Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

CISSP Full Course

via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Embark on a comprehensive journey through the Certified Information Systems Security Professional (CISSP) certification with this extensive video course. Delve into crucial cybersecurity topics, including the CIA Triad, laws and regulations, threat vectors, cloud computing, risk management, and more. Explore key domains such as security and risk management, asset security, security architecture and engineering, communication and network security, and identity and access management. Learn about various security frameworks, intellectual property laws, business continuity planning, and physical security measures. Gain insights into cryptography, network fundamentals, wireless technologies, and access control mechanisms. This in-depth course, presented in Pashto, covers essential CISSP concepts, preparing you for the certification exam and equipping you with valuable knowledge for a career in information security.

Syllabus

CISSP Part 1 | Course Introduction | CISSP – Certified Information Systems Security Professional.
CISSP Part 2 | CIA Triad - In Pashto | CISSP – Certified Information Systems Security Professional.
CISSP Laws and Regulations Part 3 | DMCA Digital Millennium Copyright Act in Pashto.
CISSP Laws and Regulations Part 4 | HIPAA - Health Insurance Portability and Accountability Act.
CISSP Laws and Regulations Part 5 | SOX - Sarbanes–Oxley Act of 2002 in Pashto.
CISSP Laws and Regulations Part 6 | GLBA- Gramm–Leach–Bliley Act in Pashto.
CISSP Laws and Regulations Part 7 | GDPR - General Data Protection Regulation in Pashto.
CISSP Laws and Regulations Part 8 | CALEA Communications Assistance for Law Enforcement Act.
CISSP Laws and Regulations Part 9 | COPPA Children's Online Privacy Protection Act.
CISSP Laws and Regulations Part 10 | FISMA - Federal Information Security Management Act of 2002.
CISSP Laws & Regulations Part 11 PIPEDA Personal Information Protection and Electronic Documents Act.
CISSP Laws and Regulations Part 12 | FERPA Family Educational Rights and Privacy Act.
CISSP Laws and Regulations Part 13 | Wassenaar Arrangement in Pashto.
CISSP Laws and Regulations Part 14 | PCI DSS Payment Card Industry Data Security Standard in Pashto.
CISSP Part 15 | Misconception About Cybersecurity Explained in Pashto.
CISSP Part 16 | Six Threat Vectors - In Pashto.
CISSP Part 17 | Threat Vectors - Scripts Kiddie_ Hackers & Hacktivists - In Pashto.
CISSP Part 18 | Threat Vectors - Mobile Devices - In Pashto.
CISSP Part 19 | Threat Vectors - Networks In Pashto.
CISSP Part 20 | Threat Vectors - Users In Pashto.
CISSP Part 21 | Threat Vectors - Emails Web Applications & Remote Desktop Portal.
CISSP Part 22 | What is NIST and The Purpose of Security in Pashto.
CISSP Part 23 | Security Defense in Depth and Concentric Circle in Pashto.
CISSP Part 24 | Security Defense in Depth and Concentric Circle in Pashto.
Fawad Bacha Introduction to an Organizational Cybersecurity Framework and Architecture Course CISSP.
CISSP Part 25 | Private and Public Cloud Computing in Pashto.
CISSP Part 26 | Hybrid and Community Cloud Computing in Pashto.
CISSP Part 27 | Where Are Amazon, Google, and Microsoft Data Centers Located in Pashto.
CISSP Part 28 | Internet of Things (IoT) - In Pashto.
CISSP Part 29 A | MITER What is Common Vulnerabilities and Exposures (CVE) and CVSS in Pashto.
