning | in Online Courses

The asset-based nature of information and asset security: information is the means for an organization to use its assets to perform its mission. Assets include people, equipment, physical structures, services, and information that provides the organization with its primary benefit. Understanding how to protect this asset is crucial. This course will cover how asset-based security considerations affect both IT and operational teams as well as Office of Management and Budget (OMB) directives which set standards on practical management control objectives for protecting Federal Information Systems against unauthorized access or improper use

5.0/5 average rating: ★ ★ ★ ★ ★

  • Access 30 lectures & 2 hours of content 24/7
  • Learn more about the classification & ownership of information & assets
  • Classify & own information according to the asset management standards of your industry
  • Protect your organization’s assets, sensitive data & information
Intellezy Learning
4.4/5 Instructor Rating: ★ ★ ★ ★

Intellezy collaborates with organizations to help implement and adopt technology to its maximum potential. From their change management consulting to their learning and development services, Intellezy uses both culture and education to drive the ROI of any organization. Their online videos and quick reference guides are designed to educate and empower individuals, right when they need it. In today’s rapidly evolving workplace, it is imperative to make sure you have the skills and expertise required to succeed. Their library, recognized by top influencers such as eLearning Journal and The Craig Weiss Group, provides dynamic and task-focused videos right at your fingertips, right when you need them.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • A basic understanding of information security

Course Outline

  • Introduction
    • Introduction - 3:38
  • Managing Data - Determining and Maintaining Data Ownership
    • Data Policy - 2:38
    • Roles and Responsibilities - 3:28
    • Data Ownership - 2:52
    • Data Custodianship - 2:36
    • Data Quality - 6:05
    • Data Documentation and Organization - 6:30
  • Data Standards
    • Data Lifecycle Control - 5:04
    • Data Specification and Modeling - 6:05
    • Database Maintenance - 2:44
    • Data Audit - 3:45
    • Data Storage and Archiving - 3:45
  • Protecting Data
    • Security - 4:33
    • Data Access, Sharing, and Dissemination - 2:37
    • Data Publishing - 9:26
  • Classifying Information and Supporting Assets
    • Aspects of the Classification Policy - 2:55
    • Classification Policy - 7:33
    • Managing Assets - 9:04
  • Protecting Privacy
    • Laws Adopted Worldwide - 7:01
  • Ensuring Appropriate Retention
    • Media, Hardware, and Personnel - 3:29
    • Company Data Retention Policy - 2:41
  • Determining Data Security Controls
    • Data at Rest - 4:25
    • Data in Transit - 8:57
    • Baselines - 3:13
    • Scoping and Tailoring - 3:30
  • Selecting Standards
    • United States Resources - 6:43
    • International Resources - 3:20
    • National Cyber Security Framework Manual - 2:02
    • Improving Critical Infrastructure Cybersecurity - 6:34
  • Conclusion
    • Course Recap - 2:32

View Full Curriculum


Access
Lifetime
Content
5.0 hours
Lessons
64

CISSP (Domain 3): Security Engineering (Advanced)

Understand the Engineering Lifecycle & Various Models and Security Components

By Intellezy Learning | in Online Courses

CISSP is the gold standard for security certifications. It covers the breadth of information security’s deep technical and managerial concepts. Learning to effectively design, engineer, and manage the overall security posture of an organization. This course covers Domain 3 - Security Engineering. This will help you understand the engineering lifecycle and various models and security components required in data structures and physical facilities. You will also learn how cryptography fits into information security.

