Course curriculum

  • 1

    How to use this template

  • 2

    Domain 1: Security Governance

    • Security Governance

    • Security Governance - Vision-Mission-Objectvies

      FREE PREVIEW
    • Security Governance - Components

    • Security Governance-Type of Plans

    • Security Governance - Roles and Responsibilities

    • Understanding Security Governance implementation

    • Security Governance Tools - Policies

    • Security Governance Tools - Standards-Guidelines and Baseline

  • 3

    Domain1 : Security Frameworks

  • 4

    Domain1 : Regulatory and Compliance Requirements

    • Compliance Requirements

    • US Impot Export Laws

    • Cyber Crimes

    • US Specific Cyber Crime Laws

    • Jurisdiction Considerations

    • Privacy in Global Context

      FREE PREVIEW
    • US Specific privacy Laws

    • Intellectual Property Protection

    • (ISC)2 Code of Ethics

  • 5

    Domain1 : Security Risk Management

    • Risk Management - full

    • Risk Management - The Bigger Picture

    • Risk Management Process - Discussion

    • Risk Assessment Methodology and Control Selection

  • 6

    Domain1 : Human Resource (People) Security

    • Human Resource Security

  • 7

    Domain1 : Threat Modelling

    • Threat Modelling

  • 8

    Domain 2 : Asset Security

    • D2- Data classification

    • D2 - Data Security Roles and Responsibilities

    • D2 - Data LifeCycle

    • D2 -Data Security Controls

  • 9

    Domain 3: Security Architecture and Engineering

    • D3- Cryptography MindMap

    • D3 - Modern Cryptography - Basic Concepts

    • D3- Cryptographic Services

    • D3 - Transposition Cipher

    • D3- Stream Cipher

    • D3-Cryptographic Terms

    • D3 - Domain MindMap

    • D3 - Cryptography Basic Terms

    • D3 - Block Cipher

    • D3 - Monoalphabatic Substitution Cipher

    • D3 - Block Cipher Implementation

    • D3 - Characteristics of Good Modern Cipher

    • D3- Symmertic Cipher

    • Symmertric Vs Asymmetric Cryptography

    • Key Management Practices

    • Cryptography Hybrid Approach

    • Hashing

    • Gautam Exerience after passign CISSP

    • Asymmetric Cryptography