Modules
1 -
Introduction
#
Lesson
Duration
Type
1.
Introduction to the CISSP
14m:55s

2.
Download your free study guide

3.
Exam Tips
17m:29s

4.
100% Pass Guarantee
4m:19s

5.
Checkpoint: Introduction

2 -
Security Management Concepts
#
Lesson
Duration
Type
1.
Security Management Concepts
4m:0s

2.
Code of Ethics
11m:57s

3.
Information Security Concepts
7m:21s

4.
Aligning Security And The Organization
8m:22s

5.
Organizational Roles and Responsibilities
14m:9s

6.
Security Awareness Training And Education
14m:10s

7.
Social Engineering
10m:21s

8.
Personnel Security Policies
15m:20s

9.
Personnel Safety and Security
9m:25s

10.
Checkpoint: Security Management Concepts

3 -
Security Governance and Compliance
#
Lesson
Duration
Type
1.
Security Governance and Compliance
3m:30s

2.
Due Care and Due Diligence
12m:35s

3.
Important Laws and Regulations
11m:32s

4.
Licensing and Property Rights
12m:23s

5.
Export and Import Controls
7m:31s

6.
Cybercrime And Data Breaches
8m:55s

7.
Determine Compliance Requirements
4m:28s

8.
Security Compliance Artifacts
14m:22s

9.
Checkpoint: Security Governance and Compliance

4 -
Risk Management
#
Lesson
Duration
Type
1.
Risk Management
3m:52s

2.
Risk Management Concepts
6m:26s

3.
Risk Response And Monitoring
7m:55s

4.
Controls and Countermeasures
9m:24s

5.
Continuous Monitoring
9m:11s

6.
Supply Chain Risk Management
9m:42s

7.
Checkpoint: Risk Management

5 -
Risk Frameworks
#
Lesson
Duration
Type
1.
Risk Frameworks Introduction
3m:2s

2.
Risk Frameworks
13m:45s

3.
NIST Cybersecurity Framework
14m:11s

4.
ISO/IEC 27001
15m:45s

5.
Understanding PCI DSS
13m:50s

6.
Understanding SABSA
16m:4s

7.
Checkpoint: Risk Frameworks

6 -
Risk Assessments
#
Lesson
Duration
Type
1.
Risk Assessments
6m:39s

2.
Understanding Risk Assessments
5m:40s

3.
Conducting Risk Assessments
15m:48s

4.
Control Assessments
13m:18s

5.
Privacy Control Assessments
17m:51s

6.
PCI DSS Assessments
14m:38s

7.
Threat Modeling Concepts
12m:22s

8.
Threat Modeling Methodologies
12m:54s

9.
Checkpoint: Risk Assessments

7 -
Asset Security
#
Lesson
Duration
Type
1.
Asset Security
6m:32s

2.
Classifying Data And Assets
16m:3s

3.
Information and Asset Handling Requirements
7m:24s

4.
Managing System Assets
6m:53s

5.
Data Roles And Responsibilities
9m:0s

6.
Managing The Data Lifecycle
9m:21s

7.
The Information System Lifecycle - Part 1
16m:13s

8.
The Information System Lifecycle - Part 2
14m:50s

9.
Checkpoint: Asset Security

8 -
Data Security Controls
#
Lesson
Duration
Type
1.
Data Security Controls
4m:26s

2.
Understanding Data States
6m:31s

3.
Security Control Frameworks
8m:32s

4.
Determining Security Controls
12m:54s

5.
Selecting Security Controls
10m:16s

6.
Data Protection Methods
7m:53s

7.
Data Retention Requirements
9m:10s

8.
Managing Data Remanence
7m:31s

9.
Checkpoint: Data Security Controls

9 -
Secure Design Principles
#
Lesson
Duration
Type
1.
Secure Design Principles
3m:50s

2.
Understanding Secure Design
13m:12s

3.
Secure Design Principles
10m:39s

4.
Zero Trust Architecture
15m:3s

5.
Privacy By Design
10m:44s

6.
System Security Capabilities
9m:30s

7.
Understanding Security Models
10m:27s

8.
Security Models - Part 1
9m:21s

9.
Security Models - Part 2
9m:51s

10.
Checkpoint: Secure Design Principles

10 -
Secure Architecture Design
#
Lesson
Duration
Type
1.
Secure Architecture Design
3m:45s