5.0/5 average rating: ★ ★ ★ ★ ★

  • Access 64 lectures & 5 hours of content 24/7
  • Discover the vulnerabilities of security architectures
  • Assess & mitigate vulnerabilities in systems
  • Understand the core components of networking
Intellezy Learning
4.4/5 Instructor Rating: ★ ★ ★ ★

Intellezy collaborates with organizations to help implement and adopt technology to its maximum potential. From their change management consulting to their learning and development services, Intellezy uses both culture and education to drive the ROI of any organization. Their online videos and quick reference guides are designed to educate and empower individuals, right when they need it. In today’s rapidly evolving workplace, it is imperative to make sure you have the skills and expertise required to succeed. Their library, recognized by top influencers such as eLearning Journal and The Craig Weiss Group, provides dynamic and task-focused videos right at your fingertips, right when you need them.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • A basic understanding of information security

Course Outline

  • Introduction
    • Introduction - 7:05
  • Using Security Design Principles in The Engineering Lifecycle
    • Systems Engineering - 7:43
  • Understanding Fundamental Concepts of Security Models
    • Common System Components - 9:02
    • Security Architecture - 8:55
    • Common Architecture Frameworks - 4:07
    • Introducing Types of Security Models - 4:24
    • The Bell-LaPadula Confidentiality Model - 5:45
    • The Biba Integrity Model - 5:21
    • The Clark-Wilson Integrity Model - 4:35
    • Other Types of Security Models - 4:30
    • Capturing and Analyzing Requirements - 3:49
    • Creating and Documenting Security Architecture - 3:01
  • Exploring Information Systems Security Evaluation Models
    • Common Formal Security Models - 3:42
    • Trusted Computer System Evaluation Criteria - 5:53
    • Information Technology Security Evaluation Criteria - 3:47
    • The Common Criteria - 3:55
    • Industry and International Security Implementation Guidelines - 8:31
  • Ensuring Security Capabilities of Information Systems
    • Access Control Mechanisms - 3:28
    • Secure Memory Management - 10:44
  • Discovering Vulnerabilities of Security Architectures
    • Systems - 7:18
    • Technology and Process Integration - 6:41
    • Single Point of Failure (SPOF) - 5:22
    • Client-Based Vulnerabilities - 6:56
    • Server-Based Vulnerabilities - 4:46
  • Database Security
    • Database Security - 7:11
    • Large Scale Parallel Data Systems - 3:27
    • Distributed Systems - 6:56
    • Rapid Elasticity - 8:35
    • Cryptographic Systems - 9:10
    • Stream-Based Ciphers - 11:03
    • Block Ciphers - 5:46
    • Defining Symmetric Cryptography - 4:28
    • Counter Mode Algorithms - 7:54
    • Defining Asymmetric Cryptography - 6:22
    • Asymmetric Cryptography - 6:04
    • Hashing and Hybrid Cryptography - 6:06
  • Analyzing Vulnerabilities and Threats
    • Web Based
    • Risks from Remote Computing - 2:39
    • Risks from Mobile Workers - 3:29
    • Embedded Cyber Physical Systems (CPS) - 2:47
  • The Application and Use of Cryptography
    • The History of Cryptography - 3:27
    • Emerging Technology - 2:27
    • Core Information Security Principles - 3:10
    • Additional Features of Cryptographic Systems - 2:16
    • The Cryptographic Lifecycle - 5:57
    • Public Key Infrastructure (PKI) - 8:16
    • Key Management Process - 3:03
    • Creation and Distribution of Keys
    • Digital Signatures
    • Digital Rights Management (DRM) - 3:52
    • Non-Repudiation - 0:48
    • Hashing - 6:48
    • Hash Functions - 5:33
    • Methods of Cryptanalytic Attacks
  • Site Planning
    • Roadway Design - 2:38
    • Crime Prevention through Environmental Design - 1:56
    • Windows - 3:51
    • Garages - 1:53
    • Location Threats - 7:58
  • Implementing and Operating Facilities Security
    • Federal Emergency Management Agency (FEMA) Publications - 1:43
    • Communications and Server Rooms - 2:25
    • Restricted and Work Area Security - 2:49
    • Data Center Security - 7:34
  • Conclusion
    • Course Recap - 2:11

