|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| 001. Assessment, test, & security audit strategies.en.srt |
46.74KB |
| 001. Assessment, test, & security audit strategies.mp4 |
158.31MB |
| 001. Control physical and logical access to assets.en.srt |
45.65KB |
| 001. Control physical and logical access to assets.mp4 |
206.28MB |
| 001. Engineering process using secure design principles.en.srt |
23.30KB |
| 001. Engineering process using secure design principles.mp4 |
153.97MB |
| 001. Identify and classify information, assets.en.srt |
36.32KB |
| 001. Identify and classify information, assets.mp4 |
160.86MB |
| 001. Overview.en.srt |
6.13KB |
| 001. Overview.mp4 |
26.37MB |
| 001. Spotlight on the OSI Model.en.srt |
43.18KB |
| 001. Spotlight on the OSI Model.mp4 |
159.62MB |
| 001. Spotlight on the Software Development Life Cycle.en.srt |
49.98KB |
| 001. Spotlight on the Software Development Life Cycle.mp4 |
190.49MB |
| 001. Understand and comply with investigations.en.srt |
49.93KB |
| 001. Understand and comply with investigations.mp4 |
197.00MB |
| 001. What is the CISSP Toolbox.en.srt |
2.17KB |
| 001. What is the CISSP Toolbox.mp4 |
13.96MB |
| 002. Certs & Accreditation Verification & Validation.en.srt |
30.46KB |
| 002. Certs & Accreditation Verification & Validation.mp4 |
113.68MB |
| 002. Conduct logging & monitoring activities.en.srt |
47.73KB |
| 002. Conduct logging & monitoring activities.mp4 |
246.74MB |
| 002. Establish information, asset handling requirements.en.srt |
46.50KB |
| 002. Establish information, asset handling requirements.mp4 |
221.07MB |
| 002. Fundamental concepts of security models.en.srt |
23.51KB |
| 002. Fundamental concepts of security models.mp4 |
151.65MB |
| 002. Manage identification and authentication.en.srt |
49.28KB |
| 002. Manage identification and authentication.mp4 |
135.01MB |
| 002. Spotlight on Internet Protocol (IP) networking.en.srt |
48.34KB |
| 002. Spotlight on Internet Protocol (IP) networking.mp4 |
154.92MB |
| 002. Spotlight on System and Org Controls Reports (SOC).en.srt |
37.19KB |
| 002. Spotlight on System and Org Controls Reports (SOC).mp4 |
143.19MB |
| 002. Understand adhere, promote professional ethics.en.srt |
21.09KB |
| 002. Understand adhere, promote professional ethics.mp4 |
72.38MB |
| 002. Who are you.en.srt |
8.41KB |
| 002. Who are you.mp4 |
26.11MB |
| 003. Conduct logging & monitoring activities - threat.en.srt |
42.90KB |
| 003. Conduct logging & monitoring activities - threat.mp4 |
267.72MB |
| 003. Conduct security control testing - the basics.en.srt |
50.61KB |
| 003. Conduct security control testing - the basics.mp4 |
187.86MB |
| 003. Controls based upon system security requirements.en.srt |
41.87KB |
| 003. Controls based upon system security requirements.mp4 |
141.10MB |
| 003. Federated identity with a third-party service.en.srt |
47.11KB |
| 003. Federated identity with a third-party service.mp4 |
203.12MB |
| 003. Provision resources securely.en.srt |
31.47KB |
| 003. Provision resources securely.mp4 |
254.22MB |
| 003. Security in the SDLC - Methodologies.en.srt |
50.53KB |
| 003. Security in the SDLC - Methodologies.mp4 |
197.23MB |
| 003. Spotlight on IPsec.en.srt |
48.87KB |
| 003. Spotlight on IPsec.mp4 |
194.96MB |
| 003. Understand and apply security concepts (CIA).en.srt |
36.86KB |
| 003. Understand and apply security concepts (CIA).mp4 |