2.
System Architectures
9m:19s

3.
Database Systems
12m:41s

4.
Common Criteria
13m:45s

5.
Industrial Control Systems
7m:5s

6.
Secure Access Service Edge
10m:39s

7.
Internet of Things
4m:56s

8.
Microservices
8m:10s

9.
Embedded Systems
7m:25s

10.
High-Performance Computing
6m:7s

11.
Edge Computing Systems
7m:6s

12.
Checkpoint: Secure Architecture Design

11 -
Virtualization and Cloud Computing
#
Lesson
Duration
Type
1.
Virtualization and Cloud Computing
4m:17s

2.
Virtualized Systems
11m:9s

3.
Containerization
9m:47s

4.
Cloud Deployment Models
8m:42s

5.
Cloud Service Models
7m:48s

6.
Shared Responsibility Model
9m:44s

7.
Virtual Private Cloud
15m:52s

8.
Serverless Computing
4m:33s

9.
Checkpoint: Virtualization and Cloud Computing

12 -
Cryptographic Solutions
#
Lesson
Duration
Type
1.
Cryptographic Solutions
3m:20s

2.
Understanding Cryptography
12m:14s

3.
Cryptographic Methods
11m:39s

4.
Symmetric Ciphers
8m:37s

5.
Asymmetric Ciphers
4m:55s

6.
Quantum Cryptography
4m:44s

7.
Hash Functions
8m:54s

8.
Cryptographic Key Management
11m:21s

9.
Digital Signatures and Certificates
11m:54s

10.
Public Key Infrastructure
6m:50s

11.
Checkpoint: Cryptographic Solutions

13 -
Cryptanalytic Attacks
#
Lesson
Duration
Type
1.
Cryptanalytic Attacks
2m:32s

2.
Vulnerabilities In Cryptographic Systems
5m:7s

3.
Cryptanalytic Attacks - Part 1
7m:57s

4.
Cryptanalytic Attacks - Part 2
8m:57s

5.
Cryptanalytic Attacks - Part 3
11m:7s

6.
Checkpoint: Cryptanalytic Attacks

14 -
Physical Security
#
Lesson
Duration
Type
1.
Physical Security
3m:43s

2.
Site Design Principles
6m:12s

3.
Facility Design Principles
16m:10s

4.
Facility Security Controls
13m:16s

5.
Facility Infrastructure Security
12m:26s

6.
Fire Prevention, Detection, and Suppression
9m:37s

7.
Physical Security Controls
13m:29s

8.
Checkpoint: Physical Security

15 -
Network Components
#
Lesson
Duration
Type
1.
Network Components
3m:31s

2.
Hardware Operations
11m:40s

3.
Network Infrastructure Operations
19m:11s

4.
Transmission Media - Part 1
10m:21s

5.
Transmission Media - Part 2
8m:26s

6.
Network Monitoring
13m:25s

7.
Checkpoint: Network Components

16 -
Networking Concepts
#
Lesson
Duration
Type
1.
Networking Concepts
3m:42s

2.
TCP/IP and OSI Models
14m:0s

3.
IP Networking
17m:19s

4.
LAN Communications
17m:19s

5.
Communication Protocols
6m:58s

6.
Multilayer Protocols
3m:38s

7.
Converged Protocols
6m:58s

8.
Data Communications
12m:50s

9.
Virtualized Networks
12m:3s

10.
Checkpoint: Networking Concepts

17 -
Network Architectures
#
Lesson
Duration
Type
1.
Network Architectures
2m:53s

2.
Content Distribution Networks
4m:19s

3.
Software Defined Networks
14m:0s

4.
Application Programming Interfaces
11m:19s

5.
Network Functions Virtualization
24m:21s

6.
Checkpoint: Network Architectures

18 -
Secure Network Design
#
Lesson
Duration
Type
1.
Secure Network Design
3m:45s

