FileMood

Download CISSP, 3rd Edition

CISSP 3rd Edition

Name

CISSP, 3rd Edition

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

6.6 GB

Total Files

452

Hash

2C6F98097B9F4DD2576234372D08CF347D9C5E32

/.../Lesson 30 Secure Network Components/

004. 30.3 Security Zones and Firewalls.mp4

67.1 MB

001. Learning objectives.en.srt

0.8 KB

001. Learning objectives.mp4

3.8 MB

002. 30.1 Wired Transmission.en.srt

15.8 KB

002. 30.1 Wired Transmission.mp4

38.0 MB

003. 30.2 Wireless (Wi-Fi) Transmission.en.srt

16.1 KB

003. 30.2 Wireless (Wi-Fi) Transmission.mp4

42.1 MB

004. 30.3 Security Zones and Firewalls.en.srt

25.7 KB

005. 30.4 Network Access Control.en.srt

20.2 KB

005. 30.4 Network Access Control.mp4

47.3 MB

006. 30.5 Endpoint Security.en.srt

13.8 KB

006. 30.5 Endpoint Security.mp4

33.1 MB

007. Lesson 30 Assessment.en.srt

25.5 KB

007. Lesson 30 Assessment.mp4

54.1 MB

/Introduction/

001. CISSP Introduction.mp4

41.8 MB

001. CISSP Introduction.en.srt

10.8 KB

/Module 1 Security and Risk Management Domain/

001. Module introduction.en.srt

2.2 KB

001. Module introduction.mp4

9.7 MB

/.../Lesson 1 Understand, Adhere to, and Promote Professional Ethics/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

2.1 MB

002. 1.1 Organizational and Professional Ethics.en.srt

19.1 KB

002. 1.1 Organizational and Professional Ethics.mp4

48.5 MB

/.../Lesson 2 Understand and Apply Security Concepts/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

2.1 MB

002. 2.1 Information Security Fundamentals.en.srt

17.4 KB

002. 2.1 Information Security Fundamentals.mp4

40.0 MB

/.../Lesson 3 Evaluate and Apply Security Governance Principles/

001. Learning objectives.en.srt

0.6 KB

001. Learning objectives.mp4

2.6 MB

002. 3.1 Strategic Alignment.en.srt

16.0 KB

002. 3.1 Strategic Alignment.mp4

38.5 MB

003. 3.2 Organizational Roles and Responsibilities.en.srt

22.9 KB

003. 3.2 Organizational Roles and Responsibilities.mp4

53.5 MB

004. 3.3 Security Control Frameworks.en.srt

19.0 KB

004. 3.3 Security Control Frameworks.mp4

46.1 MB

/.../Lesson 4 Determine Compliance and Other Requirements/

001. Learning objectives.en.srt

0.7 KB

001. Learning objectives.mp4

3.0 MB

002. 4.1 Regulatory and Contractual Obligations.en.srt

17.3 KB

002. 4.1 Regulatory and Contractual Obligations.mp4

43.5 MB

003. 4.2 Privacy and Data Protection.en.srt

19.5 KB

003. 4.2 Privacy and Data Protection.mp4

48.9 MB

004. Lesson 1-4 Assessment.en.srt

20.5 KB

004. Lesson 1-4 Assessment.mp4

37.8 MB

/.../Lesson 5 Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context/

001. Learning objectives.en.srt

0.6 KB

001. Learning objectives.mp4

2.6 MB

002. 5.1 Cybercrime and Data Breaches.en.srt

17.6 KB

002. 5.1 Cybercrime and Data Breaches.mp4

37.1 MB

003. 5.2 Data Flow.en.srt

17.3 KB

003. 5.2 Data Flow.mp4

44.5 MB

/.../Lesson 6 Understand Requirements for Investigation Types/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

2.1 MB

002. 6.1 Investigation Objectives and Requirements.en.srt

16.1 KB

002. 6.1 Investigation Objectives and Requirements.mp4

39.3 MB

/.../Lesson 7 Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

2.4 MB

002. 7.1 Governance Documents.en.srt

17.0 KB

002. 7.1 Governance Documents.mp4

38.7 MB

/.../Lesson 8 Identify, Analyze, and Prioritize Business Continuity Requirements/

