Published on ThorTeaches and Udemy:
Domain 1 what we will be covering
The CIA triad – Part 1 – Confidentiality, Integrity, and Availability
The CIA triad – Part 2 – Confidentiality, Integrity, and Availability
IAAA – Part 1 – Identification, Authentication, Authorization, and Accountability
IAAA – Part 2 – Identification, Authentication, Authorization, and Accountability
Governance and Management
Standards and frameworks
Laws and regulations
Laws and regulations – Evidence
US laws, European laws, and international treaties
GDPR (General Data Protection Regulation)
International agreements and guidelines.
3rd party, Acquisitions, and Divesture security.
The (ISC)² Code of Ethics
Information Security Governance: Values, vision, mission, and plans.
Information Security Governance: Policies, procedures, guidelines, and frameworks.
Access Control Categories and Types
Risk Management – Identification
Risk Management – Assessment Part 1
Risk Management – Assessment Part 2
KGIs, KPIs, and KRIs
Risk response and mitigation & Risk and Control Monitoring and Reporting.
NIST SP 800-53 Revision 4
NIST SP 800-37 Revision 1 and 2
Risk: Attackers and types of attacks – Part 1.
Risk: Attackers and types of attacks – Part 2.
BCP – Business Continuity Planning – Part 1.
BCP – Business Continuity Planning – Part 2.
BCP – BIA (Business Impact Analysis).
Domain 1 what we covered.
Domain 1 study guides
Domain 2 what we will be covering.
The information life cycle.
Data classification and clearance.
The 3 states of data (data at rest, data in motion, and data in use).
Data handling, data storage, and data retention.
Mission, data, system owners, and data custodians.
Memory and data remanence.
Data remanence and destruction.
Data security frameworks.
Domain 2 what we covered.
Domain 2 study guides
Domain 3 what we will be covering.
Security models and concepts – introduction.
Security models and concepts – part 1
Security models and concepts – part 2
Security evaluation models
Secure system design concepts
Secure operating systems and software architecture
Virtualization, Cloud, and Distributed Computing – Part 1
Virtualization, Cloud, and Distributed Computing – Part 2
Virtualization, Cloud, and Distributed Computing – Part 3
Virtualization, Cloud, and Distributed Computing – Part 4
IOT (Internet Of Things)
Emanations and covert channels.
Malware part 1
Malware part 2
Web architecture and attacks
Mobile device security
Industrial Control Systems
Introduction to Cryptography part 1
Introduction to Cryptography part 2
The history of cryptography part 1
The history of cryptography part 2
The encryption we use today
Symmetric encryption part 1
Symmetric encryption part 2
Asymmetric encryption part 1
Asymmetric encryption part 2
Hashing part 1
Hashing part 2
Attacks on our cryptography part 1
Attacks on our cryptography part 2
Attacks on our cryptography part 3
MAC, HMAC, SSL, and TLS
IPSec and PGP
Physical security part 1
Physical security part 2
Physical security part 3
Physical security part 4
Physical security part 5
Physical security part 6
Site selection part 1
Site selection part 2
Asset tracking and hardware hardening
Fire suppression and hot and cold aisles
Heat, Flame, Particle, and Smoke Detectors
Domain 3 what we covered.
Domain 3 study guides
How to design your career and certification path
The 4 things you need to pass your CISSP certification
How to find your study materials – Videos and books
How to find your study materials – Free resources
How to find your study materials – Practice questions
What I would get if I was studying for the CISSP
How to build your study plan
How to use practice questions, deconstruct them, and time management – part 1
How to use practice questions, deconstruct them, and time management – part 2
Updates are sent a full domain at a time, how long Safari takes before they update the content I can’t speculate on.
Sent to Safari:
CISSP Domain 1
CISSP Domain 2
CISSP Domain 3
Being recorded next: Domain 4
Domain 4 – What we will be covering
Networking basics and definitions
The OSI model
The TCP-IP model
IP addresses and port numbers part 1
IP addresses and port numbers part 2
IP support protocols
SAN and VoIP protocols
Layer 1 to 3 networking devices
Layer 3 routing protocols
Network authentication protocols
What we covered in Domain 4
Domain 5 – all (record, edit, subtitles, study guides)
Domain 6 – all (record, edit, subtitles, study guides)
Domain 7 – all (record, edit, subtitles, study guides)
Domain 8 – all (record, edit, subtitles, study guides)
Domain 1 – all (record, edit, subtitles, study guides)
Domain 2 – all (record, edit, subtitles, study guides)
Domain 3 – all (record, edit, subtitles, study guides)
Domain 4 – all (record, edit, subtitles, study guides)
Q: In which order are you redoing the courses?
A: We are redoing the CISSP courses first starting with domain 1, then we will do the CISM courses.
Q: How will this happen?
A: We will record one domain at a time.
Q: How are they being updated?
A: Video on ThorTeaches.com and Udemy.com will be uploaded as soon as they are completed. New videos are being added daily. When they are recorded, edited, and subtitles are completed.
For videos on Safari we give them 1 domain at a time as soon as the entire domain is done, how long it takes them to upload I have no clue.
Q: If I already have your courses do I need to buy the new versions?
A: No, the update is being done in place, at no extra charge, you have already paid for them.
The same when the CISSP curriculum updates in 2021, also no charge for the updated content.
Q: When will the updates be completed?
A: The plan is for the CISSP courses to be done by mid-November and CISM by late-December. It being 2020, that may change.