2.
Transport Architecture
20m:48s

3.
Performance Metrics
16m:56s

4.
Network Traffic Flows
5m:10s

5.
Physical Network Segmentation
12m:25s

6.
Logical Network Segmentation
15m:9s

7.
Micro-Segmentation
11m:25s

8.
Edge Networks
10m:6s

9.
Checkpoint: Secure Network Design

19 -
Network Security and Attacks
#
Lesson
Duration
Type
1.
Network Security and Attacks
4m:10s

2.
Firewalls Concepts
9m:24s

3.
Types of Firewalls
11m:1s

4.
Firewall Architecture
7m:56s

5.
IP Security
7m:42s

6.
Endpoint Security
6m:19s

7.
Network Access Control
7m:51s

8.
Reconnaissance Attacks
7m:18s

9.
Spoofing and Poisoning Attacks
12m:40s

10.
Denial of Service Attacks
8m:28s

11.
Checkpoint: Network Security and Attacks

20 -
Secure Communications
#
Lesson
Duration
Type
1.
Secure Communications
3m:7s

2.
Remote Access Security
10m:39s

3.
Multimedia Collaboration
5m:3s

4.
Voice Communications
8m:34s

5.
Email Security
10m:15s

6.
Backhaul Networks
6m:14s

7.
Checkpoint: Secure Communications

21 -
Wireless Networking
#
Lesson
Duration
Type
1.
Wireless Networking Introduction
3m:13s

2.
Wireless Networks
11m:39s

3.
Wireless Network Modes
7m:9s

4.
Wireless Network Security
9m:13s

5.
Mobile Device Management
12m:51s

6.
Checkpoint: Wireless Networking

22 -
Identity Management
#
Lesson
Duration
Type
1.
Identity Management Introduction
3m:14s

2.
Establishing Identity
8m:31s

3.
Identity Management
6m:32s

4.
Federated Identity Management
8m:9s

5.
Delegated Identity Management
7m:1s

6.
Identity and Access Lifecycle
8m:54s

7.
Checkpoint: Identity Management

23 -
Authentication Mechanisms
#
Lesson
Duration
Type
1.
Authentication Mechanisms
3m:47s

2.
Authentication Systems
10m:44s

3.
Authentication Factors
7m:12s

4.
Biometric Authentication
11m:10s

5.
Single Sign On
5m:29s

6.
OAuth and OIDC
4m:31s

7.
Kerberos
8m:39s

8.
Credential Management Systems
4m:17s

9.
Just-In-Time Access
4m:37s

10.
Access Control Models - Part 1
6m:25s

11.
Access Control Models - Part 2
6m:9s

12.
Checkpoint: Authentication Mechanisms

24 -
Access and Authorization
#
Lesson
Duration
Type
1.
Access and Authorization
2m:53s

2.
Accountability
3m:30s

3.
Access Authorization
7m:48s

4.
Controlling Logical Access
4m:1s

5.
Session Management
9m:20s

6.
Password Attacks
10m:2s

7.
Checkpoint: Access and Authorization

25 -
Security Test and Assessment
#
Lesson
Duration
Type
1.
Security Test and Assessment
3m:25s

2.
Security Test And Assessment Planning
12m:34s

3.
Performance and Risk Indicators
4m:20s

4.
Collecting Security Data
5m:3s

5.
Account Management Data
4m:59s

6.
Verifying Training and Awareness
3m:46s

7.
Disaster Recovery and Business Continuity Data
6m:7s

8.
Checkpoint: Security Test and Assessment

26 -
Conduct Security Testing
#
Lesson
Duration
Type
1.
Conduct Security Testing
4m:31s

2.
Vulnerability Assessments
8m:51s

3.
Vulnerability Scanning
13m:57s

4.
Penetration Testing
7m:45s

5.
Penetration Testing Phases
7m:11s

6.
Log Reviews
7m:49s

7.
Software Testing Methods
8m:11s

8.
Software Code Reviews
3m:52s

9.
Misuse Testing
4m:5s

10.
Interface Testing
3m:36s

11.
Compliance Testing
17m:45s

12.
Test Coverage Analysis
4m:27s

13.
Analyzing Test Results
9m:57s

14.
Checkpoint: Conduct Security Testing

27 -
Detective And Preventative Measures
#
Lesson
Duration
Type
1.
Detective And Preventative Measures
3m:24s

