CISSP MasterClass PRO
Anyone who has ever thought of getting CISSP Certified has at least one time gone through Sagar's CISSP MasterClass on YouTube. That's just a free preview and consists of PRE-TRAINING WEEK. There are 35 More days in the PRO Version Training including ton of Premium Class Resources. Sagar's is on a mission to create 1000 CISSP's in the year 2020. Are you ready for the challenge?
Course Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Experience Track Episode 1 - Security Frameworks (5:52)
- Experience Track Episode 2 - Terminating Employees (5:39)
- Experience Track Episode 3 - Best Tools For BCP (2:42)
- Experience Track Episode 4 - Check Your Contracts (3:43)
- Experience Track Episode 5 - Best Brand For Asset Security (2:57)
- Experience Track Episode 6 - SSO and Single Point Of Faliure (3:15)
- Experience Track Episode 7 - Hybrid Of TBAC With MAC (3:21)
- Experience Track Episode 8 - Go Deep With Vulnerabilities (2:50)
- Testing Day
Available in
days
days
after you enroll
- AIC TRIAD (16:57)
- IAAA (12:28)
- Security Governance Principles (7:40)
- Types of Evidence (4:16)
- Evidence Handling (3:27)
- Types of Law (4:50)
- Entrapment vs Enticement (3:04)
- CFAA (1:37)
- Forth Amendment of us constitution (3:43)
- ECPA (3:41)
- Security Breach Notification (1:44)
- Sarbenes Oxlay Act (3:35)
- GBLA (3:06)
- Partiot Act (2:00)
- HIPAA (1:22)
- PCI DSS (1:37)
- Intellectual Property (5:07)
- Professional Ethics (3:38)
- Legal and Regulatory (5:39)
- What is Risk (2:11)
- Risk Management Strategles (3:39)
- Risk Analysis Process (11:56)
- BCP and DRP Essentials (12:14)
- Important BCP Terms (10:11)
- Asset Evaluation (2:26)
- BIA practical (7:31)
- Security Documents (4:21)
- Sensitive Information and Media Security (6:48)
- Data Classification (3:09)
- Data Responsibility (3:54)
- Memory (6:36)
- Data Destruction (5:29)
- Data Security Controls and Frameworks (6:49)
- Important Lecture of Domain 5 (2:17)
- Security Model Access Controls (4:16)
- Security Architecture Threats ( From Domain 3 but also a part of domain 5 ) (13:15)
- Catagories of Access Controls (4:36)
- Access Control Threats (15:13)
- Single Sign-On (2:21)
- SSO Mehods (6:42)
- Central Authentication (3:02)
- Multifactor Authentication (1:48)
- IDS (6:09)
- Biometric Errors (6:53)
- Cloud Models (4:15)
- Data Life Cycle Security (2:19)
- Storage Architecture (1:39)
- Cloud Security (6:28)
- Security Audits (5:59)
- Security Logs (6:54)
- Vulnerability Assessment (7:05)
- Penetration Testing (3:31)
- Classification of Hackers (4:56)
- Types of Penetration Testing (2:43)
- Social Enginnering Elements (9:26)
- Penetration Testing Terms (4:27)
- Penetration Testing Demo (14:22)
- Domain 3 - Important Lecture (4:05)
- Computer System Architecture (6:34)
- Security Modes of Operation (2:50)
- Rings of Protection (2:04)
- Open and Closed Systems (1:44)
- Operating States (1:37)
- Recovery Procedure (1:48)
- Process Isolation (1:33)
- Information Flow Model (1:05)
- State Machine Model (3:56)
- Non Interference Model (0:47)
- Bell-LuPadula Model (2:54)
- BIBA Model (2:45)
- Clark Wilson Model (3:08)
- Take Grant Protection Model (0:58)
- Brewer Nash Model (1:24)
- Graham Denning Model (1:56)
- HRU Model (1:42)
- Lattice Model (3:33)
- TCSEC (3:05)
- TNI (1:14)
- ITSEC (2:06)
- Common Criteria (3:34)
- New Technologies (6:40)
- Virtualization (12:24)
- Fault Tolerance (8:01)
- Cryptography (13:23)
- Symmetric Cryptography (20:13)
- Asymmetric Cryptography (12:57)
- Hash (4:41)
- What else to study. in Cryptography (5:07)
- Fire (17:44)
- Humidity and Tempest (6:31)
- Important Lecture Domain 4 (3:21)
- Networking (4:31)
- Network Topologies (9:24)
- Switch Vs Hub (5:55)
- Router Vs Modem (5:04)
- Wireless (5:27)
- Firewall (17:13)
- RAID (6:22)
- Backups (6:04)
- Denial of Service (14:32)
- Attack Malware and Bad Stuff (4:22)
- TCP-IP Model (6:59)