CISSP Part 29 B | MITER Common Vulnerabilities and Exposures (CVE) Walk-Through in Pashto.
CISSP Part 30 A | What is Common Weakness Enumeration (CWS) and CWSS In Pashto.
CISSP Part 30B | SQL Injection Real Life Example and Common Weakness Enumeration (CWS) in Pashto.
CISSP Part 31 A | What is Common Criteria? in Pashto.
CISSP Part 31 B | Common Criteria Walk-Through in Real Life Example in Pashto.
CISSP Part 32 | A Brief introduction to World Wide Web in Pashto.
CISSP Part 33 A | What is Deep Web and Dark Web In Pashto.
CISSP Part 33 B | Dark Web, Deep Web, and Normal Web Walk-Through Tour in Pashto.
CISSP domain 1 - Part 34 A | Short Warm-up Domain 1 Introduction.
CISSP domain 1 - Part 34 B | Policies and Standards.
CISSP domain 1 - Part 34 C | Guidelines, Procedures and Baselines.
CISSP domain 1 - Part 34 D | Policies and Procedures Samples.
CISSP domain 1 - Part 35 | What is Security Frameworks in Pashto.
CISSP domain 1 - Part 36 | What is ISO and IEC.
CISSP domain 1 - Part 37 A | An Introduction to Intellectual Property Laws.
CISSP domain 1 - Part 37 B | Trade Secret.
CISSP domain 1 - Part 37 C | Copyright.
CISSP domain 1 - Part 37 D | Trademark.
CISSP domain 1 - Part 37 E | Patent.
CISSP domain 1 - Part 38 | Senior Management.
CISSP domain 1 - Part 39 | Data Breaches and Notifications.
CISSP domain 1 - Part 40 | Organizational Risk Management Framework.
CISSP domain 1 - Part 41 | Conducting Risk Assessments.
CISSP domain 1 - Part 42 | Acceptable Level of Risk - Risk Management Options.
CISSP domain 1 - Part 43 | Risk Management Framework-RMF.
CISSP domain 1 - Part 44 | The Risk Management lifecycle.
CISSP domain 1 - Part 45 | Risk Analysis and Risk Registers.
CISSP domain 1 - Part 46 | Quantitative Risk Analysis.
CISSP domain 1 - Part 47 A | Types of Attackers -Anonymous.
CISSP domain 1 - Part 47 B | Types of Attacks and Hackers.
CISSP domain 1 - Part 47 C | Attack Tree.
CISSP domain 1 - Part 48 | Security Threat Model and Methodology.
CISSP domain 1 - Part 49 | Disaster in 3 Categories.
CISSP domain 1 - Part 50 A | Business Continuity Plan.
CISSP domain 1 - Part 50 B | Business Continuity Plan.
CISSP domain 1 - Part 51 A | Business Impact Analysis.
CISSP domain 1 - Part 51 B | Business Impact Analysis.
CISSP domain 1 - Part 51 C | Business Impact Analysis.
CISSP domain 1 - Part 52 A | Personnel Security.
CISSP domain 1 - Part 52 B | Personnel Security 2.
CISSP domain 1 - Part 52 C | Personnel Security - Hiring process.
CISSP domain 1 - Part 52 D | Personnel Security - Onboarding.
CISSP domain 1- Part 52 E | Personnel Security Employee Termination and Security Awareness Training.
CISSP domain 1 - Part 53 | Ethics | CISSP Course.
CISSP domain 2 - Part 54 | Subjects and Objects Access.
CISSP domain 2 - Part 55 A | Information Life Cycle- Data Acquisition and Use.
CISSP domain 2 - Part 55 B | Information Life Cycle- Data Archive and Disposal.
CISSP domain 2 - Part 56 A | Data Classification Levels in Government.
CISSP domain 2 - Part 56 B | Data Classification Levels in Private Sector.
CISSP domain 2 - Part 57 A | Layers of Responsibility CEO CIO.
CISSP domain 2 - Part 57 B | Layers of Responsibility Data Owner - Custodian and Security Admin.
CISSP domain 2 - Part 57 C | Layers of Responsibility Auditor.
CISSP domain 2 - Part 58 | Privacy is different from Security.
CISSP domain 2 - Part 59 | Retention Policy.
CISSP domain 2 - Part 60 A | Paper Records and Disposal.
CISSP domain 2 - Part 60 B | Digital Records and Disposal.