View Full Curriculum


Access
Lifetime
Content
3.0 hours
Lessons
35

CISSP (Domain 4): Communication & Network Security (Advanced)

Understand Networking Models, Protocols, Hardware Components & Possible Attack Vectors

By Intellezy Learning | in Online Courses

The CISSP (Communication and Network Security) certification is the gold standard for Information Security professionals. It measures your ability to analyze, design, engineer, implement and manage the overall security posture of an organization. In this course, you will learn how to effectively design, engineer, and manage the overall security posture of an organization. This includes understanding networking models, protocols, hardware components, and possible attack vectors relating to information security. Additionally, this course covers IP networking and OSI & TCP/IP lower levels of the Internet Protocol Suite and how they transport data over networks.

5.0/5 average rating: ★ ★ ★ ★ ★

  • Access 35 lectures & 3 hours of content 24/7
  • Gain a clear understanding of Communication & Network Security
  • Understand the fundamental concepts of security models
  • Secure design principles for network architecture
  • Gain a deep technical & managerial focus
Intellezy Learning
4.4/5 Instructor Rating: ★ ★ ★ ★

Intellezy collaborates with organizations to help implement and adopt technology to its maximum potential. From their change management consulting to their learning and development services, Intellezy uses both culture and education to drive the ROI of any organization. Their online videos and quick reference guides are designed to educate and empower individuals, right when they need it. In today’s rapidly evolving workplace, it is imperative to make sure you have the skills and expertise required to succeed. Their library, recognized by top influencers such as eLearning Journal and The Craig Weiss Group, provides dynamic and task-focused videos right at your fingertips, right when you need them.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • A basic understanding of information security

Course Outline

  • Introduction
    • Introduction - 2:11
  • Secure Network Architecture and Design
    • Introducing OSI and TCP/IP - 9:41
    • OSI and TCP/IP Lower Layers - 13:52
    • OSI and TCP/IP Upper Layers - 8:27
    • IP Networking Part 1 - 8:44
    • IP Networking Part 2 - 12:06
    • Directory Services - 11:52
  • Implications of Multi-Layer Protocols
    • SCADA - 3:50
  • Converged Protocols
    • Implementation - 3:39
    • Voice over Internet Protocol (VoIP) - 5:05
    • Wireless - 5:37
    • Wireless Security Issues - 5:35
    • Cryptography Used to Maintain Communications Security - 8:58
  • Securing Network Components
    • Introductory Concepts - 8:33
    • Hardware - 12:08
    • Transmission Media - 4:31
    • Network Access Control Devices - 5:25
    • End Point Security - 3:27
    • Content Distribution Networks - 2:00
  • Secure Communication Channels
    • Voice - 4:15
    • Multimedia Collaboration - 2:39
    • Open Protocols, Applications, and Services - 1:53
    • Remote Access - 9:45
    • Data Communications - 9:52
    • Virtualized Networks - 5:37
  • Network Attacks
    • The Network as an Enabler of Channel of Attack - 1:58
    • The Network as a Bastion of Defense - 4:43
    • Network Security Objectives and Attack Modes - 4:58
    • Scanning Techniques - 8:05
    • Security Event Management (SEM) - 5:17
    • IP Fragmentation Attacks and Crafted Packets - 5:55
    • DOS and DDOS Attacks - 6:47
    • Spoofing - 5:43
    • Session Highjack - 2:16
  • Conclusion
    • Course Recap - 1:45

View Full Curriculum


Access
Lifetime
Content
1.0 hours
Lessons
19

CISSP (Domain 5): Identity & Access Management (Advanced)

Effectively Design, Engineer & Manage the Overall Security Posture of an Organization

By Intellezy Learning | in Online Courses

The CISSP is the gold standard for security certifications. It covers the breadth of information security’s deep technical and managerial concepts. In this course, you will learn how to effectively design and engineer the overall security posture of an organization, as well as ensure that proper interactions have occurred. You will be testing methods and procedures to verify a subject's authenticity before authorizing access, as well as learning how to mitigate potential attacks.