2.
Security Operation Concepts
7m:35s

3.
Detective And Preventative Concepts
9m:14s

4.
IDS/IPS Systems
11m:22s

5.
Honeypots and Honeynets
6m:2s

6.
Malicious Software
13m:50s

7.
Anti-Malware
8m:6s

8.
Artificial Intelligence Tools
13m:34s

9.
Checkpoint: Detective And Preventative Measures

28 -
Logging and Monitoring
#
Lesson
Duration
Type
1.
Logging and Monitoring Introduction
3m:9s

2.
Logging and Monitoring
12m:17s

3.
Security Information and Event Management
8m:31s

4.
Threat Intelligence
4m:30s

5.
MITRE ATT&CK Framework
9m:51s

6.
Cyber Kill Chain
5m:32s

7.
Security Orchestration, Automation and Response
5m:22s

8.
Behavior Analytics
5m:10s

9.
Checkpoint: Logging and Monitoring

29 -
Configuration Management
#
Lesson
Duration
Type
1.
Configuration Management
3m:52s

2.
Configuration Management
10m:1s

3.
System Patch Management
8m:25s

4.
Change Control
9m:54s

5.
Software Configuration Management
8m:57s

6.
Media Management
5m:37s

7.
Checkpoint: Configuration Management

30 -
Incident Management
#
Lesson
Duration
Type
1.
Incident Management Introduction
3m:43s

2.
Incident Management
18m:47s

3.
Security Investigations
9m:23s

4.
Cyber Related Investigations
6m:15s

5.
Evidence Collection and Handling
13m:57s

6.
Digital Forensics
5m:57s

7.
Digital Forensic Incident Response
8m:49s

8.
Checkpoint: Incident Management

31 -
Business Continuity and Disaster Recovery
#
Lesson
Duration
Type
1.
Business Continuity and Disaster Recovery
3m:49s

2.
Business Continuity Planning
14m:23s

3.
Business Impact Analysis
11m:16s

4.
Disaster Recovery Planning
8m:8s

5.
Disaster Recovery Strategies
13m:53s

6.
Disaster Recovery Sites
11m:34s

7.
Data Backup Strategies
11m:19s

8.
Disaster Recovery Processes
12m:46s

9.
Disaster Recovery Testing
10m:39s

10.
Checkpoint: Business Continuity and Disaster Recovery

32 -
Software Development Security
#
Lesson
Duration
Type
1.
Software Development Security
4m:21s

2.
Software Development Lifecycle
12m:11s

3.
Software Development Methodologies Part 1
9m:23s

4.
Software Development Methodologies Part 2
9m:45s

5.
Agile Development
12m:49s

6.
DevOps and DevSecOps
13m:51s

7.
Software Maturity Models
9m:2s

8.
Software Operations And Maintenance
9m:23s

9.
Integrated Product Teams
6m:8s

10.
Code Repositories
4m:37s

11.
Checkpoint: Software Development Security

33 -
Application Security
#
Lesson
Duration
Type
1.
Application Security
4m:38s

2.
Programming Languages
9m:34s

3.
Application Security Testing
10m:1s

4.
Software Assurance
5m:7s

5.
Acquired Software Security
11m:40s

6.
Application Attacks
14m:21s

7.
OWASP Top 10 Vulnerabilities - Part 1
11m:44s

8.
OWASP Top 10 Vulnerabilities - Part 2
11m:6s

9.
OWASP Top 10 Vulnerabilities - Part 3
9m:3s

10.
Software API Security
7m:43s

11.
Secure Coding Practices
3m:55s

12.
Software-Defined Security
6m:27s

13.
Checkpoint: Application Security

34 -
Conclusion
#
Lesson
Duration
Type
1.
Conclusion
15m:53s

2.
Practice Exam