001. Learning objectives.en.srt

0.6 KB

001. Learning objectives.mp4

2.5 MB

002. 8.1 Business Continuity Planning.en.srt

15.2 KB

002. 8.1 Business Continuity Planning.mp4

33.6 MB

003. 8.2 Business Impact Analysis.en.srt

16.2 KB

003. 8.2 Business Impact Analysis.mp4

41.8 MB

/.../Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/

001. Learning objectives.en.srt

0.6 KB

001. Learning objectives.mp4

3.1 MB

002. 9.1 Personnel Policies and Agreements.en.srt

15.5 KB

002. 9.1 Personnel Policies and Agreements.mp4

35.5 MB

003. 9.2 Personnel Security Practices.en.srt

18.5 KB

003. 9.2 Personnel Security Practices.mp4

44.0 MB

004. Lesson 5-9 Assessment.en.srt

20.5 KB

004. Lesson 5-9 Assessment.mp4

39.8 MB

/.../Lesson 10 Understand and Apply Risk Management Concepts/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

2.8 MB

002. 10.1 Risk Management Concepts.en.srt

18.2 KB

002. 10.1 Risk Management Concepts.mp4

42.0 MB

003. 10.2 Risk Management Frameworks.en.srt

18.1 KB

003. 10.2 Risk Management Frameworks.mp4

43.4 MB

004. 10.3 Risk Assessment.en.srt

22.1 KB

004. 10.3 Risk Assessment.mp4

55.5 MB

005. 10.4 Controls and Countermeasures.en.srt

18.9 KB

005. 10.4 Controls and Countermeasures.mp4

42.5 MB

/.../Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/

001. Learning objectives.en.srt

0.6 KB

001. Learning objectives.mp4

2.9 MB

002. 11.1 Threat Actors and Attributes.en.srt

22.4 KB

002. 11.1 Threat Actors and Attributes.mp4

55.6 MB

003. 11.2 Threat Modeling.en.srt

15.1 KB

003. 11.2 Threat Modeling.mp4

36.2 MB

004. 11.3 Attack Vectors.en.srt

18.4 KB

004. 11.3 Attack Vectors.mp4

47.9 MB

005. 11.4 Threat Intelligence.en.srt

19.4 KB

005. 11.4 Threat Intelligence.mp4

43.7 MB

/.../Lesson 12 Apply Supply Chain Risk Management Concepts/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

1.9 MB

002. 12.1 Supply Chain Risk Management.en.srt

15.5 KB

002. 12.1 Supply Chain Risk Management.mp4

36.6 MB

/.../Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/

001. Learning objectives.en.srt

0.8 KB

001. Learning objectives.mp4

3.5 MB

002. 13.1 SETA Principles and Practices.en.srt

22.5 KB

002. 13.1 SETA Principles and Practices.mp4

51.5 MB

003. 13.2 Social Engineering.en.srt

16.2 KB

003. 13.2 Social Engineering.mp4

39.1 MB

004. Lesson 10-13 Assessment.en.srt

22.8 KB

004. Lesson 10-13 Assessment.mp4

47.9 MB

/Module 2 Asset Security/

001. Module introduction.en.srt

1.4 KB

001. Module introduction.mp4

6.3 MB

/.../Lesson 14 Identify and Classify Information and Assets/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

2.0 MB

002. 14.1 Asset Classification.en.srt

18.1 KB

002. 14.1 Asset Classification.mp4

41.1 MB

/.../Lesson 15 Establish Information and Asset Handling Requirements/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

2.0 MB

002. 15.1 Data and Asset Handling.en.srt

13.5 KB

002. 15.1 Data and Asset Handling.mp4

33.6 MB

/.../Lesson 16 Provision Resources Securely/

001. Learning objectives.en.srt

0.3 KB

001. Learning objectives.mp4

1.8 MB

002. 16.1 Asset Management.en.srt

17.5 KB

002. 16.1 Asset Management.mp4

42.4 MB

/.../Lesson 17 Manage Data Lifecycle/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

2.2 MB

002. 17.1 Data Collection and Retention.en.srt

20.1 KB

002. 17.1 Data Collection and Retention.mp4

48.2 MB

003. 17.2 Deletion and Destruction.en.srt

16.6 KB

003. 17.2 Deletion and Destruction.mp4

43.3 MB

/.../Lesson 18 Ensure Appropriate Asset Retention/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

