CISSP - Online Self-Learning Training

GreyCampus I., Training for working professionals

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
79 Videos (11h 16m)
    • Awareness and Training

      3:53
    • CIA

      3:16
    • Compliance

      4:11
    • Control Frame Works

      4:33
    • Control or Security Control

      6:15
    • Intellectual Property

      1:24
    • Privacy

      2:17
    • Risk Management Brief

      5:02
    • Security Governance

      1:30
    • Vulnarability threat asset risk and impact

      8:04
    • Asset Mnagement

      5:52
    • Data Classification

      7:42
    • Data Life Cycle

      2:17
    • Data Management

      8:13
    • Data Privcy, Protection and Retention

      10:48
    • Data Security 1

      13:45
    • Data Security 2

      8:17
    • Ownership and Custodianship

      5:10
    • Access Control Machanism Basics

      8:29
    • Asymmetric Key Cryptoraphy

      14:43
    • Cloud Computing

      4:50
    • Control Frameworks

      8:14
    • Cryptogaphy Terminologies

      12:56
    • Cryptography Foundation

      11:16
    • Enterprise Architecture

      9:35
    • History Of Cryptography

      5:38
    • Key Management Practices

      11:05
    • Security evaluation Models

      6:17
    • Security Models

      11:51
    • Site, Facility Design and planning

      8:16
    • Softwar Vulnerabilities OWASP

      3:02
    • Symmetric Key Cryptography

      19:32
    • System Components

      11:55
    • Attack Phases

      8:41
    • Network Attacks

      34:35
    • Network Topologies

      4:18
    • OSI Model

      17:29
    • Protocols, Applications and Services

      11:41
    • Secure Communication Channels

      9:20
    • Securing Network Components

      18:12
    • SIEM

      4:33
    • VPN

      2:42
    • Access Control Challenges

      4:19
    • Access Control Types

      2:51
    • Biometric Systems

      10:57
    • Cloud Based Identiy and Access Management

      5:05
    • Desktop Controls

      8:20
    • IDAM

      15:04
    • Identification, Authorization and Authentication

      5:35
    • Logical Access Control

      5:58
    • Multi factor Authentication

      4:42
    • Physical Access Control

      14:17
    • SAML

      2:27
    • Single Sign On

      5:13
    • Assessment and Tesing Strategy

      6:50
    • Code Review and Testing

      26:58
    • Continuous Monitoring

      8:57
    • Internal and Third Party Audits

      10:24
    • Log Management

      12:13
    • Top Most Dangerous SW Errors Category

      3:29
    • Asset Protection

      15:22
    • Controlling Privledged Accounts

      17:10
    • DLP

      8:25
    • Incident Management and Investigations

      14:34
    • Incident Response

      2:18
    • Information Life Cycle

      2:43
    • Intrusion Detection and Prevention

      3:41
    • Personal Safety

      2:59
    • Physical Security Perimeter Security

      6:19
    • Physical Security Physical Access Control

      11:31
    • Recovery Strategy

      11:19
    • Application Development and Programming Concepts

      9:52
    • Database Management System

      18:07
    • Malware or Malicious Software

      4:58
    • SDLC Brief

      7:27
    • Security Issues in Source Code

      7:32
    • Software Devlopment Methodologies

      7:41
    • Soft development Standards

      5:49
    • TCB

      3:17

About This Class

CISSP training helps participants gain in-depth knowledge about computer security and access control systems. This training program covers a wide range of topics that will help participants in their preparation for CISSP certification exam. By attending CISSP, training participants will gain expertise on CISSP architecture. On course completion, they will gain the knowledge required for designing, building, and maintaining a secure business environment essential for an organization.

8

Students

--

Projects

GreyCampus I.

Training for working professionals

GreyCampus transforms careers through skills and certification training. We are a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management and Quality Management. We offer live-online (instructor-led online), classroom (instructor-led classroom) and e-learning (online self-learning ) courses. Our growing suite of accredited courses is constantly upgraded to address the career enhancement goals of working professional...

See full profile