O'Reilly - CISSP Certification Training - Domain 3
Posted by Superadmin on March 18 2019 14:05:40

O'Reilly - CISSP Certification Training - Domain 3

 

 

 

n this CISSP Certification Training: Domain 3 training course, expert author David Miller will teach you everything you need to know to prepare for and pass domain 3 of the Certified Information Systems Security Professional Certification covering security engineering. This course is designed for anyone who is looking to prepare for the new CISSP certification exam.

You will start by learning about security models, then jump into learning about the computer hardware and operating system architecture. From there, David will teach you about virtualization, information systems and application architecture, and cryptography. This video tutorial also covers hashing algorithms, symmetric key algorithms, and asymmetric key algorithms. Finally, you will learn about attacks on cryptography and physical security, including goals and facility, electrical issues, fire safety, and fire detectors.

Once you have completed this computer based training course, you will have learned everything you need to know to successfully complete the Security Engineering domain of the CISSP certification exam.

 

Table of Contents

Chapter: Security Engineering - Introduction 

CISSP 2018 Domain 3 Update: Security Architecture and Engineering 13m 28s

Introduction 05m 45s

Chapter: Security Models 

Introduction To Security Models 07m 12s

Bell-Lapadula 09m 21s

Biba 10m 11s

Applying The Models 08m 19s

Clark-Wilson 06m 47s

Clark-Wilson Brewer-Nash 04m 56s

TCB 09m 44s

TCSEC 07m 33s

ITSEC 04m 5s

Common Criteria 05m 38s

 

 

Chapter: Computer Hardware Architecture 

Overview 06m 57s

CPU 07m 4s

Motherboard 05m 29s

Memory 07m 5s

Virtual Memory 10m 0s

Memory 07m 51s

TPM 09m 31s

Chapter: Operating System Architecture

Overview 09m 13s

Four Ring Architecture 06m 4s

Kernel Mode 07m 16s

Features 06m 29s

Processes Threads And Buffers 09m 4s

Process And Memory Management 08m 59s

Reference Monitor 06m 20s

System Self Protection 06m 51s

Hardened Server 07m 56s

Chapter: Virtualization 

Virtualization Overview - Part 1 08m 56s

Virtualization Overview - Part 2 08m 28s

Chapter: Information Systems And Application Architecture

Architecture - Part 1 06m 30s

Architecture - Part 2 04m 51s

Architecture - Part 3 07m 23s

Cloud Computing - Part 1 05m 15s

Cloud Computing - Part 2 04m 29s

IoT And Industrial Controls 05m 11s

Application Architecture 05m 52s

Databases - Part 1 06m 0s

Databases - Part 2 04m 46s

Database Issues - Part 1 05m 12s

Database Issues - Part 2 09m 19s

Middleware 09m 0s

Mining Databases  05m 51s

Web Applications 07m 26s

Mobile Code Cookies 06m 4s

Mobile Code XSS 07m 33s

Mobile Code Java ActiveX 07m 10s

Web Applications Browser Email 04m 43s

Web Applications Input Validation 03m 21s

Web Applications OWASP 01m 56s

Chapter: Introduction To Cryptography 

Cryptography - Part 1 05m 33s

Cryptography - Part 2 04m 22s

Cryptographic Algorithms 03m 45s

Strong Cryptography 04m 50s

Cryptographic Keys 03m 49s

Key Management 06m 1s

Chapter: Hashing Algorithms 

Introduction To Hashing Algorithms 06m 18s

How Hashing Works 04m 29s

Hashing Algorithms 06m 53s

Strong Hashing Algorithms 03m 12s

Hashing Services 06m 8s

 

Chapter: Symmetric Key Algorithms

Symmetric Key Cryptography 05m 45s

Symmetric Key Services 08m 43s

Symmetric Key Algorithms 06m 50s

Cracking Symmetric Key Algorithms 03m 9s

Vigenere Symmetric Key Algorithm 06m 52s

Boolean Logic XOR 06m 27s

Kerckhoffs And Gilbert Vernam 05m 17s

Hebern, Enigma, Feistel, S And T 05m 13s

Block Ciphers And Stream Ciphers 05m 12s

DES And 3DES 06m 55s

AES, Block Ciphers And Variables 06m 56s

Block Cipher Modes - ECB And CBC 05m 47s

Block Cipher Modes - OFB And CFB 07m 40s

Block Cipher Modes - CTR 03m 10s

Message Authentication Code 03m 18s

MAC And HMAC 06m 43s

CBC-MAC And Symmetric Summary 04m 1s

Chapter: Asymmetric Key Algorithms

Asymmetric Key Cryptography 05m 31s

Asymmetric Key Services 06m 48s

Asymmetric Key Management 06m 12s

Key Distribution And Digital Signature  05m 53s

Digital Signature 05m 8s

Confidentiality And Digital Signature 06m 53s

Multiple Recipients 03m 19s

SSL And TLS 08m 6s

Asymmetric Key Algorithms - Diffie Hellman Merkle 07m 10s

RSA, ELGamal, ECC And DSS 07m 3s

Asymmetric Key Cryptography Review 06m 20s

 

 

 