2.0 MB

002. 18.1 Asset Lifecycle - EOL.en.srt

15.2 KB

002. 18.1 Asset Lifecycle - EOL.mp4

38.1 MB

/.../Lesson 19 Determine Data Security Controls and Compliance Requirements/

001. Learning objectives.en.srt

0.7 KB

001. Learning objectives.mp4

3.3 MB

002. 19.1 Control Baselines, Tailoring, and Scoping.en.srt

12.8 KB

002. 19.1 Control Baselines, Tailoring, and Scoping.mp4

30.3 MB

003. 19.2 Data Protection Methods.en.srt

15.4 KB

003. 19.2 Data Protection Methods.mp4

36.5 MB

004. Lesson 14-19 Assessment.en.srt

25.7 KB

004. Lesson 14-19 Assessment.mp4

47.9 MB

/Module 3 Security Architecture and Engineering/

001. Module introduction.en.srt

1.9 KB

001. Module introduction.mp4

8.3 MB

/.../Lesson 20 Research, Implement, and Manage Engineering Processes Using Secure Design Principles/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

2.2 MB

002. 20.1 Secure Design Principles.en.srt

18.6 KB

002. 20.1 Secure Design Principles.mp4

46.9 MB

/.../Lesson 21 Understand the Fundamental Concepts of Security Models/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

2.0 MB

002. 21.1 Information Security Models.en.srt

19.1 KB

002. 21.1 Information Security Models.mp4

45.8 MB

/.../Lesson 22 Select Controls Based Upon System Security Requirements/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

2.1 MB

002. 22.1 Security Evaluation Criteria.en.srt

12.4 KB

002. 22.1 Security Evaluation Criteria.mp4

31.8 MB

/.../Lesson 23 Understand Security Capabilities of Information Systems/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

2.8 MB

002. 23.1 Information Systems Security Capabilities.en.srt

21.2 KB

002. 23.1 Information Systems Security Capabilities.mp4

49.3 MB

003. Lesson 20-23 Assessment.en.srt

19.5 KB

003. Lesson 20-23 Assessment.mp4

37.8 MB

/.../Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/

001. Learning objectives.en.srt

1.1 KB

001. Learning objectives.mp4

5.5 MB

002. 24.1 Traditional Systems Architectures.en.srt

15.7 KB

002. 24.1 Traditional Systems Architectures.mp4

36.3 MB

003. 24.2 Database Systems.en.srt

14.8 KB

003. 24.2 Database Systems.mp4

38.0 MB

004. 24.3 Cloud-based Systems.en.srt

24.8 KB

004. 24.3 Cloud-based Systems.mp4

63.2 MB

005. 24.4 Embedded Systems.en.srt

15.9 KB

005. 24.4 Embedded Systems.mp4

38.4 MB

006. 24.5 IoT and IIoT.en.srt

14.3 KB

006. 24.5 IoT and IIoT.mp4

34.4 MB

007. 24.6 Virtualized Systems.en.srt

17.5 KB

007. 24.6 Virtualized Systems.mp4

43.1 MB

008. 24.7 Automation and Solution Elements.en.srt

17.1 KB

008. 24.7 Automation and Solution Elements.mp4

45.2 MB

009. Lesson 24 Assessment.en.srt

23.9 KB

009. Lesson 24 Assessment.mp4

48.8 MB

/.../Lesson 25 Select and Determine Cryptographic Solutions/

001. Learning objectives.en.srt

1.0 KB

001. Learning objectives.mp4

4.8 MB

002. 25.1 Ciphers and Keys.en.srt

19.0 KB

002. 25.1 Ciphers and Keys.mp4

48.6 MB

003. 25.2 Symmetric Encryption.en.srt

19.5 KB

003. 25.2 Symmetric Encryption.mp4

47.2 MB

004. 25.3 Asymmetric Encryption.en.srt

21.2 KB

004. 25.3 Asymmetric Encryption.mp4

44.9 MB

005. 25.4 Hashing and Digital Signatures.en.srt

21.4 KB

005. 25.4 Hashing and Digital Signatures.mp4

47.0 MB

006. 25.5 PKI and Digital Certificates.en.srt

20.9 KB

006. 25.5 PKI and Digital Certificates.mp4

46.0 MB

007. 25.6 Emerging Cryptography.en.srt

12.9 KB

007. 25.6 Emerging Cryptography.mp4

29.4 MB

/.../Lesson 26 Understand Methods of Cryptanalytic Attacks/

001. Learning objectives.en.srt

0.7 KB

001. Learning objectives.mp4

3.7 MB

002. 26.1 Cryptographic Attacks.en.srt

16.7 KB

002. 26.1 Cryptographic Attacks.mp4

42.6 MB

003. 26.2 Hash and Kerberos Post-Exploitation Attacks.en.srt

16.5 KB

003. 26.2 Hash and Kerberos Post-Exploitation Attacks.mp4

40.4 MB

004. 26.3 Ransomware.en.srt

15.7 KB

004. 26.3 Ransomware.mp4

40.0 MB

005. Lesson 25-26 Assessment.en.srt

22.4 KB

005. Lesson 25-26 Assessment.mp4

42.3 MB

/.../Lesson 27 Apply Security Principles to Site and Facility Design/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

