
CISSP Exam Study Guide For Information Security Professionals
John Knowles
★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★
IF YOUR ANSWER IS YES, BUY THIS BOOK NOW!
★ 3 AUDIOBOOKS IN 1 DEAL ★
BOOK 1 - HOW TO ESTABLISH EFFECTIVE SECURITY MANAGEMENT FUNCTIONSBOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT...
Location:
United States
Description:
★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★ IF YOUR ANSWER IS YES, BUY THIS BOOK NOW! ★ 3 AUDIOBOOKS IN 1 DEAL ★ BOOK 1 - HOW TO ESTABLISH EFFECTIVE SECURITY MANAGEMENT FUNCTIONSBOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORKBOOK 3 - ETHICAL HACKING AND WIRELESS PENETRATION TESTING WITH KALI LINUXBUY THIS BOOK NOW AND GET STARTED TODAY! BOOK 1: BOOK 2: BOOK 3: BUY THIS BOOK NOW AND GET STARTED TODAY! Duration - 14h 20m. Author - John Knowles. Narrator - Scott Clem. Published Date - Sunday, 22 January 2023. Copyright - © 2021 John Knowles ©.
Language:
English
Opening Credits
Duration:00:00:23
Introduction
Duration:00:02:55
Opening credits
Duration:00:00:18
Chapter 1 objectives of security management
Duration:00:08:26
Chapter 2 how to support security goals
Duration:00:10:56
Chapter 3 security management principles
Duration:00:13:46
Chapter 4 defense in depth
Duration:00:03:35
Chapter 5 how to apply security controls
Duration:00:05:26
Chapter 6 security control functions
Duration:00:10:12
Chapter 7 how to establish organizational governance
Duration:00:08:03
Chapter 8 security strategy & governance scenario
Duration:00:04:39
Chapter 9 information security relationships
Duration:00:03:06
Chapter 10 business, compliance, and security
Duration:00:07:08
Chapter 11 management roles and responsibilities
Duration:00:08:14
Chapter 12 security roles and responsibilities
Duration:00:03:11
Chapter 13 how to create a security management program
Duration:00:10:06
Chapter 14 security management program structure
Duration:00:02:56
Chapter 15 how to decipher the risk management program
Duration:00:08:33
Chapter 16 risk strategy fundamentals
Duration:00:03:10
Chapter 17 risk management scenario
Duration:00:02:12
Chapter 18 risk within the organization
Duration:00:05:52
Chapter 19 how to conduct risk assessments
Duration:00:04:34
Chapter 20 how to assess risk
Duration:00:02:53
Chapter 21 how to respond to risk
Duration:00:04:47
Chapter 22 how to monitor risk
Duration:00:03:50
Chapter 23 resiliency concepts
Duration:00:05:48
Chapter 24 business impact analysis
Duration:00:07:35
Chapter 25 business impact analysis
Duration:00:06:19
Chapter 26 incident response
Duration:00:15:26
Chapter 27 disaster recovery
Duration:00:09:20
Chapter 28 business continuity fundamentals
Duration:00:08:09
Chapter 29 alternative processing sites
Duration:00:05:35
Chapter 30 how to maintain business continuity
Duration:00:04:40
Closing credits
Duration:00:00:27
Chapter 1 understanding compliance
Duration:00:07:50
Chapter 2 understanding security
Duration:00:05:39
Chapter 3 understanding risk
Duration:00:07:04
Chapter 4 understanding compliance vs security
Duration:00:08:48
Chapter 5 how to be compliant and secure
Duration:00:10:11
Chapter 6 introduction to risk management framework
Duration:00:05:43
Chapter 7 introduction to the nist special publications
Duration:00:08:48
Chapter 8 introduction to the rmf publications
Duration:00:33:20
Chapter 9 understanding the cybersecurity framework
Duration:00:03:49
Chapter 10 comprehending the csf construction
Duration:00:09:48
Chapter 11 comprehending the csf tiers and profiles
Duration:00:08:42
Chapter 12 essential rmf concepts
Duration:00:07:55
Chapter 13 understanding risk tiers
Duration:00:04:00
Chapter 14 understanding systems and authorization
Duration:00:03:36
Chapter 15 introduction to roles and responsibilities
Duration:00:07:02
Chapter 16 comprehending security and privacy in the rmf
Duration:00:02:57
Chapter 17 how to prepare for rmf
Duration:00:03:46
Chapter 18 how to prepare for organization level tasks
Duration:00:07:42
