CISSP Domain 2 Review / Mind Map (1 of 2) | Asset Classification

Review of the major Asset Classification concepts and terms, and how they interrelate, to help you review, guide your studies, and help you pass the CISSP ex...

Destination Certification150.3K views14:22

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Thailand under the topic 'สภาพอากาศ'.

About this video

Review of the major Asset Classification concepts and terms, and how they interrelate, to help you review, guide your studies, and help you pass the CISSP exam. This MindMap covers: 0:00 Introduction 0:30 Asset Classification/Data Classification 1:02 Asset Inventory 1:45 Data Classification Policy 2:22 Classification 2:50 Labeling 3:09 Marking 3:22 Categorization 3:47 Data Owner/Controller 4:03 Data Processor 4:18 Data Custodian 4:35 Data Steward 4:55 Data Subject 5:13 Protecting Data at Rest 5:17 Encryption 5:37 Access Control 5:55 Backups 6:06 Protecting Data in Motion 6:22 End-to-End Encryption 7:08 Link Encryption 7:51 Onion Networks 9:11 Data in Use 9:38 Data Archive 10:05 Defensible Destruction of Data 10:36 Destruction of Data 10:48 Purging of Data 11:00 Clearing of Data 11:13 Media Destruction 11:28 Shred/Disintegrate/Drill 11:41 Degaussing 11:59 Crypto Shredding 12:35 Overwriting/Wiping/ Erasure 13:03 Formatting 13:17 Best to Worst Data Destruction Methods 13:23 Assess and Review 13:51 Outro Other MindMaps: Domain 1 Security & Risk Management: https://youtu.be/geGALIfOxtI Domain 2 Asset Classification: https://youtu.be/aN9zkmzYTmQ Privacy: https://youtu.be/lrI4QIa8S2I Domain 3 Models and Frameworks: https://youtu.be/qZB6_lp9M30 Evaluation Criteria: https://youtu.be/WqHmDL7YAvw Trusted Computing Base: https://youtu.be/fwU7n_3h058 Vulnerabilities in Systems: https://youtu.be/fPUypU7ysMw Cloud: https://youtu.be/-rWQ7YuxiLY Cryptography: https://youtu.be/LLRaa0kOMDM Digital Certificates, Digital Signatures & PKI: https://youtu.be/8XKdFSG3ua4 Cryptanalysis: https://youtu.be/pnITDgs63M4 Physical Security: https://youtu.be/7ESQwNJ9HXU Domain 5 Access Control Overview: https://youtu.be/BUcoABZzeQ4 Single Sing-on & Federated Access: https://youtu.be/_U4QMIxVk8M Domain 6 Security Assessment and Testing Overview: https://youtu.be/eDVZvw5NziA Vulnerability Assessment and Penetration Testing: https://youtu.be/vZ0S8GdWiIk Logging & Monitoring: https://youtu.be/cwcARccyWyY Domain 7 Investigations: https://youtu.be/Urev5cZgny8 Incident Response: https://youtu.be/PwxFwndQ7Jk Malware: https://youtu.be/SVbrRozyIpo Patching & Change Management: https://youtu.be/xX4U6Lz82Bk Recovery Strategies: https://youtu.be/DrrfrJBnx28 Business Continuity Management (BCM): https://youtu.be/oAjNL3I_3-E Domain 8 Secure Software Development: https://youtu.be/fS5WWjuyFmQ Databases: https://youtu.be/-70DBd6cNDw CISSP Master Instructor, John Berti: https://www.linkedin.com/in/jberti/ Visuals, narration and CISSP Master Instructor, Rob Witcher: https://www.linkedin.com/in/robwitcher/ Video editing by Nick: threntinfo@gmail.com

Video Information

Views
150.3K

Total views since publication

Likes
2.8K

User likes and reactions

Duration
14:22

Video length

Published
May 29, 2020

Release date

Quality
hd

Video definition