FileMood

Download Certified Information Systems Security Professional - CISSP

Certified Information Systems Security Professional CISSP

Name

Certified Information Systems Security Professional - CISSP

 DOWNLOAD Copy Link

Total Size

18.7 GB

Total Files

206

Last Seen

2024-11-19 00:33

Hash

691314CB69D688412FBDC75A6AEFAC3E6C38C7ED

/Chapter 3 Security Architecture and Engineering/

008. Assess and mitigate vulnerabilities - the rest.mp4

336.7 MB

001. Engineering process using secure design principles.en.srt

23.9 KB

001. Engineering process using secure design principles.mp4

161.4 MB

002. Fundamental concepts of security models.en.srt

24.1 KB

002. Fundamental concepts of security models.mp4

159.0 MB

003. Controls based upon system security requirements.en.srt

42.9 KB

003. Controls based upon system security requirements.mp4

148.0 MB

004. Security capabilities of Information Systems - vocab.en.srt

47.6 KB

004. Security capabilities of Information Systems - vocab.mp4

141.3 MB

005. Security capabilities of Information Systems - CPU.en.srt

45.2 KB

005. Security capabilities of Information Systems - CPU.mp4

232.8 MB

006. Security capabilities of Info Systems - Memory.en.srt

54.1 KB

006. Security capabilities of Info Systems - Memory.mp4

303.0 MB

007. Assess and mitigate vulnerabilities - the basics.en.srt

53.0 KB

007. Assess and mitigate vulnerabilities - the basics.mp4

305.8 MB

008. Assess and mitigate vulnerabilities - the rest.en.srt

55.1 KB

009. Spotlight on cryptographic solutions - Symmetric.en.srt

51.1 KB

009. Spotlight on cryptographic solutions - Symmetric.mp4

214.9 MB

010. Spotlight on cryptographic solutions - Asymmetric.en.srt

38.4 KB

010. Spotlight on cryptographic solutions - Asymmetric.mp4

159.2 MB

011. Spotlight on cryptographic solutions - PKI & certs.en.srt

46.3 KB

011. Spotlight on cryptographic solutions - PKI & certs.mp4

181.7 MB

012. Spotlight on cryptographic solutions - hashing.en.srt

36.7 KB

012. Spotlight on cryptographic solutions - hashing.mp4

188.7 MB

013. Cryptographic solutions - digital signing.en.srt

33.2 KB

013. Cryptographic solutions - digital signing.mp4

151.3 MB

014. Understand methods of cryptanalytic attacks.en.srt

47.0 KB

014. Understand methods of cryptanalytic attacks.mp4

163.0 MB

015. Security principles for site and facility design.en.srt

45.6 KB

015. Security principles for site and facility design.mp4

253.2 MB

016. Design site and facility security controls.en.srt

52.1 KB

016. Design site and facility security controls.mp4

320.6 MB

017. Spotlight on fire control.en.srt

54.1 KB

017. Spotlight on fire control.mp4

324.3 MB

018. Security Architecture & Engineering - Key Points.en.srt

41.4 KB

018. Security Architecture & Engineering - Key Points.mp4

107.1 MB

/Chapter 1 Security and Risk Management/

001. Overview.mp4

27.7 MB

002. Understand adhere, promote professional ethics.en.srt

21.6 KB

002. Understand adhere, promote professional ethics.mp4

75.9 MB

003. Understand and apply security concepts (CIA).en.srt

37.7 KB

003. Understand and apply security concepts (CIA).mp4

199.0 MB

004. Evaluate and apply security governance principles.en.srt

34.9 KB

004. Evaluate and apply security governance principles.mp4

173.9 MB

005. Determine compliance and other requirements.en.srt

31.1 KB

005. Determine compliance and other requirements.mp4

151.3 MB

006. Legal, regulatory issues for information security.en.srt

45.9 KB

006. Legal, regulatory issues for information security.mp4

250.4 MB

007. Spotlight on the GDPR.en.srt

48.0 KB

007. Spotlight on the GDPR.mp4

259.2 MB

008. Understand requirements for investigation types.en.srt

47.7 KB

008. Understand requirements for investigation types.mp4

159.9 MB

009. Security policy, standards, procedures, guidelines.en.srt

30.8 KB

009. Security policy, standards, procedures, guidelines.mp4

171.4 MB

010. Identify, analyze, prioritize BC requirements.en.srt

50.4 KB

010. Identify, analyze, prioritize BC requirements.mp4

195.6 MB

011. Personnel security policies and procedures.en.srt

40.4 KB

011. Personnel security policies and procedures.mp4

186.4 MB

012. Understand, apply risk management concepts.en.srt

48.1 KB

012. Understand, apply risk management concepts.mp4

219.8 MB

013. Spotlight on the Risk Management Framework.en.srt

33.9 KB

013. Spotlight on the Risk Management Framework.mp4

99.8 MB

014. Threat modeling concepts and methodologies.en.srt

