CISSP Domain 2 Asset Classification | Complete Review & Mind Map πŸ“š

Master key Asset Classification concepts for CISSP Domain 2 with this comprehensive review and visual mind map. Ideal for exam prep and understanding interrelated terms!

CISSP Domain 2 Asset Classification | Complete Review & Mind Map πŸ“š
Destination Certification
150.3K views β€’ May 29, 2020
CISSP Domain 2 Asset Classification | Complete Review & Mind Map πŸ“š

About this video

Review of the major Asset Classification concepts and terms, and how they interrelate, to help you review, guide your studies, and help you pass the CISSP exam.

This MindMap covers:

0:00 Introduction
0:30 Asset Classification/Data Classification
1:02 Asset Inventory
1:45 Data Classification Policy
2:22 Classification
2:50 Labeling
3:09 Marking
3:22 Categorization
3:47 Data Owner/Controller
4:03 Data Processor
4:18 Data Custodian
4:35 Data Steward
4:55 Data Subject
5:13 Protecting Data at Rest
5:17 Encryption
5:37 Access Control
5:55 Backups
6:06 Protecting Data in Motion
6:22 End-to-End Encryption
7:08 Link Encryption
7:51 Onion Networks
9:11 Data in Use
9:38 Data Archive
10:05 Defensible Destruction of Data
10:36 Destruction of Data
10:48 Purging of Data
11:00 Clearing of Data
11:13 Media Destruction
11:28 Shred/Disintegrate/Drill
11:41 Degaussing
11:59 Crypto Shredding
12:35 Overwriting/Wiping/ Erasure
13:03 Formatting
13:17 Best to Worst Data Destruction Methods
13:23 Assess and Review
13:51 Outro

Other MindMaps:

Domain 1
Security & Risk Management: https://youtu.be/geGALIfOxtI

Domain 2
Asset Classification: https://youtu.be/aN9zkmzYTmQ
Privacy: https://youtu.be/lrI4QIa8S2I

Domain 3
Models and Frameworks: https://youtu.be/qZB6_lp9M30
Evaluation Criteria: https://youtu.be/WqHmDL7YAvw
Trusted Computing Base: https://youtu.be/fwU7n_3h058
Vulnerabilities in Systems: https://youtu.be/fPUypU7ysMw
Cloud: https://youtu.be/-rWQ7YuxiLY
Cryptography: https://youtu.be/LLRaa0kOMDM
Digital Certificates, Digital Signatures & PKI: https://youtu.be/8XKdFSG3ua4
Cryptanalysis: https://youtu.be/pnITDgs63M4
Physical Security: https://youtu.be/7ESQwNJ9HXU

Domain 5
Access Control Overview: https://youtu.be/BUcoABZzeQ4
Single Sing-on & Federated Access: https://youtu.be/_U4QMIxVk8M

Domain 6
Security Assessment and Testing Overview: https://youtu.be/eDVZvw5NziA
Vulnerability Assessment and Penetration Testing: https://youtu.be/vZ0S8GdWiIk
Logging & Monitoring: https://youtu.be/cwcARccyWyY

Domain 7
Investigations: https://youtu.be/Urev5cZgny8
Incident Response: https://youtu.be/PwxFwndQ7Jk
Malware: https://youtu.be/SVbrRozyIpo
Patching & Change Management: https://youtu.be/xX4U6Lz82Bk
Recovery Strategies: https://youtu.be/DrrfrJBnx28
Business Continuity Management (BCM): https://youtu.be/oAjNL3I_3-E

Domain 8
Secure Software Development: https://youtu.be/fS5WWjuyFmQ
Databases: https://youtu.be/-70DBd6cNDw

CISSP Master Instructor, John Berti: https://www.linkedin.com/in/jberti/
Visuals, narration and CISSP Master Instructor, Rob Witcher: https://www.linkedin.com/in/robwitcher/
Video editing by Nick: threntinfo@gmail.com

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

150.3K

Likes

2.8K

Duration

14:22

Published

May 29, 2020

User Reviews

4.7
(30)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.