CISSP domain 2 - Part 61 | Protecting Privacy.
CISSP domain 2 - Part 62 | Data Remanence.
CISSP domain 2 - Part 63 | Types of Memory.
CISSP domain 2 - Part 64 A | Types of Safes.
CISSP domain 2 - Part 64 B | Protecting Assets – Data Loss Prevention DLP.
CISSP domain 3 - Part 65 | Short Intro of Domain 3.
CISSP domain 3 - Part 66 | System Architecture.
CISSP domain 3 - Part 67 | Computer Architecture and The Ring Model.
CISSP domain 3 - Part 68 | Motherboard.
CISSP domain 3 - Part 69 A | Central Processing Unit CPU 1.
CISSP domain 3 - Part 69 B | CPU Thread and Processing.
CISSP domain 3 - Part 70 | Buffer Overflow in Hardware and Software.
CISSP domain 3 - Part 71 | Operating Systems.
CISSP domain 3 - Part 72 A | Virtualization.
CISSP domain 3 - Part 72 B | Virtualization - Hypervisor.
CISSP domain 3 - Part 73 A | System Security Architecture - Trusted Computing Base.
CISSP domain 3 - Part 73 B | System Security Architecture - Security Perimeter.
CISSP domain 3 - Part 73 C | System Security Architecture - Reference Monitor.
CISSP domain 3 - Part 74 A | Security Models Fundamental Concepts.
CISSP domain 3 - Part 74 B | Security Models - Bell–LaPadula Security Model.
CISSP domain 3 - Part 74 C | Security Models - Biba Security Model.
CISSP domain 3 - Part 74 D | Security Models - Clark-Wilson and Non-interference Security Model.
CISSP domain 3 - Part 75 | Certification vs Accreditation.
CISSP domain 3 - Part 76 | Open vs Closed System.
CISSP domain 3 - Part 77 A | Client Based - Mobile System Security.
CISSP domain 3 - Part 77 B | Grid Computing and Peer to Peer Computer System.
CISSP domain 3 - Part 78 | Mobile Devices Threats and Security.
CISSP domain 3 - Part 79 A | Cloud Computing.
CISSP domain 3 - Part 79 B | Cloud Computing Amazon AWS Walk-Through.
CISSP domain 3 - Part 80 | IoT Embedded System.
CISSP domain 3 - Part 81 | Parallel Computing.
CISSP domain 3 - Part 82 A | Industrial Control System - ICS Introduction.
CISSP domain 3 - Part 82 B | Industrial Control System ICS - RTU - Programmable Logic Controller PLC.
CISSP domain 3 - Part 82 C | Distributed Control System DCS - SCADA.
CISSP domain 3 - Part 82 D | SCADA Threats and Security.
CISSP domain 3 - Part 82 E | SCADA Real Life Cyberattack.
CISSP domain 3 - Part 83 | What is Cryptography.
CISSP domain 3 - Part 84 A | Timeline of Cryptography.
CISSP domain 3 - Part 84 B | Timeline of Cryptography.
CISSP domain 3 - Part 85 | What is Cryptosystem and Algorithm.
CISSP domain 3 - Part 86 | One Time Passcode Types of Cipher and Steganography.
CISSP domain 3 - Part 87 A | Symmetric Algorithm - DES.
CISSP domain 3 - Part 87 B | Symmetric Algorithm - Brute Force Attack - 3 DES.
CISSP domain 3 - Part 87 C | Symmetric Algorithm - AES.
CISSP domain 3 - Part 88-90 | Asymmetric Algorithm.
CISSP domain 3 - Part 91 A | Introduction to Physical Security.
CISSP domain 3 - Part 91 B | Physical Security and Alarm and Sensor system.
CISSP domain 3 - Part 91 C | Front Desk Tailgating – Mantrap – Turnstiles.
CISSP domain 3 - Part 91 D | Contraband Check.
CISSP domain 3 - Part 91 E | Human or Dog Guard.
CISSP domain 3 - Part 91 F | Dumpster Diving.
CISSP domain 3 - Part 91 G | Video Surveillance System DVR NVR CCTV.
CISSP domain 3 - Part 91 H | Lightning Security.
CISSP domain 3 - Part 92 | Fences Gates and Bollards.
CISSP domain 3 - Part 93 | Types of Locks.
Part 94 - Domain 3 - Types of Smart Cards.
CISSP domain 3 - Part 95 | Facilities Selection and Construction Check Up.