43.0 KB

014. Threat modeling concepts and methodologies.mp4

161.8 MB

015. Apply Supply Chain Risk Management (SCRM) concepts.en.srt

46.3 KB

015. Apply Supply Chain Risk Management (SCRM) concepts.mp4

186.4 MB

016. Security awareness, education, and training program.en.srt

25.2 KB

016. Security awareness, education, and training program.mp4

122.7 MB

017. Security and Risk Management Key Points.en.srt

32.1 KB

017. Security and Risk Management Key Points.mp4

100.5 MB

001. Overview.en.srt

6.3 KB

/Chapter 2 Asset Security/

001. Identify and classify information, assets.en.srt

37.2 KB

001. Identify and classify information, assets.mp4

168.7 MB

002. Establish information, asset handling requirements.en.srt

47.6 KB

002. Establish information, asset handling requirements.mp4

231.8 MB

003. Provision resources securely.en.srt

32.2 KB

003. Provision resources securely.mp4

266.6 MB

004. Manage data lifecycle.en.srt

43.7 KB

004. Manage data lifecycle.mp4

158.3 MB

005. Ensure appropriate asset retention.en.srt

39.3 KB

005. Ensure appropriate asset retention.mp4

167.7 MB

006. Data security controls and compliance requirements.en.srt

49.9 KB

006. Data security controls and compliance requirements.mp4

158.2 MB

007. Assets Security - Key Points.en.srt

40.5 KB

007. Assets Security - Key Points.mp4

116.4 MB

/Chapter 4 Communication and Network Security/

001. Spotlight on the OSI Model.en.srt

44.2 KB

001. Spotlight on the OSI Model.mp4

167.4 MB

002. Spotlight on Internet Protocol (IP) networking.en.srt

49.5 KB

002. Spotlight on Internet Protocol (IP) networking.mp4

162.4 MB

003. Spotlight on IPsec.en.srt

50.0 KB

003. Spotlight on IPsec.mp4

204.4 MB

004. Spotlight on Secure Protocols.en.srt

35.8 KB

004. Spotlight on Secure Protocols.mp4

128.9 MB

005. Implications of converged & multilayer protocols.en.srt

23.5 KB

005. Implications of converged & multilayer protocols.mp4

107.8 MB

006. Spotlight on Micro-segmentation.en.srt

49.8 KB

006. Spotlight on Micro-segmentation.mp4

274.0 MB

007. Wireless, Cellular & Content Distribution Networks.en.srt

51.2 KB

007. Wireless, Cellular & Content Distribution Networks.mp4

167.4 MB

008. Secure Network Components.en.srt

39.5 KB

008. Secure Network Components.mp4

175.5 MB

009. Implement Secure Communication Channels.en.srt

49.6 KB

009. Implement Secure Communication Channels.mp4

294.8 MB

010. Communications & Network Security - Key Points.en.srt

48.0 KB

010. Communications & Network Security - Key Points.mp4

133.7 MB

/Chapter 5 Identity and Access Management (IAM)/

001. Control physical and logical access to assets.en.srt

46.7 KB

001. Control physical and logical access to assets.mp4

216.3 MB

002. Manage identification and authentication.en.srt

50.5 KB

002. Manage identification and authentication.mp4

141.6 MB

003. Federated identity with a third-party service.en.srt

48.2 KB

003. Federated identity with a third-party service.mp4

213.0 MB

004. Implement, manage auth mechanisms - Vocab.en.srt

45.7 KB

004. Implement, manage auth mechanisms - Vocab.mp4

241.8 MB

005. Implement, manage auth mechanisms - Models.en.srt

50.0 KB

005. Implement, manage auth mechanisms - Models.mp4

321.2 MB

006. Manage the identity, access provisioning lifecycle.en.srt

44.3 KB

006. Manage the identity, access provisioning lifecycle.mp4

164.8 MB

007. Implement authentication systems.en.srt

48.3 KB

007. Implement authentication systems.mp4

166.8 MB

008. Spotlight on Kerberos.en.srt

54.7 KB

008. Spotlight on Kerberos.mp4

230.1 MB

009. Spotlight on Federated Identity Management (FIM).en.srt

36.1 KB

009. Spotlight on Federated Identity Management (FIM).mp4

272.0 MB

010. Identity Access Management (IAM) - Key Points.en.srt

30.2 KB

010. Identity Access Management (IAM) - Key Points.mp4

95.3 MB

/Chapter 6 Security Assessment and Testing/

001. Assessment, test, & security audit strategies.en.srt

47.9 KB

001. Assessment, test, & security audit strategies.mp4

166.0 MB

002. Spotlight on System and Org Controls Reports (SOC).en.srt

38.1 KB

002. Spotlight on System and Org Controls Reports (SOC).mp4

150.1 MB

003. Conduct security control testing - the basics.en.srt

51.8 KB

003. Conduct security control testing - the basics.mp4

197.0 MB

004. Conduct security control testing - the rest.en.srt

56.0 KB

004. Conduct security control testing - the rest.mp4

189.7 MB

005. Collect security process data.en.srt