5.0/5 average rating: ★ ★ ★ ★ ★

  • Access 19 lectures & 1 hour of content 24/7
  • Integrate identity as a service and third-party identity services
  • Protect sensitive data & information from unauthorized people
  • Create a secure password by using single/multi-factor authentication
  • Compare the difference between role-based access control from rule-based access control
Intellezy Learning
4.4/5 Instructor Rating: ★ ★ ★ ★

Intellezy collaborates with organizations to help implement and adopt technology to its maximum potential. From their change management consulting to their learning and development services, Intellezy uses both culture and education to drive the ROI of any organization. Their online videos and quick reference guides are designed to educate and empower individuals, right when they need it. In today’s rapidly evolving workplace, it is imperative to make sure you have the skills and expertise required to succeed. Their library, recognized by top influencers such as eLearning Journal and The Craig Weiss Group, provides dynamic and task-focused videos right at your fingertips, right when you need them.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • A basic understanding and knowledge of computers, networks, IT, and cyber security

Course Outline

  • Introduction
    • Introduction - 2:54
  • Physical and Logical Access to Assets
    • Physical and Logical Access - 4:21
  • Identification and Authentication of People and Devices
    • Identification, Authentication, and Authorization - 9:34
  • Identity Management Implementation
    • Password, Account, Profile, and Directory Management - 4:39
    • Directory Technologies - 8:11
    • Single/Multi-Factor Authentication - 8:31
    • Accountability - 6:56
    • Session Management - 3:43
    • Registration and Proof of Identity - 2:25
    • Credential Management Systems - 2:58
  • Identity as a Service
    • Identity as a Service (IDaaS) - 3:44
  • Integrate Third-Party Identity Services
    • Integrating Third-Party Identity Services - 1:54
  • Implement and Manage Authorization Mechanisms
    • Role-Based Access Control - 3:29
    • Rule-Based Access Control - 3:12
    • Mandatory Access Controls (MACs) - 4:11
    • Discretionary Access Controls (DACs) - 3:09
  • Prevent or Mitigate Access Control Attacks
    • Prevent or Mitigate Access Control Attacks - 5:51
  • Identity and Access Provisioning Lifecycle
    • Identity and Access Provisioning Lifecycle - 3:37
  • Conclusion
    • Course Recap - 1:44

View Full Curriculum


Access
Lifetime
Content
1.0 hours
Lessons
10

CISSP (Domain 6): Security Assessment & Testing (Advanced)

Have Some Assurance & Insight Into Your Security Status and Needs

By Intellezy Learning | in Online Courses

This CISSP-certified course is designed for security professionals and managers responsible for setting up, administering, and securing the IT systems in their organization. This course provides comprehensive preparation for the CISSP exam (ISC). You will learn how to design, engineer, and manage organizational security programs. The course covers Topical Area 6- Security Assessment and Testing in depth. If you’re endeavoring to become a CISSP-certified professional, this course is for you!

5.0/5 average rating: ★ ★ ★ ★ ★

  • Access 10 lectures & 1 hour of content 24/7
  • Understand the effectiveness of your security measures by collecting & verifying logs
  • Verify your knowledge of software development security
  • Embark on security audits, certification, & more
  • Get to know the advantages of evaluating the effectiveness of your security measures
Intellezy Learning
4.4/5 Instructor Rating: ★ ★ ★ ★

Intellezy collaborates with organizations to help implement and adopt technology to its maximum potential. From their change management consulting to their learning and development services, Intellezy uses both culture and education to drive the ROI of any organization. Their online videos and quick reference guides are designed to educate and empower individuals, right when they need it. In today’s rapidly evolving workplace, it is imperative to make sure you have the skills and expertise required to succeed. Their library, recognized by top influencers such as eLearning Journal and The Craig Weiss Group, provides dynamic and task-focused videos right at your fingertips, right when you need them.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • A basic understanding and knowledge of computers, networks, IT, and cyber security

