CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide 7th Edition

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide 7th Edition
English | Size: 409.64 MB
Category: CBTs

Note 1: This is a scanned PDF version of book’s hardcopy.
Note 2: ISC2 is planning to revise the CISSP Domains in April 2018. Now is the time to study and challenge this Certification exam before its revised.

The CISSP Study Guide, 7th Edition is your one-stop resource for complete coverage of the 2015 CISSP Body of Knowledge. This Sybex Study Guide covers 100% of the 2015 CISSP exam candidate information bulletin objectives. You’ll prepare for the exam smarter and faster with Sybex thanks to superior content including, assessment tests that check exam readiness, objective map, real-world scenarios, hands-on exercises, key topic exam essentials, and challenging chapter review questions. Reinforce what you have learned with the exclusive Sybex online learning environment and test bank, assessable across multiple devices. Get prepared for the CISSP exam with Sybex. [Read more…]

Packt Publishing – Information Gathering with Kali Linux

Packt Publishing – Information Gathering with Kali Linux
English | Size: 334.09 MB
Category: Tutorial

Kali Linux is a Linux distribution designed for digital forensics, penetration testing, and security auditing. It is the successor of BackTrack, the world’s most popular penetration testing distributor. Kali Linux includes many well-known security tools, and this course will teach you more about the tools and their usage.
[Read more…]

Packt-Information Gathering with Kali Linux

Packt-Information Gathering with Kali Linux
English | Size: 334.1 MB
Category: Tutorial

Kali Linux is a Linux distribution designed for digital forensics, penetration testing, and security auditing. It is the successor of BackTrack, the world’s most popular penetration testing distributor. Kali Linux includes many well-known security tools, and this course will teach you more about the tools and their usage.
[Read more…]

Lynda – CISA Cert Prep – 1 Auditing Information Systems for IS Auditors

Lynda – CISA Cert Prep – 1 Auditing Information Systems for IS Auditors
English | Size: 148.45 MB
Category: Tutorial

Earning a CISA certification validates your ability to audit, control, and monitor information systems. The CISA Cert Prep series prepares you to tackle this exam by going into each of the topics it covers, helping you acquire the skills you need to confidently manage IT security audits. In this course-the first in the series-take a deep dive into the concepts covered in the Process of Auditing Information Systems domain. Learn how to organize and plan an audit, put controls in place, and use a repeatable audit process to ensure that your results are meaningful and your audit is complete. Plus, learn about communicating results with an audit outbrief, embedding the audit function into operations, and how continuous auditing can help you identify and fix problems more effectively. [Read more…]

Pluralsight – Information Security Manager Information Security Governance

Pluralsight – Information Security Manager: Information Security Governance
English | Size: 457.34 MB
Category: CBTS

While protecting information assets is the primary goal of an information security program, governance sets the requirements for how the program must function within the compliance context. Organizations must operate their security programs in compliance with laws, regulations, policies, and standards. In this course, Information Security Manager: Information Security Governance, you’ll gain solid foundational knowledge on the governance aspect of security, as well as skills you can use to effectively manage security compliance in your organization. First, you’ll explore how both internal and external governance affect the organization, how information security strategy supports the mission and overall organizational strategy, and the different roles and responsibilities involved in the security program. Next, you’ll learn how to write business cases to support security budgets and investments. Finally, you’ll cover stakeholders and how to communicate the security strategy to them and gain their commitment to it. By the end of this course, you’ll be well-versed in information security governance and how it affects an information security program. [Read more…]

[Udemy] Certified Information Systems Security Professional – CISSP

[Udemy] Certified Information Systems Security Professional – CISSP
English | Size: 1.70 GB
Category: CBTs

In today fast evolving times technological solutions by itself cannot protect an organizations important information assets. So, Employers demanding qualified information security staff give their organizations a leading edge by providing the highest standard of security for their customers, employees, stakeholders and organizational information assets.
The CISSP is an internationally recognized certification for information security professionals. Offered by the International Information Systems Security Certification Consortium, (ISC)2, the CISSP certification is both an objective measure of excellence and a globally recognized standard of achievement.
Benefits of the CISSP Certification for Professionals [Read more…]

CBT Nuggets Course (Videos) – EMC Information Storage and Management (EMCISA)

CBT Nuggets Course (Videos) – EMC Information Storage and Management (EMCISA)
English | Size: 2.41 GB
Category: CBTs

1. EMCISA Introduction (5 min)
2. Intro to Storage Management (15 min)
3. Hosts and Applications (10 min)
4. Introduction to Connectivity (7 min)
5. Introduction to Storage Devices (9 min)
6. Disk Drive Components (14 min)
7. Disk Drive Performance (12 min)
8. Block vs. File vs. Object Level Data Access (10 min)
9. Direct-Attached Storage (6 min) [Read more…]

CRISC Certified in Risk and Information Systems Control training video

CRISC Certified in Risk and Information Systems Control training video
English | Size: 3.26 GB
Category: CBTs

CRISC Certified in Risk and Information Systems Control training video
There is no better time to get a CRISC. For advancement in risk and information systems control and many other information systems roles, ISACA®’s globally recognized CRISC certification is recognized for the career-long value its holders enjoy. Since 2014, the CRISC certification has received over 15 recognitions and accolades.
[Read more…]

Career Academy Certified Information Systems Security Officer CISSO Series

Career Academy Certified Information Systems Security Officer CISSO Series
English | Size: 2.94 GB
Category: Tutorial

This series covers everything you need to know about becoming a Certified Information Systems Security Officer. Students will learn about risk management, security management, authentication, access control, security models, operations security, symmetric cryptography and hashing, asymmetric cryptography and PKI, network connections, network protocols and devices, telephony, VPNs and wireless, security architecture, software development security, database security and system development, business continuity, disaster recovery, incident management, law, and ethics, and physical security.
[Read more…]

Career Academy – Certified Information Systems Security Officer CISSO Series TUTORIAL

Career Academy – Certified Information Systems Security Officer CISSO Series TUTORIAL
English | Size: 2.94 GB
Category: CBTs

Membership Benefits include Free Unlimited Access to All Project Management, Business Skills, IT Service Management, IT Networking and Cyber Security Online Training Series and more. Become a Member Today!
Training Series Overview
This series covers everything you need to know about becoming a Certified Information Systems Security Officer. Students will learn about risk management, security management, authentication, access control, security models, operations security, symmetric cryptography and hashing, asymmetric cryptography and PKI, network connections, network protocols and devices, telephony, VPNs and wireless, security architecture, software development security, database security and system development, business continuity, disaster recovery, incident management, law, and ethics, and physical security.
[Read more…]