2.1 MB

002. 27.1 Physical Security Principles.en.srt

13.3 KB

002. 27.1 Physical Security Principles.mp4

29.3 MB

/.../Lesson 28 Design Site and Facility Security Controls/

001. Learning objectives.en.srt

0.7 KB

001. Learning objectives.mp4

3.1 MB

002. 28.1 Site and Building Security.en.srt

17.5 KB

002. 28.1 Site and Building Security.mp4

46.5 MB

003. 28.2 Environmental Impact.en.srt

16.9 KB

003. 28.2 Environmental Impact.mp4

45.8 MB

004. Lesson 27-28 Assessment.en.srt

21.9 KB

004. Lesson 27-28 Assessment.mp4

39.5 MB

/Module 4 Communication and Network Security/

001. Module introduction.en.srt

2.0 KB

001. Module introduction.mp4

7.9 MB

/.../Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/

001. Learning objectives.en.srt

0.9 KB

001. Learning objectives.mp4

4.7 MB

002. 29.1 Network Models.en.srt

25.5 KB

002. 29.1 Network Models.mp4

58.9 MB

003. 29.2 IP Networking.en.srt

19.5 KB

003. 29.2 IP Networking.mp4

48.7 MB

004. 29.3 Non-IP Networking.en.srt

11.5 KB

004. 29.3 Non-IP Networking.mp4

27.9 MB

005. 29.4 Secure Communications Protocols.en.srt

15.0 KB

005. 29.4 Secure Communications Protocols.mp4

39.2 MB

006. 29.5 Secure Network Protocols.en.srt

15.0 KB

006. 29.5 Secure Network Protocols.mp4

35.8 MB

007. 29.6 Micro-segmentation.en.srt

15.7 KB

007. 29.6 Micro-segmentation.mp4

40.9 MB

008. 29.7 Wireless Architecture.en.srt

19.6 KB

008. 29.7 Wireless Architecture.mp4

52.3 MB

009. Lesson 29 Assessment.en.srt

18.3 KB

009. Lesson 29 Assessment.mp4

41.0 MB

/.../Lesson 31 Implement Secure Communication Channels According to Design/

001. Learning objectives.en.srt

0.8 KB

001. Learning objectives.mp4

4.0 MB

002. 31.1 Voice-over-IP (VoIP).en.srt

15.2 KB

002. 31.1 Voice-over-IP (VoIP).mp4

36.2 MB

003. 31.2 Multimedia Collaboration.en.srt

17.3 KB

003. 31.2 Multimedia Collaboration.mp4

41.7 MB

004. 31.3 Remote Access.en.srt

16.0 KB

004. 31.3 Remote Access.mp4

40.5 MB

005. 31.4 Virtual Private Cloud.en.srt

13.8 KB

005. 31.4 Virtual Private Cloud.mp4

32.0 MB

006. Lesson 31 Assessment.en.srt

17.9 KB

006. Lesson 31 Assessment.mp4

36.5 MB

/Module 5 Identity and Access Management (IAM)/

001. Module introduction.en.srt

1.5 KB

001. Module introduction.mp4

6.6 MB

/.../Lesson 32 Control Physical and Logical Access to Assets/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

2.3 MB

002. 32.1 Access Control Fundamentals.en.srt

13.9 KB

002. 32.1 Access Control Fundamentals.mp4

34.0 MB

/.../Lesson 33 Manage Identification and Authentication of People, Devices, and Services/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

3.1 MB

002. 33.1 Identity Management (IdM).en.srt

15.2 KB

002. 33.1 Identity Management (IdM).mp4

38.4 MB

003. 33.2 Authentication Factors.en.srt

18.6 KB

003. 33.2 Authentication Factors.mp4

42.5 MB

004. 33.3 Biometric Authentication.en.srt

13.6 KB

004. 33.3 Biometric Authentication.mp4

33.9 MB

/.../Lesson 34 Federated Identity with a Third-party Service/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

2.0 MB

002. 34.1 Federated Identity Management.en.srt

15.8 KB

002. 34.1 Federated Identity Management.mp4

35.9 MB

/.../Lesson 35 Implement and Manage Authorization Mechanisms/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

