Information of news
  • Views: 89
  • Author: lilom
  • Date: 2-02-2013, 23:17
 (Votes #: 0)

Learnkey - CISSP Certification Course

Category: Tutorial

Download Now

Learnkey - CISSP Certification Course

Learnkey - CISSP Certification Course
English | Audio: pcm_u8, 11025 Hz, mono, 88 kb/s
AVI | Video: msrle, pal8, 619x325, 8.00 fps(r) | 1.28 GB
Genre: Video Training

LearnKey understands that security certification is highly desired by students. Partnering with International Information Systems Security Certification Consortium or (ISC)?, enables LearnKey to compile a comprehensive CISSP course that covers the topics in the (ISC)? exam such as, Access Control Systems, Cryptography, and Security Management Practices. This enables students to confidently prepare for the (ISC)? CISSP exam.

7 CDs In ISO format

Original Source UN

LearnKey - Cissp Security Management Practices
LearnKey - CISSP Security Architecture And Models
LearnKey - CISSP Operations Security
LearnKey - CISSP Law Investigation and Ethics
LearnKey - CISSP Cryptography
LearnKey - CISSP Applications and Systems Development Security
LearnKey - CISSP Access Control Systems and Methodology

LearnKey - Cissp Security Management Practices
http://www.learnkey.com/store/images/cisspsecmanpract.asp

Session 1
Section A: Introduction
CD Tour
Why CISSP?
Requirements
Required Domains

Section B: The Security Triangle
Securing the System
Confidentiality
Integrity
Availability

Section C: Security Management Training
Security Administration
Organizational
Physical Risks
Human Risks
Risk Management Terms
Risk Management Options
Legal Responsibility
Risk Assessment Team

Section D: Risk Assessment
Cost vs. Benefit
Single Loss Expectancy
Annual Loss Expectancy
Calculating Overall Risk
Pros & Cons
Qualitative Assessment
Selecting Controls

Section E: Data Classification
Classification Criteria
Data Responsibility
Commercial Data
Government Data

Section F: Security Policy
Security Policy Types
Standards
Guidelines
Procedures

Section G: Job Policies & Training
Hiring Practices
Termination Practices
Job Descriptions
Job Activities
Security Awareness
Tailoring Training

LearnKey - CISSP Security Architecture And Models
http://www.learnkey.com/store/images/cisspsecarchmod.asp

Session 1
Section A: Organization
CPU
RAM
ROM
Erasable PROM
Memory Addressing
Cache Memory
Virtual Memory

Section B: Machine Operation
Hardware/Software
Machine Types
Execution Cycle
Scalar Processors
CPU Types
Capabilities

Section C: Operating Modes/Protection Mechanisms
Operating States
Operating Modes
Storage Types
Layering
Abstraction
Least Privilege
Accountability
Definitions

Section D: Evaluation Criteria
Orange Book
TCSEC
Other Criteria
International Criteria

Section E: Security Models
State Machine Model
Bell-LaPadula Model
Biba Model
Clark-Wilson Model
Information Flow Model
Noninterference Model

Section F: Common Flaws & Issues
Covert Channels
Initialization State
Parameter Checking
Maintenance Hooks
Programming
Timing Issues
EMR

LearnKey - CISSP Operations Security
http://www.learnkey.com/store/images/cisspopersec.asp

Session 1
Section A: Administrative Management
Duty Separation
Least Access
Accountability
Privacy & Protection
Legal Requirements
Illegal Activities

Section B: Operation Controls
Record Attention
Backups
Data Removal
Anti-Virus
Privileged Functions
Resource Protection

Section C: Auditing
Frequency
Audit Trails
Audit Reporting
Sampling
Retention

Section D: Monitoring
Categories
Warning Banners
Keystroke Monitoring
Traffic Analysis
Trend Analysis
Tools
Failure Recognition

Section E: Intrusion Detection
Intrusion Prevention
IDS Types
Penetration Testing
Inappropriate Activity

Section F: Threats & Countermeasures
Interception
Human Factors
Fraud & Theft
Employee Sabotage
Disaster Recovery
Hackers
Espionage
Malicious Code

LearnKey - CISSP Law Investigation and Ethics
http://www.learnkey.com/store/images/cissplawinvestethics.as...
Session 1
Section A: Types of Computer Crime
Military Attacks
Business Attacks
Financial Attacks
Terrorist Attacks
Grudge Attacks
"Fun" Attacks
Hacking/Cracking

