CNIT 125: Information Security Professional (CISSP Preparation)Spring 2016 Sam BowneTEXTBOOK CHANGEDScoresSchedule · Slides · Projects · Links · Home Page
|
Catalog DescriptionCovers information security in depth, including access control, application security, business continuity, cryptography, risk management, legal issues, physical security, and telecommunications and network security. This class helps to prepare students for the Certified Information Systems Security Professional (CISSP) credential, which is essential for high-level information security professionals.Advisory: Students should have taken CNIT 123, or hold the Certified Ethical Hacker credential, or have equivalent knowledge of basic security. Upon successful completion of this course, the student will be able to:
Textbook"CISSP Study Guide, Third Edition"; by Eric Conrad, Seth Misenar, Joshua Feldman; ISBN-10: 0128024372 Buy from Amazon ($45) |
Slides | |
---|---|
Introductory MaterialsWelcome messagePolicy Non-Disclosure Agreement (PDF) Introduction to CNIT 125 · KEY | |
Technical Lectures
Ch 2. Security and Risk Management I (part 1) (Ch 1 from old book)
· KEY Student PresentationsHoneypot and Malware: Alan Wennersten and Jeffrey TomClick a lecture name to see it on SlideShare. If you want to use other formats, you may find this useful: Cloud Convert. |
Projects | |
---|---|
Research & Present (extra credit) Instead of the usual homework assignments, students will all work together in teams, led by student managers, to perform security audits of information systems and other projects with real significance. Every student will be required to sign a non-disclosure agreement. Students are required to prepare professional resumes.
Students are required to give presentations in class.
|
Links |
---|
Introduction to CISSP and CNIT 125CISSP 1: CISSP Education & CertificationCISSP 2: (ISC)2 | Certified Information Security Education CISSP 3: CISSP was the third highest salaried certification in 2009 CISSP 4: DOD 8570 requires CISSP, Sec+, and other certs for all gov\'t Information Assurance employees CISSP 5: CISSP exam prices CISSP 6: (ISC)2 Code of Ethics CISSP 7: Associate of (ISC)² Certification CISSP 8: SSCP Education & Certification CISSP 9: Exam Prices (pdf) CISSP 10: Test Prep: 10 Tips For Preparing and Passing the CISSP Exam CISSP 11: How to get continuing education credit for CISSP certification holders CISSP 12: GIAC Research in the Common Body of Knowledge -- Good white papers for the ten CISSP domains CISSP 13: DoD Directive 8570.1 M - DoD Approved Baseline Certifications CISSP 14: Associate of (ISC)^2 FAQ CISSP 16: How I Prepared for the CISSP Exam--Sam Bowne CISSP 17: A CISSP Study Plan Memoir CISSP 18: CISSP Practice Test CISSP 19: San Francisco Bay Area ISSA--CISSP Study Sessions CISSP 20: CPE Requirements CISSP 21: (ISC)^2 SF Chapter CISSP 22: Average CISSP Salary 2017 CISSP 23: Exam Prices 2017 CISSP 24: Dilbert : How the CISSP Exam was Written CISSP 25: Your Guide to the Certified Information Systems Security Professional (CISSP) Exam CISSP 26: CyberVista Practice Exam (Recommended as of 2021) CISSP 27: CASP vs. CISSP: The Real Fight Is For Candidates' Attention CISSP 28: CISSP Certification Cheat Sheet, Study Guides & Best Courses CISSP 29: ISC2 Launches New CISSP Exam Format to Help Bring More Cybersecurity Professionals into the Field CISSP 30: Official (ISC)^2 CISSP Study App Links for Chapter LecturesCh 2a: Octomom's hospital records accessed, 15 workers fired (from 2009)Ch 2b: Three Primary Analytics Lessons Learned from 9/11 (2012) Ch 2c: The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America: James Bamford: 9780307279392: Amazon.com: Books Ch 2d: Chelsea Manning explains why she leaked secret military documents, fought for transgender rights behind bars Ch 2e: WikiLeaks Q & A: who is Bradley Manning and what did he do? Ch 2f: Chelsea Manning - Wikipedia Ch 2g: U.S.-EU & U.S.-Swiss Safe Harbor Frameworks Ch 2h: Privacy Shield Ch 2i: Privacy Shield -- Is Safe Harbour's Replacement Up To The Job In 2017? (May, 2017)
Ch 3a: DOD Directive 5200.28 defining security modes
Ch 4a: Memory segmentation - Wikipedia
Ch 5a: 64-bit Global Identifier (EUI-64)
Ch 6a: Call It Super Bowl Face Scan I (From 2001)
Ch 9a: Metasploit Module Source Code in Ruby Other LinksA Beginner's Guide to Data ComplianceHIPAA certification HCISPP vs CSCS Certified Security Compliance Specialist How to Reverse Engineering with Radare2 -- INTERESTING FOR PROJECTS COBIT 5 Laminate Describe the main differences in due dilligence and due care DREAD (risk assessment model) - Wikipedia US-EU Safe Harbor Data-Transfer Talks Enter Final Week (1-25-16) Separation of Duties in Information Technology Top 20 CIS Critical Security Controls (CSC) You Need to Implement OWASP Top 10 Security Risks - Part V The Phoenix Project New Unsorted LinksCertified Information Systems Security Professional (CISSP) | Practice Test Free Trial - CyberVistaRSA 2022 Volunteers 2022-05-03: CCSF Sleep-Out Protest 2023-05-10: KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932 - Microsoft Support |