YoVDO

ISC2 CISSP Training Camp

Offered By: YouTube

Tags

CISSP Certification Courses Cybersecurity Courses Risk Management Courses Compliance Courses Disaster Recovery Courses Professional Ethics Courses Business Continuity Courses

Course Description

Overview

Dive into a comprehensive 7-hour training camp designed to prepare you for the ISC2 CISSP certification. Explore key cybersecurity concepts including confidentiality, integrity, and availability. Learn about security governance, developing effective security programs, and navigating compliance requirements. Examine global legal and regulatory issues in cybersecurity, and understand the importance of professional ethics. Gain practical knowledge on developing and implementing security policies, as well as managing business continuity and disaster recovery requirements. Delve into personnel security management and risk management concepts. This intensive course covers essential topics from Domain 1 of the CISSP exam, providing a solid foundation for aspiring cybersecurity professionals.

Syllabus

thinQtank Learning Training Camp - ISC2 CISSP Course Introduction.
thinQtank Learning Training Camp - ISC2 CISSP (Introduction to Domain 1).
thinQtank Learning Training Camp - ISC2 CISSP (Confidentiality, Integrity and Availability).
thinQtank Learning Training Camp - ISC2 CISSP (Security Governance).
thinQtank Learning Training Camp - ISC2 CISSP (Complete and Effective Security Program).
thinQtank Learning Training Camp - ISC2 CISSP (Compliance).
thinQtank Learning Training Camp - ISC2 CISSP (Global, Legal and Regulatory Issues).
thinQtank Learning Training Camp - ISC2 CISSP (Professional Ethics).
thinQtank Learning Training Camp - ISC2 CISSP (Develop and Implement Security Policy).
thinQtank Learning Training Camp - ISC2 CISSP (Business Continuity Disaster Recover Requirements).
thinQtank Learning Training Camp - ISC2 CISSP (Manage Personnel Security).
thinQtank Learning Training Camp - ISC2 CISSP (Risk Management Concepts Part 1).


Taught by

thinQtank Learning

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network