Chapter: Cryptography In Use 

Link End-To-End PKI 06m 47s

PKI - Part 1 07m 55s

PKI - Part 2 05m 21s

PGP And S/MIME 05m 12s

Set 04m 48s

VPN, SSL, TLS And Protocols 06m 0s

 

 

Chapter: Attacks On Cryptography

Introduction To Attacks On Cryptography 05m 35s

Brute Force, Dictionary, Hybrid And Rainbow 06m 6s

Plaintext, Ciphertext And Adaptive 07m 37s

Chapter: Physical Security 

Introduction To Physical Security 06m 13s

Goals And Facility 6m 40s

Perimeter Defense And Access Control 06m 5s

Security Zones And Environment 05m 43s

Electrical Issues 06m 12s

Fire Safety 04m 28s

Fire Detectors 04m 3s

Fire Extinguishers And Sprinklers 05m 25s

Gas Suppressants And Fire Training 05m 45s

 

Chapter: Conclusion

Wrap Up 06m 57s

 

 


01. Security Engineering Introduction



01_01-Introduction



02. Security Models



02_01-Introduction To Security Models
02_02-BellLapadula
02_03-Biba
02_04-Applying The Models
02_05-ClarkWilson
02_06-ClarkWilson BrewerNash
02_07-TCB
02_08-TCSEC
02_09-ITSEC
02_10-Common Criteria



03. Computer Hardware Architecture



03_01-Overview
03_02-CPU
03_03-Motherboard
03_04-Memory
03_05-Virtual Memory
03_06-Memory
03_07-TPM



04. Operating System Architecture



04_01-Overview
04_02-Four Ring Architecture
04_03-Kernel Mode
04_04-Features
04_05-Processes Threads And Buffers
04_06-Process And Memory Management
04_07-Reference Monitor
04_08-System Self Protection
04_09-Hardened Server



05. Virtualization



05_01-Virtualization Overview Part 1
05_02-Virtualization Overview Part 2



06. Information Systems And Application Architecture



06_01-Architecture Part 1
06_02-Architecture Part 2
06_03-Architecture Part 3
06_04-Cloud Computing Part 1
06_05-Cloud Computing Part 2
06_06-IoT And Industrial Controls
06_07-Application Architecture
06_08-Databases Part 1
06_09-Databases Part 2
06_10-Database Issues Part 1
06_11-Database Issues Part 2
06_12-Middleware
06_13-Mining Databases
06_14-Web Applications
06_15-Mobile Code Cookies
06_16-Mobile Code XSS
06_17-Mobile Code Java ActiveX
06_18-Web Applications Browser Email
06_19-Web Applications Input Validation
06_20-Web Applications OWASP



07. Introduction To Cryptography



07_01-Cryptography Part 1
07_02-Cryptography Part 2
07_03-Cryptographic Algorithms
07_04-Strong Cryptography
07_05-Cryptographic Keys
07_06-Key Management



08. Hashing Algorithms



08_01-Introduction To Hashing Algorithms
08_02-How Hashing Works
08_03-Hashing Algorithms
08_04-Strong Hashing Algorithms
08_05-Hashing Services



09. Symmetric Key Algorithms



09_01-Symmetric Key Cryptography
09_02-Symmetric Key Services
09_03-Symmetric Key Algorithms
09_04-Cracking Symmetric Key Algorithms
09_05-Vigenere Symmetric Key Algorithm
09_06-Vigenere Symmetric Key Algorithm
09_07-Kerckhoffs And Gilbert Vernam
09_08-Hebern, Enigma, Feistel, S And T
09_09-Block Ciphers And Stream Ciphers
09_10-DES And 3DES
09_11-AES, Block Ciphers And Variables
09_12-Block Cipher Modes ECB And CBC
09_13-Block Cipher Modes OFB And CFB
09_14-Block Cipher Modes CTR
09_15-Message Authentication Code
09_16-MAC And HMAC
09_17-CBCMAC And Symmetric Summary



10. Asymmetric Key Algorithms



10_01-Asymmetric Key Cryptography
10_02-Asymmetric Key Services
10_03-Asymmetric Key Management
10_04-Key Distribution And Digital Signature
10_05-Digital Signature
10_06-Confidentiality And Digital Signature
10_07-SSL And TLS
10_08-SSL And TLS
10_09-Asymmetric Key Algorithms Diffie Hellman Merkle
10_10-RSA, ELGamal, ECC And DSS
10_11-Asymmetric Key Cryptography Review



11. Cryptography In Use



11_01-Link EndToEnd PKI
11_02-PKI Part 2
11_03-PKI Part 2
11_04-PGP And SMIME
11_05-Set
11_06-VPN, SSL, TLS And Protocols



12. Attacks On Cryptography



12_01-Introduction To Attacks On Cryptography
12_02-Brute Force, Dictionary, Hybrid And Rainbow
12_03-Plaintext, Ciphertext And Adaptive



13. Physical Security



13_01-Introduction To Physical Security
13_02-Goals And Facility
13_03-Perimeter Defense And Access Control
13_04-Security Zones And Environment
13_05-Electrical Issues
13_06-Fire Safety
13_07-Fire Detectors
13_08-Fire Extinguishers And Sprinklers
13_09-Gas Suppressants And Fire Training



14 Conclusion`



14_01-Wrap Up