CISSP Domain7 Section 7
CISSP Central16 Okt 2024

CISSP Domain7 Section 7

7.7 Operate and maintain detection and preventative measures

  • 7.7.1 Firewall
  • 7.7.2 Intrusion detection and prevention systems
  • 7.7.3 Whitelisting/Blacklisting
  • 7.7.4 Third-party provided security services
  • 7.7.5 Sandboxing
  • 7.7.6 Honeypots / Honeynets
  • 7.7.7 Anti-malware
  • 7.7.8 Machine learning and artificial intelligence (AI) based tools

Episoder(50)

CISSP Domain6 Section 2

CISSP Domain6 Section 2

6.2 Conduct Security Control Testing6.2.1 Vulnerability Assessment6.2.2 Penetration Testing6.2.3 Log Reviews6.2.4 Synthetic Transaction6.2.5 Code review and testing6.2.6 Misuse case testing6.2.7 Cover...

16 Okt 202411min

CISSP Domain6 Intro and Section 1

CISSP Domain6 Intro and Section 1

6.0 DOMAIN 6: SECURITY ASSESSMENT AND TESTING6.1 Design and Validate assessment, test, and audit strategies6.1.1 Internal6.1.2 External6.1.3 Third-party6.1.4 Location (e.g. on-premises, cloud, hybrid)

16 Okt 202411min

CISSP Domain5 Intro and Section 5

CISSP Domain5 Intro and Section 5

5.5 Manage the identity and access provisioning lifecycle5.5.1 Account access review (e.g., user, system, service)5.5.2 Provisioning and deprovisioning (e.g., on/off boarding & transfers)5.5.3 Role de...

16 Okt 202414min

CISSP Domain5 Intro and Section 4

CISSP Domain5 Intro and Section 4

5.4 Implement and manage authorization mechanisms

16 Okt 202410min

CISSP Domain5 Intro and Section 3

CISSP Domain5 Intro and Section 3

5.3 Federated identity with a third-party service5.3.1 On-Premises5.3.2 Cloud5.3.3 Hybrid

16 Okt 202412min

CISSP Domain5 Section 2

CISSP Domain5 Section 2

5.2 Design identification and authentication Strategy (e.g., people, devices, and services)5.2.1 Groups and Roles5.2.2 Authentication, Authorization and Accounting (AAA) (e.g., MFA, password-less auth...

16 Okt 202418min

CISSP Domain5 Intro and Section 1

CISSP Domain5 Intro and Section 1

5.0 DOMAIN 5: IDENTITY & ACCESS MANAGEMENT (IAM)5.1 Control physical and logical access to assets5.1.1 Information5.1.2 Systems5.1.3 Devices5.1.4 Facilities5.1.5 Applications5.1.6 Services

16 Okt 202416min

CISSP Domain4 Section 3

CISSP Domain4 Section 3

4.3 Implement secure communication channels according to design4.3.1 Voice, video, and collaboration (e.g., conferencing, Zoom rooms)4.3.2 Remote access (e.g., network administrative functions)4.3.3 D...

16 Okt 202411min

Populært innen Teknologi

lydartikler-fra-aftenposten
romkapsel
teknisk-sett
nasjonal-sikkerhetsmyndighet-nsm
tomprat-med-gunnar-tjomlid
shifter
teknologi-og-mennesker
rss-impressions-2
smart-forklart
energi-og-klima
elektropodden
rss-alt-som-gar-pa-strom
fornybaren
rss-heis
rss-ai-forklart
pedagogisk-intelligens
rss-polypod
rss-djtommy43
rss-ki-praten
rss-grenser-for-ki