CYBERSECURITY NEWS

Web Security – Threatpost

Firewall Bug Under Active Attack Triggers CISA Warning

CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.

Fake Reservation Links Prey on Weary Travelers

Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.

Google Patches Chrome’s Fifth Zero-Day of the Year

An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.

MMSTECH010: CISSP Boot camp (Part 1 and 2)

CISSP (Certified Information Systems Security Professional)

Overview:

In this course, students will analyze a wide range of information systems security subjects that are organized into 10 domains for CISSP exam certification.

 

Outline:

Lesson 1: Information Systems Access Control

  • Data Access Principles
  • System Access and Authentication
  • Penetration Tests

Lesson 2: Security Architecture and Design

  • Security Models
  • Security Modes
  • System Assurance

Lesson 3: Network and Telecommunications Security

  • Data Network Design
  • Remote Data Access
  • Data Network Security
  • Data Network Management

Lesson 4: Information Security Management Goals

  • Organizational Security
  • The Application of Security Concepts

Lesson 5: Information Security Classification and Program Development

  • Information Classification
  • Security Program Development

Lesson 6: Risk Management and Ethics

  • Risk Management
  • Ethics

Lesson 7: Software Development Security

  • Software Configuration Management
  • Software Controls
  • Database System Security

Lesson 8: Cryptography

  • Ciphers and Cryptography
  • Symmetric-Key Cryptography
  • Asymmetric-Key Cryptography
  • Hashing and Message Digests
  • Email, Internet, and Wireless Security
  • Cryptographic Weaknesses

Lesson 9: Physical Security

  • Physical Access Control
  • Physical Access Monitoring
  • Physical Security Methods
  • Facilities Security

Lesson 10: Operations Security

  • Operations Security Control
  • Operations Security Auditing and Monitoring
  • Operational Threats and Violations

Lesson 11: Business Continuity and Disaster Recovery Planning

  • Business Continuity Plan Fundamentals
  • Business Continuity Plan Implementation
  • Disaster Recovery Plan Fundamentals
  • Disaster Recovery Plan Implementation

Lesson 12: Legal, Regulations, Compliance, and Investigations

  • Computer Crime Laws and Regulations
  • Computer Crime Incident Response