CNIT 125: Information Security Professional (CISSP Preparation)Fall 2017 Sam BowneLivestream · Schedule · Slides · Links · Home Page
|
Catalog DescriptionCovers information security in depth, including access control, application security, business continuity, cryptography, risk management, legal issues, physical security, and telecommunications and network security. This class helps to prepare students for the Certified Information Systems Security Professional (CISSP) credential, which is essential for high-level information security professionals. Textbook"CISSP Study Guide, Third Edition"; by Eric Conrad, Seth Misenar, Joshua Feldman; ISBN-10: 0128024372 Buy from Amazon ($45) Live StreamingYou can attend class remotely using Zoom. Online QuizzesThe online portion of this course, restricted to official students, is here: https://canvas.instructure.com/courses/1177883
|
Schedule | ||
---|---|---|
Date | Quiz | Topic |
Fri 10-6 | Ch 2 (Part 1) Quiz Due | Ch 1.Introduction to CISSP & Ch 2. Security and Risk Management (Part 1) |
Fri 10-13 | Ch 2 (Part 2) Quiz Due | Ch 2.Security and Risk Management (Part 2) |
Fri 10-20 | Ch 3 Quiz Due | Ch 3. Asset Security |
Fri 10-27 | Ch 4 (Part 1) Quiz Due | Ch 4. Security Engineering (Part 1) |
Fri 11-3 | Ch 4 (Part 2) Quiz Due | Ch 4. Security Engineering (Part 2) |
Fri 11-10 | Ch 5 (Part 1) Quiz Due | Ch 5. Communication and Network Security (Part 1) |
Fri 11-17 | Ch 5 (Part 2) Quiz Due | Ch 5. Communication and Network Security (Part 2) |
Fri 11-24 | Ch 6 Quiz Due | Last section of Ch 5 & Ch 6. Identity and Access Management |
Fri 12-1 | Ch 7 Quiz Due | Ch 7. Security Assessment and Testing & Start of Ch 8 |
Fri 12-8 | Ch 8 Quiz Due | Ch 8. Security Operations |
Fri 12-15 | Ch 9 Quiz Due | Ch 9. Software Development Security |
Slides | |
---|---|
Ch 1. Introduction to CISSP
· KEY · PDF Ch 2. Security and Risk Management (Part 1) · KEY · PDF Ch 2. Security and Risk Management (Part 2) · KEY · PDF Ch 3. Asset Security · KEY · PDF Ch 4. Security Engineering (Part 1) · KEY · PDF Ch 4. Security Engineering (Part 2) · KEY · PDF Ch 5. Communication and Network Security (Part 1) · KEY · PDF Ch 5. Communication and Network Security (Part 2) · KEY · PDF Ch 6. Identity and Access Management · KEY · PDF Ch 7. Security Assessment and Testing · KEY · PDF 8. Security Operations · KEY · PDF Ch 9. Software Development Security · KEY Student PresentationsHoneypot and Malware: Alan Wennersten and Jeffrey Tom
Click a lecture name to see it on SlideShare. |