
CISSP Domain6 Section 2
6.2 Conduct Security Control Testing6.2.1 Vulnerability Assessment6.2.2 Penetration Testing6.2.3 Log Reviews6.2.4 Synthetic Transaction6.2.5 Code review and testing6.2.6 Misuse case testing6.2.7 Cover...
16 Loka 202411min

CISSP Domain6 Intro and Section 1
6.0 DOMAIN 6: SECURITY ASSESSMENT AND TESTING6.1 Design and Validate assessment, test, and audit strategies6.1.1 Internal6.1.2 External6.1.3 Third-party6.1.4 Location (e.g. on-premises, cloud, hybrid)
16 Loka 202411min

CISSP Domain5 Intro and Section 5
5.5 Manage the identity and access provisioning lifecycle5.5.1 Account access review (e.g., user, system, service)5.5.2 Provisioning and deprovisioning (e.g., on/off boarding & transfers)5.5.3 Role de...
16 Loka 202414min

CISSP Domain5 Intro and Section 4
5.4 Implement and manage authorization mechanisms
16 Loka 202410min

CISSP Domain5 Intro and Section 3
5.3 Federated identity with a third-party service5.3.1 On-Premises5.3.2 Cloud5.3.3 Hybrid
16 Loka 202412min

CISSP Domain5 Section 2
5.2 Design identification and authentication Strategy (e.g., people, devices, and services)5.2.1 Groups and Roles5.2.2 Authentication, Authorization and Accounting (AAA) (e.g., MFA, password-less auth...
16 Loka 202418min

CISSP Domain5 Intro and Section 1
5.0 DOMAIN 5: IDENTITY & ACCESS MANAGEMENT (IAM)5.1 Control physical and logical access to assets5.1.1 Information5.1.2 Systems5.1.3 Devices5.1.4 Facilities5.1.5 Applications5.1.6 Services
16 Loka 202416min

CISSP Domain4 Section 3
4.3 Implement secure communication channels according to design4.3.1 Voice, video, and collaboration (e.g., conferencing, Zoom rooms)4.3.2 Remote access (e.g., network administrative functions)4.3.3 D...
16 Loka 202411min

