Sunteți pe pagina 1din 9

Chapter Video No Description PMP New Edition

This video will explain: 1.


Benefits of CISSP
2. Certification Requirements
and Maintaining the Credential
3. Examination Structure and
1 1.1 Grading Pattern

Learn about:
1. Security and Risk
Management
2. Confidentality and Integrity of
1.2 Data - Role and Importance

Understand the importance of


Availablity, Information Security
and Management
Infosec Guidelines and
1.3 Governance

You will learn about: 1.


IT Security
2. Organizational Goals, Mission
and Objectives and how to aligin
with them
1.4 3. Auditing

Concepts discussed:
1. Control Framework
2. Due Care and Due Diligence
3. Security Controls 4.
1.5 Service Level Agreements

This video teaches: 1.


Managing 3rd party Governance
and Offshoring
2. Layers of Responsibility,
Security Policies types and
1.6 Implementation

Learn about Standards,


Guidelines Procedures and
Baselines
Compliance and Need for it
1.7 Cybercrime - Introduction

What are the Categories of


Computer crime and Major legal
1.8 systems and laws
Learn more about: 1.Intellectual
Properties - Types and Laws
1.9 2. Privacy and Privacy Laws

We will discuss: 1.
Information Risk Management
and Threat Management
2. Risk Analysis - Goals, Team,
Steps and types
3. Asset and information
valuation
4. Delphi Technique,
Countermeasure, Handling Risk
1.10 and Threat Modeling

What is Business Continuty


Process - Need, Concepts and
1.11 Importance

Key Notes on: 1.Phases


of BCP and DRP
2. Business Impact Analysis -
Goals andSteps
3. Failure and Recovery Metrics -
1.12 Stages

What is Personnel Security and


its Importance
What is Security Awareness
Training
1.13 What is ICS2 - Code of Ethics
1.14 Quiz

What is: 1. Asset Security and its


Importance
2. Information Classification -
Need, Objectives, Types and
2 2.1 Criteria

Understand more about Data


Classification, Ownership,
2.2 Policies and Quality Control

Learn about:
1. Data Documentation -
Practices, Standards Control
Lifecycle
2. Data Specification, Modeling
2.3 and DB Maintenance
This video covers: 1.
Data Handling
2. Asset Management - Inventory
and Configutation Management
3. Equipment Lifecycle
2.4 4. Protecting Privacy

Learn about:
1.Data Security Controls
2. Scoping and Tailoring and
2.5 Standards Selection
2.6 Quiz

We will discuss:
1. Introduction to Secure
Network Architecture
2. Open System Interconnection
3 3.1 and Layers

Let us see:
1. Data Layers
2. Introduction to TCP/IP Model
3.2 and Layers

This video will talk about:


1. Comparision of OSI and TCP/IP
Models
2. IP Addressing - Types and
3.3 Classes

Learn About:
1. Private Networs and Loopback
Addresses
3.4 2. Types of IP Addressing

This video shows:


1. Routing Protocols and Routing
2. Network Topologies
3.5 3. Collision Avoidance

Know more about the Local Area


Networks and the types.
What are the network
components involved and the
3.6 Firewall Architecture.

We will see:
1. Types of Networks
2. Introduction to Remote Access
3.7 and Protocols
This video shows:
1. Remote Access Security
2. Wireless Connectivity
3. Wireless Security and Network
3.8 Attacks
3.9 Quiz

Let us Learn about:


1. Architecture Framework
2. TOGAF and ITIL
4 4.1 3. Creating Security Architecture

This video describes:


1. Security Standards 2.
4.2 Models of Security

What are the System


Components involved in various
Models?
What is Distrubuted Computing
4.3 and Service Models?

Here is what we will learn:


1. Cryptography
2. Lifecycle and Protocols
3. Cryptography Methods and
4.4 Ciphers

Learn about:
1. Operation Modes - DES and
AES
2. Algorithms and Feedback
4.5 process

Let us see:
1. Asymetric Cryptography
2. Algorithms
3. Symetric vs Asymetric
4.6 Cryptography

In this video, we will learn about:


1. Hashing Algorithms
2. Environment Controls and
4.7 Training
4.8 Quiz

This Video will explain:


1. Identity and Access
Management - Importance
2. Controlling Physical and
Logical access to Assets
5 5.1 3. Policies and Lifecycle
Let us discuss:
1. Access Controls - Biometrics
and Passwords
2. Devices Involved and
5.2 Authorization Concepts

What is SSO and other modules


of Security?
What are the steps involved in
5.3 Kerberos?

