CISSP: Certified Information Systems Security Professional Certification Video Training Course

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

What’s included

  • 62 : Lectures
  • 4h 30m 30s : Duration
video-file-formats

$14.99/24.99


Lectures
1. Lecture 1 - Information Security Goals- 3m 29s
2. Lecture 2 - Hashing- 3m 14s
3. Lecture 3 - Digital Signatures and Digital Certificates- 2m 57s
4. Lecture 4 - Availability- 3m 16s

Lectures
1. Lecture 1 - Security Governance- 3m 35s
2. Lecture 2 - Organizational Processes- 3m 30s
3. Lecture 3 - Security Roles and Responsibilities- 2m 51s
4. Lecture 4 - Control Frameworks- 4m 14s

Lectures
1. Lecture 1 - Compliance and Ethics- 3m 51s
2. Lecture 2 - Industry Specific Laws- 4m 1s
3. Lecture 3 - Compure Crimes- 2m 43s
4. Lecture 4 - Software Licensing and Export Controls- 3m 54s
5. Lecture 5 - Data Breaches and Ethics- 2m 11s

Lectures
1. Lecture 1 - Security Policy- 3m 39s
2. Lecture 2 - Common Policies and Key Principles- 4m 50s

Lectures
1. Lecture 1 - Business Continuity Planning- 2m 55s
2. Lecture 2 - Business Continuity Controls and Key Technical Concepts- 4m 30s
3. Lecture 3 - RAID Technology- 3m 5s

Lectures
1. Lecture 1 - Risk Management- 4m 39s
2. Lecture 2 - Risk Assessment Techniques- 2m 58s
3. Lecture 3 - Quantitative Risk Factors- 5m 31s
4. Lecture 4 - Risk Management Strategies- 3m 14s
5. Lecture 5 - Security Controls- 4m 21s

Lectures
1. Lecture 1 : Data Security- 4m 15s
2. Lecture 2 : Data Security Policies- 3m 54s
3. Lecture 3 : Data Security Roles- 3m 24s
4. Lecture 4 : Data Privacy- 4m 51s

Lectures
1. Lecture 1 : Developing Security Baselines- 3m 59s
2. Lecture 3 : Customizing Security Standards- 3m 18s
3. Lecture 4 : Data Encryption- 3m 48s

Lectures
1. Introduction- 1m 7s
2. Secure Design Principles- 7m 34s
3. Security Models- 5m 52s
4. Security Requirements- 8m 52s
5. Virtualization- 7m 17s
6. Cloud Computing Models- 5m 54s
7. Public Cloud Tiers- 5m 56s
8. Memory Protection- 6m 23s
9. Interface Protection- 8m 4s
10. High Availability and Fault Tolerance- 5m 51s
11. OWASP Top 10- 3m 19s
12. SQL Injection Prevention- 4m 6s
13. Cross-Site Scripting (XSS) Prevention- 3m 50s
14. Cross-Site Request Forgery (XSRF)- 2m 40s
15. Understanding Encryption- 3m 14s
16. Symmetric and Asymmetric Encryption- 6m 34s
17. Cryptography Goals- 2m 18s
18. Codes and Ciphers- 2m 57s
19. Key Lifecycle Management- 10m 25s
20. Data Encryption Standard (DES)- 3m 35s
21. Triple DES (3DES)- 3m 45s
22. AES, Blowfish, and Twofish- 8m 21s
23. RC4- 3m 4s
24. RSA Cryptography- 7m 24s
25. Elliptic-Curve and Quantum Cryptography- 3m 20s
26. Key Exchange- 3m 20s
27. Diffie-Hellman Key Exchange- 8m 24s
28. Key Escrow- 4m
29. Trust Models- 2m 58s
30. Public Key Infrastructure (PKI) and Digital Certificates- 4m 5s
31. Hash Functions- 2m 52s
32. Digital Signatures and Digital Certificates- 2m 12s

PassQueen does not provide real Microsoft exam questions. Similarly, PassQueen does not supply real Amazon exam questions. The materials offered by PassQueen lack real questions and answers of certification exams. The CFA Institute neither endorses nor assures the accuracy or quality of PassQueen content. CFA® and Chartered Financial Analyst® are registered trademarks held by the CFA Institute.

Helpful Pages

© 2025 All Rights Reserved passqueen.com.