Chapter 19 how to prepare for system level tasks
Duration:00:13:41
Chapter 20 how to categorize information systems
Duration:00:18:27
Chapter 21 comprehending rmf categorization tasks
Duration:00:02:51
Chapter 22 understanding categorizing systems
Duration:00:02:46
Chapter 23 how to select security controls
Duration:00:21:09
Chapter 24 how to select controls and baselines
Duration:00:02:51
Chapter 25 how to implement security controls
Duration:00:06:25
Chapter 26 how to implement controls
Duration:00:08:27
Chapter 27 how to assess security controls
Duration:00:17:21
Chapter 28 understanding rmf assess tasks
Duration:00:05:52
Chapter 29 how to assess systems
Duration:00:03:06
Chapter 30 how to authorize information systems
Duration:00:09:58
Chapter 31 how to monitor security controls
Duration:00:07:39
Chapter 32 how to monitor tasks
Duration:00:05:33
Chapter 33 how to monitor systems
Duration:00:03:38
Chapter 1 wireless antenna types
Duration:00:06:53
Chapter 2 rfe aka radio frequency encoding
Duration:00:05:20
Chapter 3 what is attenuation
Duration:00:03:08
Chapter 4 decibels
Duration:00:02:22
Chapter 5 understanding modulations
Duration:00:07:15
Chapter 6 radio frequency fundamentals
Duration:00:05:53
Chapter 7 what is electromagnetic spectrum
Duration:00:04:58
Chapter 8 wireless network classifications
Duration:00:07:48
Chapter 9 802 11 technologies
Duration:00:03:36
Chapter 10 understanding signal to interference ratio
Duration:00:02:01
Chapter 11 understanding 802 11 standards
Duration:00:08:36
Chapter 12 how to influence rf signals
Duration:00:04:03
Chapter 13 understanding g hz bands
Duration:00:04:11
Chapter 14 beamforming
Duration:00:02:39
Chapter 15 wi fi lan types
Duration:00:07:06
Chapter 16 ssid fundamentals
Duration:00:02:47
Chapter 17 what is active & passive scanning
Duration:00:03:54
Chapter 18 power over ethernet ap s
Duration:00:02:05
Chapter 19 wi fi lan client adapters
Duration:00:04:35
Chapter 20 mimo antennas
Duration:00:02:23
Chapter 21 what are beacons
Duration:00:02:21
Chapter 22 authentication & association requirements
Duration:00:02:35
Chapter 23 wi fi frame types
Duration:00:02:28
Chapter 24 defining medium access
Duration:00:07:31
Chapter 25 wi fi security policies
Duration:00:07:49
Chapter 26 how to create wi fi policy
Duration:00:17:13
Chapter 27 summary of all 802 11 technologies
Duration:00:15:37
Chapter 28 wi fi 5 g fundamentals
Duration:00:23:08
Chapter 29 must have wi fi adapters for pen testing
Duration:00:05:42
Chapter 30 wireless pen test tool kits
Duration:00:07:18
Chapter 31 how to install vitrual box & kali linux
Duration:00:11:46
Chapter 32 how to implement wpa dictionary attack + countermeasures
Duration:00:09:59
Chapter 33 how to deploy passive reconnaissance + countermeasures
Duration:00:09:46
Chapter 34 how to capture wi fi traffic + countermeasures
Duration:00:09:31
Chapter 35 ad hoc wi fi networks
Duration:00:06:04
Chapter 36 wi fi password attacks
Duration:00:02:30
Chapter 37 how to deploy mitm attack using ettercap
Duration:00:06:22
Chapter 38 mitm attack using rogue access point
Duration:00:25:10
Chapter 39 how to use wi spy d gx & chanalyzer
Duration:00:09:34
Chapter 40 how to implement physical security
Duration:00:06:19
Chapter 41 how to deploy deauthentication attack against rogue ap
Duration:00:08:39
Chapter 42 how to deploy denial of service attack using mkd3
Duration:00:06:12
Chapter 43 how to deploy evil twin de auth using mdk3
Duration:00:27:12
Chapter 44 summarizing wireless attacks
Duration:00:03:11
Chapter 45 encryption terminology fundamentals
Duration:00:06:14
Chapter 46 wireless encryption alternatives
Duration:00:03:36
Chapter 47 tkip fundamentals
Duration:00:04:15
Chapter 48 ccmp & aes fundamentals
Duration:00:08:24
Chapter 49 how wpa2 authentication process works
Duration:00:07:44
Chapter 50 additional mechanisms for wi fi protection
Duration:00:08:15
Conclusion
Duration:00:00:14
About john knowles
Duration:00:00:45
Ending Credits
Duration:00:00:33