Section B: Categories of Law
Criminal Law
Civil Law
Administrative/Regulatory Law
Intellectual Property Law
Trade Secrets
Copyrights
Trademarks
Patents

Section C: Computer Laws
Technology Threat
Government Intervention
Fraud & Abuse Act
Security Act
Amended Security Act
Security Reform Act
Privacy Acts
Patriot Act

Section D: Types of Incidents
Incident Categories
Scanning Incidents
Compromise Incidents
More Compromise Incidents
Malicious Code Incidents
DoS Incidents

Section E: Incident Handling
Knowledge
Response
Contain Damage
Reporting

Section F: Investigation & Evidence
Evidence Handling
Evidence Types
Evidence Admissibility
Search & Seizure

Section G: Ethics
Code of Ethics
Ten Commandments
RFC 1087
GASSP

LearnKey - CISSP Cryptography
http://www.learnkey.com/store/images/cisspcryptography.asp
Session 1
Section A: History & Goals of Cryptography
Ancient History
Modern History
Confidentiality
Integrity
Authentication
Non-Repudiation

Section B: Concepts & Methodologies
Transposition Cipher
Substitution Cipher
Cipher Categories
Cipher Process
Symmetric Algorithms
Asymmetric Alogorithms
Message Authentication

Section C: Cryptographic Algorithms
DES
Triple DES
Other Symmetric Algorithms
AES
Asymmetric Algorithms
Hashing Algorithms

Section D: Cryptographic Practices
Digital Signatures
Signature Types
Key Distribution
Steganography
Public Key Infrastructure

Section E: System Architecture
PEM
MOSS
S/MIME
SSL
HTTPS
SET
IPSEC
ISAKMP

Section F: Methods of Attack
Brute Force
Known Plaintext
Chosen Ciphertext
Chose Plaintext
Meet-in-the-middle
Man-in-the-middle
Birthday
Replay

LearnKey - CISSP Applications and Systems Development Security
http://www.learnkey.com/store/images/CISSPAppSysDevSec.asp
Session 1
Section A: Application Issues
Software Development
Application Environments
Malicious Code
Agents
applets
objects

Section B: Databases & Data Warehousing
Databases
Relational Database
Record Identification
Query Language
Data Warehouses
Aggregation
Interference
Polyinstantiation

Section C: Data & Information Storage
Data Handling
Data Storage
Virtual Memory
Information Retrieval
Knowledge-based Systems

Section D: System Development Controls
Coding Controls
Development Life Cycle
Design
Certification
Certification Standards

Section E: Security Development Controls
Isolation Architecture
Administration Control
Design Control
System Control
Modes of Operation
Integrity Levels
Service Level Agreement

Section F: Malicious Code
Players
Viruses
Virus Types
OS Vulnerability
Other Malicious Code
Anti-virus Protection

Section G: Methods of Attack
Brute Force
Social Engineering
DoS/DDoS
Spoofing
Pseudo Flaw
Buffer Overflows
TOC/TOU
Tool Kits

LearnKey - CISSP Access Control Systems and Methodology
http://www.learnkey.com/store/images/cisspaccconsysmeth.asp
Session 1
Section A: Access Control Basics
Access Control
Least Privilege
Accountability
Physical Access
Administrative Access
Logical Access

Section B: Access Control Techniques
Control Types
Control Categories
Security Labels
Discretionary
Mandatory
Nondiscretionary
Access Control Lists

Section C: Access Control Implementation
Centralized Authentication
RADIUS
TACACS
Decentralized
Hybrid Model

Section D: Identification & Authentication
Phases
Type 1 Authentication
Type 2 Authentication
Type 3 Authentication
Single Sign-on
Kerberos
Kerberos Process
SESAME

Section E: Attack & Monitor
Brute Force
Dictionary
Denial of Service
Spoofing
Man-in-the-Middle
Monitoring
Intrusion Detection
Penetration Testing

Direct Download


Tags: Learnkey, Certification, Course


Learnkey - CISSP Certification Course Fast Download via Rapidshare Hotfile Fileserve Filesonic Megaupload, Learnkey - CISSP Certification Course Torrents and Emule Download or anything related.
Dear visitor, you went to website as unregistered user.
We encourage you to Register or Login to website under your name.

Add comments

Name:*
E-Mail:*
Comments:
Enter Code: *