Certified Information Systems Security Professional
Includes 84 Videos

This is the ultimate training package for IT Security. The concepts covered by the CISSP Certification Package were designed to provide a thorough understanding of security issues and how to implement and manage security policies and solutions.

Not only is the CISSP certification one of the most respected certifications available it is currently in great demand by organizations of all types. From banking and financial institutions to government and public utilities as well as high-tech and hospitality, the skills of a CISSP are needed by nearly every industry.

Ten different topics are addressed in regards to the security of information systems: Access Control Systems & Methodology; Telecommunications & Network Security; Security Management Practices; Applications & Systems Development Security; Cryptography; Security Architecture & Models; Operations Security; Business Continuity Planning; Laws, Investigations, & Ethics; and Physical Security.

You not only learn how to develop security policies for a computer network but the training also covers security of physical assets and facilities, ethics, cyber crime and business practices. The training is a great overview of everything security related without getting deep into the technical details.

Authentication, cryptography, public and private keys, wireless security and system attacks are among the many videos available from instructor Emilio Valdez. You’ll enjoy Emilio’s easy going style along with his extensive knowledge of the material. He presents the content with a combination of diagrams, examples and real-world application to provide information that you can put to use immediately.

There are 84 videos providing more than 42 hours of instruction. A basic understanding of computer networks such as the Network+ certification or equivalent knowledge is the prerequisite for this training.
CD-ROM Contents: CISSP Certification Package

- CISSP Series Intro

Access Control Systems & Methodology
- Access Control Basics
- Advanced Access Control
- Access Control Administration
- Security Models
- Authentication
- Access Control Methods
- Access Attacks
- Penetration Testing

Telecommunications & Network Security
- OSI Model
- Secure Topology
- IP Security
- Remote Access
- Network Security Devices
- Network Security Protocols
- WAN Technologies
- Security Techniques
- Email Security
- Phone Security
- Security Controls
- Web Vulnerabilities
- Physical Media

Security Management Practices
- Security Management Concepts
- Security Policy
- Protection Mechanisms
- Change Control
- Data Classification
- Risk Management
- Wireless Security
- Roles and Responsibilities
- Security Awareness/Mgt

Applications & Systems Development Security
- Database Basics
- Database Concepts
- Data Storage
- Artificial Intelligence
- System Development Lifecycle
- Security Control Architecture
- Computer Design
- Malicious Code Basics
- Malicious Code Advanced
- Web Enhancements
- Application & System Attacks

Cryptography
- Cryptography Basics
- Cryptography Algorithms
- Cryptography Strength
- Key Management
- Message Authentication
- Secret Key
- Public Key
- PKI
- Cryptography Attacks

Security Architecture & Models
- Computer Processing
- Security Architecture Concepts
- Evaluation Criteria
- Security Model Principles
- Trusted Computing Base
- Security Model Threats

Operations Security
- Administrative Management
- Anti-Virus Management
- Sensitive Information Handling
- Control Types
- Machine Types
- Resource Protection
- Auditing
- Audit Trails
- Monitoring
- Intrusion Detection
- Negative Actions

Business Continuity Planning
- Business Continuity
- Information System Backups
- Availability
- Recovery Techniques
- RAID
- Emergency Response

Laws, Investigations, & Ethics
- Types of Laws
- Information Security Laws
- Investigations
- Evidence
- Computer Crime
- Incident Handling
- Ethics

Physical Security
- Facility Requirements
- Environmental Safety
- Physical Threats

(CISSP) is a registered certification mark of the International Information Systems Security Certification Consortium, Inc



https://rapidshare.com/files/171902045/CISSP.part01.rar
https://rapidshare.com/files/171907069/CISSP.part02.rar
https://rapidshare.com/files/171907070/CISSP.part03.rar
https://rapidshare.com/files/171907072/CISSP.part04.rar
https://rapidshare.com/files/171911875/CISSP.part05.rar
https://rapidshare.com/files/171911877/CISSP.part06.rar
https://rapidshare.com/files/171911879/CISSP.part07.rar
https://rapidshare.com/files/171916389/CISSP.part08.rar
https://rapidshare.com/files/171916391/CISSP.part09.rar
https://rapidshare.com/files/171916393/CISSP.part10.rar
https://rapidshare.com/files/171918344/CISSP.part11.rar
https://rapidshare.com/files/171918345/CISSP.part12.rar