189.78MB |
| 003. What does your study plan look like.en.srt |
10.41KB |
| 003. What does your study plan look like.mp4 |
33.94MB |
| 004. Conduct security control testing - the rest.en.srt |
54.66KB |
| 004. Conduct security control testing - the rest.mp4 |
180.92MB |
| 004. Evaluate and apply security governance principles.en.srt |
34.13KB |
| 004. Evaluate and apply security governance principles.mp4 |
165.86MB |
| 004. Implement, manage auth mechanisms - Vocab.en.srt |
44.63KB |
| 004. Implement, manage auth mechanisms - Vocab.mp4 |
230.61MB |
| 004. Manage data lifecycle.en.srt |
42.65KB |
| 004. Manage data lifecycle.mp4 |
150.99MB |
| 004. Perform Configuration Management (CM).en.srt |
42.32KB |
| 004. Perform Configuration Management (CM).mp4 |
275.27MB |
| 004. Security capabilities of Information Systems - vocab.en.srt |
46.44KB |
| 004. Security capabilities of Information Systems - vocab.mp4 |
134.71MB |
| 004. Security in the SDLC - Maturity Models.en.srt |
47.15KB |
| 004. Security in the SDLC - Maturity Models.mp4 |
175.97MB |
| 004. Spotlight on Secure Protocols.en.srt |
34.98KB |
| 004. Spotlight on Secure Protocols.mp4 |
122.92MB |
| 004. What is your timeline.en.mp4 |
42.04MB |
| 004. What is your timeline.en.srt |
13.35KB |
| 005. Apply foundational security operations concepts.en.srt |
17.64KB |
| 005. Apply foundational security operations concepts.mp4 |
55.22MB |
| 005. Collect security process data.en.srt |
46.13KB |
| 005. Collect security process data.mp4 |
166.62MB |
| 005. Determine compliance and other requirements.en.srt |
30.41KB |
| 005. Determine compliance and other requirements.mp4 |
144.28MB |
| 005. Ensure appropriate asset retention.en.srt |
38.41KB |
| 005. Ensure appropriate asset retention.mp4 |
159.94MB |
| 005. Implement, manage auth mechanisms - Models.en.srt |
48.86KB |
| 005. Implement, manage auth mechanisms - Models.mp4 |
306.31MB |
| 005. Implications of converged & multilayer protocols.en.srt |
22.92KB |
| 005. Implications of converged & multilayer protocols.mp4 |
102.82MB |
| 005. Security capabilities of Information Systems - CPU.en.srt |
44.12KB |
| 005. Security capabilities of Information Systems - CPU.mp4 |
222.00MB |
| 005. Security in the SDLC - odds & ends.en.srt |
38.10KB |
| 005. Security in the SDLC - odds & ends.mp4 |
191.64MB |
| 006. Analyze test output and generate reports.en.srt |
35.46KB |
| 006. Analyze test output and generate reports.mp4 |
145.34MB |
| 006. Apply controls in development ecosystems - basics.en.srt |
51.29KB |
| 006. Apply controls in development ecosystems - basics.mp4 |
188.12MB |
| 006. Apply resource protection.en.srt |
47.33KB |
| 006. Apply resource protection.mp4 |
276.24MB |
| 006. Data security controls and compliance requirements.en.srt |
48.75KB |
| 006. Data security controls and compliance requirements.mp4 |
150.86MB |
| 006. Legal, regulatory issues for information security.en.srt |
44.84KB |
| 006. Legal, regulatory issues for information security.mp4 |
238.76MB |
| 006. Manage the identity, access provisioning lifecycle.en.srt |
43.30KB |
| 006. Manage the identity, access provisioning lifecycle.mp4 |
157.18MB |
| 006. Security capabilities of Info Systems - Memory.en.srt |
52.82KB |
| 006. Security capabilities of Info Systems - Memory.mp4 |
288.93MB |
| 006. Spotlight on Micro-segmentation.en.srt |
48.65KB |
| 006. Spotlight on Micro-segmentation.mp4 |
