1.1 Organizational and Professional Ethics
2.1 Information and Cybersecurity Principles
3.1 Strategic Alignment
3.2 Organizational Roles and Responsibilities
3.3 Security Control Frameworks
4.1 Regulatory and Compliance Obligations
4.2 Intellectual Property & Transborder Data Flow
4.3 Privacy Principles
4.4 Cybercrime and Data Breaches
5.1 Investigation Objectives and Requirements
6.1 Governance Documents
7.1 Business Continuity Planning
7.2 Business Impact Analysis
8.1 Workforce Lifecycle Security
8.2 Workforce and Third-party Policies and Agreements
9.1 Risk Basics
9.2 Risk Assessment
9.3 Risk Analysis
9.4 Risk Response and Treatment
9.5 Risk Mitigation Controls
9.6 Risk Monitoring, Reporting, and Maturity
10.1 Threat Actors and Attributes
10.2 Attack Vectors - Digital Infrastructure
10.3 Attack Vectors - People
10.4 Attack Vectors - Code
10.5 Threat Modeling and Intelligence
11.1 Supply Chain Relationships and Risks
11.2 Supply Chain Risk Management and Mitigation
12.1 SETA Principles and Practices
12.2 Emerging SETA Trends, Techniques, and Topics
13.1 Asset Classification
14.1 Asset Handling Requirements
15.1 Asset Management
16.1 Data Management
16.2 Data Collection, Retention, and Archiving
16.3 Data Deletion and Media Destruction
17.1 Asset Retention and Retirement
18.1 Control Baselines
18.2 Data Protection Methods
19.1 Secure Design Principles
19.2 Zero Trust and Secure Access Service Edge (SASE)
20.1 Information Security Models
21.1 Security Evaluation Criteria
22.1 Trusted Computing Base
23.1 Client-based, Server-based, and Distributed Systems
23.2 Database Management Systems
23.3 Operational Technology (OT)
23.4 Cloud-based Systems
23.5 Internet of Things (IoT & IIoT) Systems
23.6 Virtualization
23.7 Automation and Solution Elements
24.1 Cryptography Primer
24.2 Encryption
24.3 Hashing and Digital Signatures
24.4 PKI and Digital Certificates
24.5 Emerging Cryptography
25.1 Cryptographic Attacks
25.2 Post-Exploitation Attacks
25.3 Ransomware
26.1 Physical Security Principles
27.1 Site and Building Controls
27.2 Environmental Impact
28.1 Information System Lifecycle
29.1 Network Models
29.2 Internet Protocol (IP)
29.3 Secure Protocols
29.4 Multilayer and Converged Protocols
29.5 Transport Architecture
29.6 Segmentation
29.7 Microsegmentation
29.8 Wireless Architecture
29.9 Wi-Fi Networks
29.10 Virtual Private Cloud
29.11 Continuous Monitoring
30.1 Transmission Media
30.2 Network Access Control
30.3 Endpoint Security
31.1 Voice, Video, and Collaboration (CDN)
31.2 Secure Remote Access Communications
32.1 Access Control Fundamentals
33.1 Identity Management (IdM)
33.2 Authentication and Credential Management
33.3 Biometric Authentication
34.1 Federated Identity Management
35.1 Authorization and Access Controls
36.1 Identity and Access Management (IAM)
37.1 Implementing Authentication Systems
37.2 Authentication and Access Control Attacks
38.1 Assessment and Audit Strategies
38.2 Planning Engagements
39.1 Vulnerability Testing and Assessment
39.2 Penetration Testing and Attack Simulations
39.3 Code and Interface Testing
CISSP Introduction
CISSP Introduction (1)
Learning objectives
Learning objectives (1)
Learning objectives (2)
Learning objectives (3)
Learning objectives (4)
Learning objectives (5)
Learning objectives (6)
Learning objectives (7)
Learning objectives (8)
Learning objectives (9)
Learning objectives (10)
Learning objectives (11)
Learning objectives (12)
Learning objectives (13)
Learning objectives (14)
Learning objectives (15)
Learning objectives (16)
Learning objectives (17)
Learning objectives (18)
Learning objectives (19)
Learning objectives (20)
Learning objectives (21)
Learning objectives (22)
Learning objectives (23)
Learning objectives (24)
Learning objectives (25)
Learning objectives (26)
Learning objectives (27)
Learning objectives (28)
Learning objectives (29)
Learning objectives (30)
Learning objectives (31)
Learning objectives (32)
Learning objectives (33)
Learning objectives (34)
Learning objectives (35)
Learning objectives (36)
Learning objectives (37)
Learning objectives (38)
Lessons 1-5 Deep Dive Quiz
Lessons 13 - 18 Deep Dive Quiz
Lessons 19 - 22 Deep Dive Quiz
Lessons 26 - 28 Deep Dive Quiz
Lessons 30 - 31 Deep Dive Quiz
Lessons 32 - 37 Deep Dive Quiz
Lessons 38 - 39 Deep Dive Quiz
Lesson 6 - 9 Deep Dive Quiz
Lesson 10 - 12 Deep Dive Quiz
Lesson 23 Deep Dive Quiz
Lesson 24 - 25 Deep Dive Quiz
Lesson 29 Deep Dive Quiz
Module Introduction
Module Introduction (1)
Module Introduction (2)
Module Introduction (3)
Module Introduction (4)
Module Introduction (5)