Learn About the Access Control


5.4 Concepts and Administration

In this video we will learn about:


1. Session Management
2. Credential Management
System - Risk and Benefits
3. Federated Identity
5.5 Management - Models

Let us see:
1. Identity as a Service
2. Best Practices of Access
5.6 Control
5.7 Quiz

Key Notes on:


1. Security Assesment and
Testing - Introduction and
Strategies
2. Testing Methods and Log
Management
6 6.1 3. Synthetic Transactions

Learn about:
1. Security testing in SDLC and
Levels
2. Techniques and common
vulnerabilities
6.2 3. ICSM

In this video we will see:


1. Service Organization Controls
6.3 2. Types of Reports and Phases
6.4 Quiz

Let us discuss:
1. Security Operations -
Introduction
2. Investigations and types of
7 7.1 Investigations
This video shows:
1. Incident Response Procedures
7.2 2. Evidence - Types and Lifecycle

What is:
1.Security Information and Event
Management
2. Filtering and Monitoring
7.3 3. Configuration Management

Learn About:
1. Operational Resilience
7.4 2. Threat to Operations

Key Notes on:


1. Vulnerabilities
2. Controls and Types of
7.5 Accounts

How to:
1. Manage administrative
Controls
2. Work on Storage and
7.6 Virtualization

This video talks about:


1. Incident Management and
Phases
2. Problem, Phase and
7.7 Vulnerability Management

We will see:
1. Configuration and Recovery
Management
2. Disaster Recovery and
7.8 Prevention

What are the key components in


7.9 Access Control and Security
7.10 Quiz

Let us talk about:


1. Importance of Software
Development Security
2. System Environments and
Data Processing
3. Threats in Software
8 8.1 Environments
This video shows:
1. Systems Development
Lifecycle
2. Software Testing Levels
3. Software Development
8.2 Methods and Best Practices

You will learn:


1. About Object Oriented
Programming
2. What is Software Security and
8.3 Assurance

Key Notes on:


1. Database and Data
Warehousing
2. Types and Hierarchy
3. Knowledge Management -
8.4 Importance and Roles
8.5 Quiz
Chapter Video No Description PMP New Edition

Let us learn about:


1. Overview of Big Data and
Hadoop Ecosystem
2. Limitations and Solution to the
1 1.1 current Architecture

We will see:
1. Data Explosion and Evolution
of Big Data
1.2 2. Distribution System

This video explains:


1. The challenges of Distributed
Systems
2. What is Hadoop and its key
1.3 charecteristics

1.4 Traditional Database vs Hadoop

Key Notes on:


1. Hadoop Core Components
1.5 2. Ecosystem Components

What is covered
1. Hadoop Ecosystem
1.6 Components(Contd)
Hadoop Ecosystem
1.7 Components(Contd)

We will talk about:


1. Hadoop Ecosystem
Components(Contd)
1.8 2. Big Data Processing
1.9 Quiz

Let us Learn about:


1. HDFS
2 2.1 2. Regular file system vs HDFS
What are the Characteristics of
2.2 HDFS

We will see:
1. Need for HDFS
2.3 2. HDFS Storage

This Video explains:


1. HDFS Architecture
2.4 2. HDFS High Availability
How to use Quorum-based and
Shared Storage
2.5 What are the HDFS Components

2.6 Keynotes on HDFS Components


2.7 How File Write works

What are:
1. The HDFS Commands
2.8 2. How to Install HDFS

Let us talk about:


1. HDFS Installation
2.9 2. What is Yarn

Here we will see:


1. Yarn Architecture
2.10 2. Yarn use case
What is ResourceManager and
2.11 its functionality
2.12 More on Yarn

Keynotes on:
1. Applications on Yarn
2.13 2. Yarn as an Application
2.14 Quiz