261.35MB |
| 007. Apply controls in development ecosystems - rest.en.srt |
41.17KB |
| 007. Apply controls in development ecosystems - rest.mp4 |
161.60MB |
| 007. Assess and mitigate vulnerabilities - the basics.en.srt |
51.72KB |
| 007. Assess and mitigate vulnerabilities - the basics.mp4 |
291.66MB |
| 007. Assets Security - Key Points.en.srt |
39.60KB |
| 007. Assets Security - Key Points.mp4 |
111.05MB |
| 007. Conduct incident management.en.srt |
33.15KB |
| 007. Conduct incident management.mp4 |
137.32MB |
| 007. Implement authentication systems.en.srt |
47.20KB |
| 007. Implement authentication systems.mp4 |
159.12MB |
| 007. Security Assessment and Testing - Key Points.en.srt |
41.32KB |
| 007. Security Assessment and Testing - Key Points.mp4 |
113.17MB |
| 007. Spotlight on the GDPR.en.srt |
46.85KB |
| 007. Spotlight on the GDPR.mp4 |
247.16MB |
| 007. Wireless, Cellular & Content Distribution Networks.en.srt |
49.98KB |
| 007. Wireless, Cellular & Content Distribution Networks.mp4 |
159.61MB |
| 008. Assess and mitigate vulnerabilities - the rest.en.srt |
53.78KB |
| 008. Assess and mitigate vulnerabilities - the rest.mp4 |
321.12MB |
| 008. Detective & preventative measures.en.srt |
50.74KB |
| 008. Detective & preventative measures.mp4 |
179.31MB |
| 008. Secure Network Components.en.srt |
38.58KB |
| 008. Secure Network Components.mp4 |
167.40MB |
| 008. Spotlight on Kerberos.en.srt |
53.47KB |
| 008. Spotlight on Kerberos.mp4 |
219.41MB |
| 008. Spotlight on the OWASP TOP 10.en.srt |
45.07KB |
| 008. Spotlight on the OWASP TOP 10.mp4 |
164.36MB |
| 008. Understand requirements for investigation types.en.srt |
46.61KB |
| 008. Understand requirements for investigation types.mp4 |
152.53MB |
| 009. Assess the effectiveness of software security.en.srt |
51.30KB |
| 009. Assess the effectiveness of software security.mp4 |
195.31MB |
| 009. Implement Secure Communication Channels.en.srt |
48.43KB |
| 009. Implement Secure Communication Channels.mp4 |
281.14MB |
| 009. Patch & vulnerability management.en.srt |
34.54KB |
| 009. Patch & vulnerability management.mp4 |
159.97MB |
| 009. Security policy, standards, procedures, guidelines.en.srt |
30.04KB |
| 009. Security policy, standards, procedures, guidelines.mp4 |
163.42MB |
| 009. Spotlight on cryptographic solutions - Symmetric.en.srt |
49.88KB |
| 009. Spotlight on cryptographic solutions - Symmetric.mp4 |
204.96MB |
| 009. Spotlight on Federated Identity Management (FIM).en.srt |
35.28KB |
| 009. Spotlight on Federated Identity Management (FIM).mp4 |
259.38MB |
| 010. Assess security impact of acquired software.en.srt |
13.68KB |
| 010. Assess security impact of acquired software.mp4 |
221.01MB |
| 010. Communications & Network Security - Key Points.en.srt |
46.84KB |
| 010. Communications & Network Security - Key Points.mp4 |
127.54MB |
| 010. Identify, analyze, prioritize BC requirements.en.srt |
49.19KB |
| 010. Identify, analyze, prioritize BC requirements.mp4 |
186.57MB |
| 010. Identity Access Management (IAM) - Key Points.en.srt |
29.47KB |
| 010. Identity Access Management (IAM) - Key Points.mp4 |
90.89MB |
| 010. Spotlight on cryptographic solutions - Asymmetric.en.srt |
37.54KB |
| 010. Spotlight on cryptographic solutions - Asymmetric.mp4 |
151.81MB |
| 010. Understand & participate in change management.en.srt |
34.32KB |