CISSP domain 3 - Part 96 | Data Center.
CISSP domain 3 - Part 97 A | Electricity | Electrical Power | Types of Electricity.
CISSP domain 3 - Part 97 B | Electricity | Electrical Power | Power Fluctuation.
CISSP domain 3 - Part 98 A | Fire Detector to secure the system with Alarm.
CISSP domain 3 - Part 98 B | Fire Detection, Alarm Optical and Heat system and Suppression.
CISSP domain 4 - Part 99 | Short Introductions | Communications and Network Security.
CISSP domain 4 - Part 100 A | Network Basics and Definitions.
CISSP domain 4 - Part 100 B | Network Basics and Definitions.
CISSP domain 4 - Part 101 | OSI Model.
CISSP domain 4 - Part 102 | TCP_IP Model and Real World Example.
CISSP domain 4 - Part 103 | TCP Further Discussion.
CISSP domain 4 - Part 104 A | IPv4 and IPv6 Addresses.
CISSP domain 4 - Part 104 B | IPv4 and IPv6 Addresses Real Life Example.
CISSP domain 4 - Part 105 | Types of Ports - Analog vs Digital Signal and Asynchronous & Synchronous.
CISSP domain 4 - Part 106 | Types of Cables.
CISSP domain4-Part 107 | FHSS-Frequency Hopping Spread Spectrum-DSSS-Direct Sequence Spread Spectrum.
CISSP domain 4 - Part 108 A | Wireless Technology.
CISSP domain 4 - Part 108 B | Wireless Technology.
CISSP domain 4 - Part 108 C | Wireless Technology.
CISSP domain 4 - Part 109 | Bluetooth and its Attacks.
CISSP domain 4 - Part 110 | Best Practices for Securing WLANs.
CISSP domain 4 - Part 111 | Satellite Network.
CISSP domain 4 - Part 112 | Mobile Wireless Communication.
CISSP domain 4 - Part 113 | Types of Network Topologies.
CISSP domain 4 - Part 114 | CSMA ARP MAC Media Access Control.
CISSP domain 4 - Part 115 | Dynamic Host Configuration Protocol - DHCP and ICMP.
CISSP domain 4 - Part 116 | Simple Network Management Protocol - SNMP.
Part 117 A Domain 4 Domain Name System DNS | DNS server and how it works.
Part 117 B Domain 4 DNS Root Servers Around The World.
Part 118 - Domain 4 - Simple Mail Transfer Protocol - SMTP POP3 IMAP.
Part 119 - Domain 4 - Network Address Translation - NAT.
Part 120 - Domain 4 - What are Routers, Hubs, Switches, Bridges.
Part 121 - Domain 4 - What is Private Branch Exchange System PBX and Phreaker - Phone Hackers.
Part 122 A - Domain 4 - What is Firewall and Types of Firewall.
Part 122 B - Domain 4 - What is Firewall and Types of Firewall.
Part 122 C - Domain 4 - What is Firewall and Types of Firewall.
Part 123 - Domain 4 - What is a Proxy Server | CISSP Course.
Part 124 - Domain 4 - What is a Honeypot? | CISSP Course in Pashto.
Part 125 - Domain 4 - What is a VPN_ Virtual Private Network | CISSP Course.
Part 126 - Domain 5 - Introduction to Domain 5 Identity and Access Management | CISSP Course.
Part 127 - Domain 5 - Subject to Objects and Access Control | CISSP Course.
Part 128 - Domain 5 - Centralized and Decentralized Access Control | CISSP Course.
Part 129 A - Domain 5 - Authentication Something You Know Type 1 | CISSP Course.
Part 129 B - Domain 5 - Authentication Something You Know Type 1 | CISSP Course.
Part 130 - Domain 5 - Authentication Something You Have Type 2 | CISSP Course.
Part 131 - Domain 5 - Authentication Something You Are Type 3 | CISSP Course.
CISSP Domain 5 | Part 132 - Authorization Accountability and Auditing.
CISSP Domain 5 | Part 133 - Identity Management System and Active Directory | CISSP Course.

Taught by

Cyber Pashto

Reviews

Start your review of CISSP Full Course

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.