CISSP Bootcamp course – Domain 5 & 6
CISSP Bootcamp course – Domain 5 & 6, available at $19.99, with 13 lectures, and has 3 subscribers.
You will learn about Protection of data and resources Authentication and Authorization Cryptography Public key infrastructure (PKI) Security Assessment and Testing This course is ideal for individuals who are Managers or Information Security Managers It is particularly useful for Managers or Information Security Managers.
Enroll now: CISSP Bootcamp course – Domain 5 & 6
Summary
Title: CISSP Bootcamp course – Domain 5 & 6
Price: $19.99
Number of Lectures: 13
Number of Published Lectures: 13
Number of Curriculum Items: 13
Number of Published Curriculum Objects: 13
Original Price: ₹2,999
Quality Status: approved
Status: Live
What You Will Learn
- Protection of data and resources
- Authentication and Authorization
- Cryptography
- Public key infrastructure (PKI)
- Security Assessment and Testing
Who Should Attend
- Managers
- Information Security Managers
Target Audiences
- Managers
- Information Security Managers
This is an ideal course for any student who is preparing for CISSP. The course content covers Domain 5 and Domain 6 in detail.
Design and validate assessment, test, and audit strategies
-
Internal
-
External
-
Third-party
Conduct security control testing
-
Vulnerability assessment
-
Penetration testing
-
Log reviews
-
Synthetic transactions
-
Code review and testing
-
Misuse case testing
-
Test coverage analysis
-
Interface testing
-
Breach attack simulations
-
Compliance checks
Collect security process data (e.g., technical and administrative)
-
Account management
-
Management review and approval
-
Key performance and risk indicators
-
Backup verification data
-
Training and awareness
-
Disaster Recovery (DR) and Business Continuity (BC)
Analyze test output and generate reports
-
Remediation
-
Exception handling
-
Ethical disclosure
Conduct or facilitate security audits
-
Internal
-
External
-
Third-party
Control physical and logical access to assets
-
Information
-
Systems
-
Devices
-
Facilities
-
Applications
Manage identification and authentication of people, devices, and services
-
Identity Management (IdM) implementation
-
Single/Multi-Factor Authentication (MFA)
-
Accountability
-
Session management
-
Registration, proofing, and establishment of identity
-
Federated Identity Management (FIM)
-
Credential management systems
-
Single Sign On (SSO)
-
Just-In-Time (JIT)
Federated identity with a third-party service
-
On-premises
-
Cloud
-
Hybrid
Implement and manage authorization mechanisms
-
Role Based Access Control (RBAC)
-
Rule based access control
-
Mandatory Access Control (MAC)
-
Discretionary Access Control (DAC)
-
Attribute Based Access Control (ABAC)
-
Risk based access control
Manage the identity access provisioning lifecycle
-
Account access review (e.g., user, system, service)
-
Provisioning and deprovisioning (E.g., on/off boarding and transfers)
-
Role definition (e.g., people assigned to new roles)
-
Privilege escalation (e.g., manage service accounts, use of sudo, minimizing its use)
Implement authentication systems
-
OPENid Connect (OIDC)/Open Authorization (Oauth)
-
Security Assertion Markup Language (SAML)
-
Kerberos
-
Remote Authentication Dial-In User Service (RADIUS)/Terminal Access Controller Access Control System Plus (TACACS+)
The CISSP exam is governed by the International Information Systems Security Certification Consortium (ISC) . (ISC) is a global not-for-profit organization. It has four primary mission goals:
Maintain the Common Body of Knowledge (CBK) for the field of information systems security.
Provide certification for information systems security professionals and practitioners.
Conduct certification training and administer the certification exams.
Oversee the ongoing accreditation of qualified certification candidates through continued education.
The (ISC)2 is operated by a board of directors elected from the ranks of its certified practitioners.
Subscribe now! The CISSP exam is governed by the International Information Systems Security Certification Consortium (ISC) . (ISC) is a global not-for-profit organization.
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction
Chapter 2: Domain 5 – Identity and Access Management
Lecture 1: Understanding IDAM, Authentication Types and Methods
Lecture 2: Identity and Access Mechanisms, SSO, Kerberos
Lecture 3: AAA services, Radius, TACACS, TACACS+ and Diameter
Lecture 4: Managing System and User Accounts, IAM lifecycle
Lecture 5: Biometric authentication and errors
Lecture 6: Centralised and De-centralised Access Controls, ABAC, RBAC, DAC models
Chapter 3: Domain 6 – Security Assessment and Testing
Lecture 1: Planning a Security Assessment, Types of Assessments
Lecture 2: Software security assessments, Test coverage analysis
Lecture 3: Testing web based applications, Security Architecture
Lecture 4: IOT, Security Architecture Best Practices
Lecture 5: Vulnerability Assessment considerations, Penetration testing and its types
Lecture 6: Other important topics for CISSP exam
Instructors
-
Rahul khani
Deputy Director Infosec
Rating Distribution
- 1 stars: 0 votes
- 2 stars: 0 votes
- 3 stars: 0 votes
- 4 stars: 0 votes
- 5 stars: 0 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Best Video Editing Courses to Learn in March 2025
- Best Music Production Courses to Learn in March 2025
- Best Animation Courses to Learn in March 2025
- Best Digital Illustration Courses to Learn in March 2025
- Best Renewable Energy Courses to Learn in March 2025
- Best Sustainable Living Courses to Learn in March 2025
- Best Ethical AI Courses to Learn in March 2025
- Best Cybersecurity Fundamentals Courses to Learn in March 2025
- Best Smart Home Technology Courses to Learn in March 2025
- Best Holistic Health Courses to Learn in March 2025
- Best Nutrition And Diet Planning Courses to Learn in March 2025
- Best Yoga Instruction Courses to Learn in March 2025
- Best Stress Management Courses to Learn in March 2025
- Best Mindfulness Meditation Courses to Learn in March 2025
- Best Life Coaching Courses to Learn in March 2025
- Best Career Development Courses to Learn in March 2025
- Best Relationship Building Courses to Learn in March 2025
- Best Parenting Skills Courses to Learn in March 2025
- Best Home Improvement Courses to Learn in March 2025
- Best Gardening Courses to Learn in March 2025