| 010. Understand & participate in change management.mp4 |
153.85MB |
| 011. Define, apply secure coding guidelines, standards.en.srt |
38.59KB |
| 011. Define, apply secure coding guidelines, standards.mp4 |
210.04MB |
| 011. Implement recovery strategies.en.srt |
47.27KB |
| 011. Implement recovery strategies.mp4 |
140.65MB |
| 011. Personnel security policies and procedures.en.srt |
39.47KB |
| 011. Personnel security policies and procedures.mp4 |
177.73MB |
| 011. Spotlight on cryptographic solutions - PKI & certs.en.srt |
45.20KB |
| 011. Spotlight on cryptographic solutions - PKI & certs.mp4 |
173.25MB |
| 012. Implement Disaster Recovery (DR) processes.en.srt |
36.21KB |
| 012. Implement Disaster Recovery (DR) processes.mp4 |
134.52MB |
| 012. Spotlight on cryptographic solutions - hashing.en.srt |
35.87KB |
| 012. Spotlight on cryptographic solutions - hashing.mp4 |
179.95MB |
| 012. Spotlight on Databases.en.srt |
29.87KB |
| 012. Spotlight on Databases.mp4 |
293.75MB |
| 012. Understand, apply risk management concepts.en.srt |
46.95KB |
| 012. Understand, apply risk management concepts.mp4 |
209.62MB |
| 013. Cryptographic solutions - digital signing.en.srt |
32.38KB |
| 013. Cryptographic solutions - digital signing.mp4 |
144.30MB |
| 013. Software Development Security - Key Points.en.srt |
28.90KB |
| 013. Software Development Security - Key Points.mp4 |
108.21MB |
| 013. Spotlight on the Risk Management Framework.en.srt |
33.06KB |
| 013. Spotlight on the Risk Management Framework.mp4 |
95.13MB |
| 013. Test Disaster Recovery Plans (DRP).en.srt |
32.71KB |
| 013. Test Disaster Recovery Plans (DRP).mp4 |
132.10MB |
| 014. Business Continuity (BC) planning & exercises.en.srt |
26.08KB |
| 014. Business Continuity (BC) planning & exercises.mp4 |
98.10MB |
| 014. Threat modeling concepts and methodologies.en.srt |
42.00KB |
| 014. Threat modeling concepts and methodologies.mp4 |
154.32MB |
| 014. Understand methods of cryptanalytic attacks.en.srt |
45.90KB |
| 014. Understand methods of cryptanalytic attacks.mp4 |
155.41MB |
| 015. Apply Supply Chain Risk Management (SCRM) concepts.en.srt |
45.20KB |
| 015. Apply Supply Chain Risk Management (SCRM) concepts.mp4 |
177.80MB |
| 015. Implement and manage physical security.en.srt |
50.81KB |
| 015. Implement and manage physical security.mp4 |
195.10MB |
| 015. Security principles for site and facility design.en.srt |
44.50KB |
| 015. Security principles for site and facility design.mp4 |
241.43MB |
| 016. Address personnel safety and security concerns.en.srt |
37.06KB |
| 016. Address personnel safety and security concerns.mp4 |
210.26MB |
| 016. Design site and facility security controls.en.srt |
50.84KB |
| 016. Design site and facility security controls.mp4 |
305.78MB |
| 016. Security awareness, education, and training program.en.srt |
24.60KB |
| 016. Security awareness, education, and training program.mp4 |
116.98MB |
| 017. Security and Risk Management Key Points.en.srt |
31.40KB |
| 017. Security and Risk Management Key Points.mp4 |
95.81MB |
| 017. Security Operations - Key points.en.srt |
38.71KB |
| 017. Security Operations - Key points.mp4 |
106.02MB |
| 017. Spotlight on fire control.en.srt |
52.84KB |
| 017. Spotlight on fire control.mp4 |
309.29MB |
| 018. Security Architecture & Engineering - Key Points.en.srt |
40.45KB |
| 018. Security Architecture & Engineering - Key Points.mp4 |
102.14MB |