Course Outline

  • Introduction
    • Introduction - 4:18
  • Assessment and Test Strategies
    • Software Development as Part of System Design - 5:09
    • Log Reviews - 5:38
    • Synthetic Transactions - 2:45
    • Code Review and Testing - 11:52
    • Negative Testing/Misuse Case Testing - 5:13
    • Interface Testing - 4:36
  • Collect Security Process Data
    • Collecting Security Process Data - 3:59
  • Internal and Third-Party Audits
    • Service Organization Control (SOC) Reporting Options - 5:58
  • Conclusion
    • Course Recap - 2:00

View Full Curriculum


Access
Lifetime
Content
3.0 hours
Lessons
43

CISSP (Domain 7): Security Operations (Advanced)

Learn Incident Response & Facility Access Management

By Intellezy Learning | in Online Courses

The CISSP (Certified Information Systems Security Professional) is the gold standard for security certifications. It has been recognized around the world as a trusted label for education, skills, and experience. It’s most often pursued by people who want their work to make a difference in their industry or community. This course covers Domain 7- Security Operations. From the incident response that involves investigation of evidence to facility access management and disaster recovery planning, testing, and implementation, this domain requires putting security principles and concepts into practice.

5.0/5 average rating: ★ ★ ★ ★ ★

  • Access 43 lectures & 3 hours of content 24/7
  • Understand & comply with investigations
  • Apply foundational security operations concepts
  • Conduct logging & monitoring activities
  • Operate & maintain detective and preventative measures
Intellezy Learning
4.4/5 Instructor Rating: ★ ★ ★ ★

Intellezy collaborates with organizations to help implement and adopt technology to its maximum potential. From their change management consulting to their learning and development services, Intellezy uses both culture and education to drive the ROI of any organization. Their online videos and quick reference guides are designed to educate and empower individuals, right when they need it. In today’s rapidly evolving workplace, it is imperative to make sure you have the skills and expertise required to succeed. Their library, recognized by top influencers such as eLearning Journal and The Craig Weiss Group, provides dynamic and task-focused videos right at your fingertips, right when you need them.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • A basic understanding and knowledge of computers, networks, IT, and cyber security

Course Outline

  • Introduction
    • Introduction
  • Investigations
    • The Crime Scene - 9:20
    • Policy, Roles, and Responsibilities - 4:28
    • Incident Handling and Response - 2:37
    • Recovery Phase - 5:27
    • Evidence Collection and Processing - 4:00
    • Continuous and Egress Monitoring
    • Data Leak Loss Prevention (DLP) - 7:45
  • Provisioning of Resources through Configuration Management
    • Provisioning of Resources through Configuration Management - 6:03
  • Foundational Security Operations Concepts
    • Key Themes - 7:17
    • Controlling and Managing Privileged Accounts, Groups and Roles - 3:32
    • Separations of Duties and Responsibilities - 4:15
    • Monitor Special Privileges and Job Rotation - 3:47
    • Managing the Information Lifecycle - 5:52
    • Service Level Agreements (SLAs) - 8:25
  • Resource Protection
    • Resource Protection - 7:23
  • Incident Response
    • IR Concepts - 7:56
    • IR Phases - 5:25
  • Preventative Measures against Attacks
    • Unauthorized Disclosure - 1:40
    • Network Intrusion Detection System Architecture - 6:15
    • Other Preventative Measures against Attacks - 6:30
  • Patch and Vulnerability Management
    • Patch and Vulnerability Management - 4:14
  • Change and Configuration Management
    • Change Management - 5:10
    • Configuration Management - 3:50
    • Recovery Site Strategies - 5:41
    • System Resilience and Fault Tolerance Requirements - 10:52
  • The Disaster Recovery Process
    • Documenting the Plan - 3:17
    • Response - 2:53
    • Personnel and Communications
    • Recovery Concepts - 3:36
    • Exercise, Assess, and Maintaining the Plan - 3:09
  • Test Plan Review
    • Tabletop Exercise/Structured Walk-Through Test - 1:50
    • Walk-Through Drill/Simulation Test - 3:08
    • Functional Drill/Parallel Test - 2:05
    • Full-Interruption/Full-Scale Test - 2:44
    • Update and Maintenance of the Plan
  • Business Continuity and Other Risk Areas
    • Implementation and Operation of Perimeter Security - 5:46
  • Access Control
    • Card Types
    • Closed Circuit TV - 5:54
  • Internal Security
    • Interior Intrusion Detection Systems - 3:28
  • Building and Inside Security
    • Building and Inside Security - 6:26
  • Personnel Safety
    • Personnel Safety - 3:39
  • Conclusion
    • Course Recap - 1:45

