Author
Released
3/2/2021Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx. You can also join Mike's free study group at certmike.com.
Skill Level Advanced
Duration
- Hi, I'm Mike Chapple and I'd like to welcome you to our CISSP Security Architecture and Engineering course. The Certified Information Systems Security Professional, or CISSP certification, is the gold standard for information security certification. You'll find that it's a core requirement for many mid and senior level information security positions. Earning the CISSP requires demonstrating that you have sufficient work experience and passing an exam covering the eight domains of information security. This course covers the third of those eight domains, security architecture and engineering. 13% of the questions on the CISSP exam come from this domain. I have two decades of experience as an information security professional and I've been involved in CISSP training and certification for most of those. As we work our way through this course, we will focus on each topic covered by domain three. We'll review how to select security controls that balance business needs and security requirements. We'll also do a deep dive into cryptography, one of the most important data protection tools at the disposal of a security professional. You'll also learn about physical security topics, including site design and monitoring. And that's just a small sampling of the many topics covered in this course. These topics, combined with the information you learn in our other CISSP courses, will help you pass the CISSP exam and also provide a critical foundation for your career in information security. In addition to using this course and the companion books to prepare for the exam, I encourage you to visit my website at certmike.com and sign up for my free CISSP study group. I'll send you weekly emails guiding you through the exam preparation process and offer you test taking tips to get you ready for the exam. All right, let's get rolling.
Related Courses
-
CISSP Cert Prep: 2 Asset Security
with Mike Chapple1h 11m Advanced
-
Introduction
-
Security engineering1m 51s
-
Study resources1m 58s
-
-
1. Secure Design
-
Secure design principles4m 57s
-
Security models3m 57s
-
Separation of duties3m 11s
-
Selecting security controls6m 22s
-
Privacy by design3m 2s
-
Secure defaults3m 43s
-
-
2. Virtualization and Cloud Computing
-
What is the cloud?3m 53s
-
Cloud computing roles2m 35s
-
Drivers for cloud computing3m 17s
-
Multitenant computing2m 15s
-
Virtualization4m 48s
-
Cloud compute resources7m 52s
-
Containerization1m 58s
-
Cloud deployment models2m 45s
-
Cloud service categories5m 21s
-
Edge and fog computing1m 46s
-
-
3. Hardware Security
-
Memory protection3m 8s
-
Hardware encryption5m 23s
-
-
4. Server Security Issues
-
Server and database security3m 52s
-
NoSQL databases6m 36s
-
-
5. Web Security Issues
-
OWASP Top Ten4m 29s
-
SQL injection prevention4m 25s
-
Overflow attacks3m 21s
-
Session hijacking4m 8s
-
Privilege escalation1m 56s
-
-
6. Embedded Systems Security
-
Internet of Things3m 6s
-
Securing smart devices3m 7s
-
Embedded systems4m 29s
-
7. Encryption
-
Understanding encryption2m 49s
-
Goals of cryptography3m 47s
-
Codes and ciphers3m 5s
-
Cryptographic math2m 38s
-
The cryptographic lifecycle2m 34s
-
-
8. Symmetric Cryptography
-
Data Encryption Standard2m 50s
-
3DES2m 58s
-
AES, Blowfish, and Twofish5m 47s
-
RC42m
-
Cipher modes3m 39s
-
Steganography3m 57s
-
-
9. Asymmetric Cryptography
-
PGP and GnuPG10m 47s
-
10. Key Management
-
Key exchange2m 42s
-
Diffie-Hellman4m 33s
-
Key escrow2m 55s
-
Key stretching1m 43s
-
Hardware security modules2m 45s
-
-
11. Public Key Infrastructure
-
Trust models2m 52s
-
Hash functions7m 38s
-
Digital signatures3m 51s
-
Digital signature standard1m 40s
-
Create a digital certificate4m 55s
-
Revoke a digital certificate1m 41s
-
Certificate stapling2m 29s
-
Certificate authorities6m 13s
-
Certificate subjects3m 35s
-
Certificate types2m 55s
-
Certificate formats2m 30s
-
-
12. Cryptanalytic Attacks
-
Brute force attacks2m 57s
-
Knowledge-based attacks2m 41s
-
Eavesdropping attacks4m 12s
-
Implementation attacks1m 40s
-
Ransomware7m 39s
-
-
13. Physical Security
-
Site and facility design2m 47s
-
Power control2m 32s
-
Physical access control4m 56s
-
Visitor management1m 30s
-
Physical security personnel2m 12s
-
-
14. Threat Modeling
-
Threat intelligence3m 21s
-
Managing threat indicators3m 52s
-
Intelligence sharing2m 29s
-
Threat research2m 20s
-
Identifying threats2m 24s
-
Threat hunting3m 50s
-
-
15. Software Security Architecture
-
SOAP and REST2m 25s
-
SOA and microservices1m 39s
-
-
Conclusion
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Security engineering