47.2 KB

005. Collect security process data.mp4

174.7 MB

006. Analyze test output and generate reports.en.srt

36.3 KB

006. Analyze test output and generate reports.mp4

152.4 MB

007. Security Assessment and Testing - Key Points.en.srt

42.3 KB

007. Security Assessment and Testing - Key Points.mp4

118.7 MB

/Chapter 7 Security Operations/

001. Understand and comply with investigations.en.srt

51.1 KB

001. Understand and comply with investigations.mp4

206.6 MB

002. Conduct logging & monitoring activities.en.srt

48.9 KB

002. Conduct logging & monitoring activities.mp4

258.7 MB

003. Conduct logging & monitoring activities - threat.en.srt

43.9 KB

003. Conduct logging & monitoring activities - threat.mp4

280.7 MB

004. Perform Configuration Management (CM).en.srt

43.3 KB

004. Perform Configuration Management (CM).mp4

288.6 MB

005. Apply foundational security operations concepts.en.srt

18.1 KB

005. Apply foundational security operations concepts.mp4

57.9 MB

006. Apply resource protection.en.srt

48.5 KB

006. Apply resource protection.mp4

289.7 MB

007. Conduct incident management.en.srt

33.9 KB

007. Conduct incident management.mp4

144.0 MB

008. Detective & preventative measures.en.srt

52.0 KB

008. Detective & preventative measures.mp4

188.0 MB

009. Patch & vulnerability management.en.srt

35.4 KB

009. Patch & vulnerability management.mp4

167.7 MB

010. Understand & participate in change management.en.srt

35.1 KB

010. Understand & participate in change management.mp4

161.3 MB

011. Implement recovery strategies.en.srt

48.4 KB

011. Implement recovery strategies.mp4

147.5 MB

012. Implement Disaster Recovery (DR) processes.en.srt

37.1 KB

012. Implement Disaster Recovery (DR) processes.mp4

141.1 MB

013. Test Disaster Recovery Plans (DRP).en.srt

33.5 KB

013. Test Disaster Recovery Plans (DRP).mp4

138.5 MB

014. Business Continuity (BC) planning & exercises.en.srt

26.7 KB

014. Business Continuity (BC) planning & exercises.mp4

102.9 MB

015. Implement and manage physical security.en.srt

52.0 KB

015. Implement and manage physical security.mp4

204.6 MB

016. Address personnel safety and security concerns.en.srt

37.9 KB

016. Address personnel safety and security concerns.mp4

220.5 MB

017. Security Operations - Key points.en.srt

39.6 KB

017. Security Operations - Key points.mp4

111.2 MB

/Chapter 8 Software Development Security/

001. Spotlight on the Software Development Life Cycle.en.srt

51.2 KB

001. Spotlight on the Software Development Life Cycle.mp4

199.7 MB

002. Certs & Accreditation Verification & Validation.en.srt

31.2 KB

002. Certs & Accreditation Verification & Validation.mp4

119.2 MB

003. Security in the SDLC - Methodologies.en.srt

51.7 KB

003. Security in the SDLC - Methodologies.mp4

206.8 MB

004. Security in the SDLC - Maturity Models.en.srt

48.3 KB

004. Security in the SDLC - Maturity Models.mp4

184.5 MB

005. Security in the SDLC - odds & ends.en.srt

39.0 KB

005. Security in the SDLC - odds & ends.mp4

200.9 MB

006. Apply controls in development ecosystems - basics.en.srt

52.5 KB

006. Apply controls in development ecosystems - basics.mp4

197.3 MB

007. Apply controls in development ecosystems - rest.en.srt

42.2 KB

007. Apply controls in development ecosystems - rest.mp4

169.5 MB

008. Spotlight on the OWASP TOP 10.en.srt

46.2 KB

008. Spotlight on the OWASP TOP 10.mp4

172.3 MB

009. Assess the effectiveness of software security.en.srt

52.5 KB

009. Assess the effectiveness of software security.mp4

204.8 MB

010. Assess security impact of acquired software.en.srt

14.0 KB

010. Assess security impact of acquired software.mp4

231.7 MB

011. Define, apply secure coding guidelines, standards.en.srt

39.5 KB

011. Define, apply secure coding guidelines, standards.mp4

220.2 MB

012. Spotlight on Databases.en.srt

30.6 KB

012. Spotlight on Databases.mp4

308.0 MB

013. Software Development Security - Key Points.en.srt

29.6 KB

013. Software Development Security - Key Points.mp4

113.5 MB

/Chapter 9 The CISSP Toolbox/

001. What is the CISSP Toolbox.en.srt

2.2 KB

001. What is the CISSP Toolbox.mp4

14.6 MB

002. Who are you.en.srt

8.6 KB

002. Who are you.mp4

27.4 MB

003. What does your study plan look like.en.srt

10.7 KB

003. What does your study plan look like.mp4

35.6 MB

004. What is your timeline.en.mp4

44.1 MB

004. What is your timeline.en.srt

13.7 KB

 

Total files 206


Copyright © 2024 FileMood.com