View Full Curriculum


Access
Lifetime
Content
2.0 hours
Lessons
24

CISSP (Domain 8): Security in the Software Development Life Cycle (Advanced)

Learn Important Terminology & Concepts of Software Development

By Intellezy Learning | in Online Courses

This advanced course on Security in the Software Development Life Cycle will help you better understand and manage the overall security posture of your organization. It is a comprehensive course covering both current and emerging technologies, as well as best practices for producing secure software systems. This course provides a solid foundation for those who wish to pursue certification in this field and further their career by learning how to effectively design, engineer, and manage the overall security posture of an organization.

5.0/5 average rating: ★ ★ ★ ★ ★

  • Access 24 lectures & 2 hours of content 24/7
  • Plan each phase of SDLC for a project with minimizing the risk
  • Optimize the delivery flow of your software
  • Identify which SDLC model best suit your projects
  • Assess the effectiveness of your software security by conducting a risk analysis
Intellezy Learning
4.4/5 Instructor Rating: ★ ★ ★ ★

Intellezy collaborates with organizations to help implement and adopt technology to its maximum potential. From their change management consulting to their learning and development services, Intellezy uses both culture and education to drive the ROI of any organization. Their online videos and quick reference guides are designed to educate and empower individuals, right when they need it. In today’s rapidly evolving workplace, it is imperative to make sure you have the skills and expertise required to succeed. Their library, recognized by top influencers such as eLearning Journal and The Craig Weiss Group, provides dynamic and task-focused videos right at your fingertips, right when you need them.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • A basic understanding and knowledge of computers, networks, IT, and cyber security

Course Outline

  • Introduction
    • Introduction - 2:20
  • Software Development Security Outline
    • Development Life Cycle - 6:46
    • Maturity Models - 4:02
    • Operation and Maintenance - 4:20
  • Environment and Security Controls
    • Software Development Methods - 7:43
    • The Database and Data Warehousing Environment - 13:27
    • Database Vulnerabilities and Threats - 6:48
    • DBMS Controls - 4:01
    • Knowledge Management and Web Application Environment - 5:20
  • Security of the Software Environment
    • Applications Development and Programming Concepts - 7:11
    • The Software Environment - 13:46
    • Libraries and Toolsets - 5:32
    • Security Issues in Source Code - 7:57
    • Malicious Software (Malware) - 8:15
    • Malware Protection - 5:07
  • Software Protection Mechanisms
    • Security Kernels, Reference Monitors, and the TCB - 9:05
    • Configuration Management - 1:30
    • Security of Code Repositories - 3:45
    • Security of Application Programming Interfaces (API) - 2:27
  • Assess the Effectiveness of Software Security
    • Certification and Accreditation - 3:34
    • Auditing and Logging of Changes - 4:42
    • Risk Analysis and Mitigation - 4:44
  • Assess Software Acquisition Security
    • Assess Software Acquisition Security - 3:46
  • Conclusion
    • Course Recap - 2:33

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.