2.5 MB

002. 35.1 Authorization and Access Controls.en.srt

17.9 KB

002. 35.1 Authorization and Access Controls.mp4

44.2 MB

003. Lesson 32-35 Assessment.en.srt

23.8 KB

003. Lesson 32-35 Assessment.mp4

49.2 MB

/.../Lesson 36 Manage the Identity and Access Provisioning Lifecycle/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

2.4 MB

002. 36.1 Identity and Access Management.en.srt

17.5 KB

002. 36.1 Identity and Access Management.mp4

39.7 MB

003. 36.2 Privileged Accounts.en.srt

16.0 KB

003. 36.2 Privileged Accounts.mp4

42.1 MB

/.../Lesson 37 Implement Authentication Systems/

001. Learning objectives.en.srt

0.7 KB

001. Learning objectives.mp4

3.0 MB

002. 37.1 Authentication Protocols.en.srt

21.5 KB

002. 37.1 Authentication Protocols.mp4

47.9 MB

003. 37.2 FIDO and WebAuthn.en.srt

11.9 KB

003. 37.2 FIDO and WebAuthn.mp4

26.2 MB

004. Lesson 36-37 Assessment.en.srt

18.6 KB

004. Lesson 36-37 Assessment.mp4

36.2 MB

/Module 6 Security Assessment and Testing/

001. Module introduction.en.srt

1.6 KB

001. Module introduction.mp4

6.2 MB

/.../Lesson 38 Design and Validate Assessment, Test, and Audit Strategies/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

2.3 MB

002. 38.1 Security Assessment Overview.en.srt

13.9 KB

002. 38.1 Security Assessment Overview.mp4

34.2 MB

003. 38.2 Planning Engagements.en.srt

19.0 KB

003. 38.2 Planning Engagements.mp4

41.1 MB

/.../Lesson 39 Conduct Security Controls Testing/

001. Learning objectives.en.srt

0.6 KB

001. Learning objectives.mp4

2.9 MB

002. 39.1 Infrastructure Testing.en.srt

17.5 KB

002. 39.1 Infrastructure Testing.mp4

43.0 MB

003. 39.2 Penetration Testing.en.srt

17.5 KB

003. 39.2 Penetration Testing.mp4

41.4 MB

004. 39.3 Code Assessment.en.srt

14.5 KB

004. 39.3 Code Assessment.mp4

38.4 MB

005. Lesson 38-39 Assessment.en.srt

22.1 KB

005. Lesson 38-39 Assessment.mp4

42.3 MB

/.../Lesson 40 Collect Security Process Data/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

2.4 MB

002. 40.1 Management Metrics.en.srt

15.6 KB

002. 40.1 Management Metrics.mp4

35.0 MB

003. 40.2 SETA Measures and Metrics.en.srt

16.7 KB

003. 40.2 SETA Measures and Metrics.mp4

34.7 MB

004. 40.3 Continuous Monitoring.en.srt

14.5 KB

004. 40.3 Continuous Monitoring.mp4

36.0 MB

/.../Lesson 41 Analyze Test Output and Generate Report/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

2.0 MB

002. 41.1 Reporting and Response.en.srt

19.7 KB

002. 41.1 Reporting and Response.mp4

45.3 MB

/.../Lesson 42 Conduct or Facilitate Security Audits/

001. Learning objectives.en.srt

0.6 KB

001. Learning objectives.mp4

2.5 MB

002. 42.1 Security Audits.en.srt

21.5 KB

002. 42.1 Security Audits.mp4

49.1 MB

003. Lesson 40-42 Assessment.en.srt

23.6 KB

003. Lesson 40-42 Assessment.mp4

52.4 MB

/Module 7 Security Operations/

001. Module introduction.en.srt

2.2 KB

001. Module introduction.mp4

9.4 MB

/.../Lesson 43 Understand and Comply with Investigations/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

2.1 MB

002. 43.1 Evidence Handling.en.srt

24.2 KB

002. 43.1 Evidence Handling.mp4

54.0 MB

003. 43.2 Digital Forensics.en.srt

20.0 KB

003. 43.2 Digital Forensics.mp4

49.5 MB

/.../Lesson 44 Conduct Logging and Monitoring Activities/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

2.3 MB

002. 44.1 Logging and Analysis.en.srt

19.7 KB

002. 44.1 Logging and Analysis.mp4

46.3 MB

003. 44.2 Detection and Response Tools.en.srt

20.4 KB

003. 44.2 Detection and Response Tools.mp4

47.9 MB

/.../Lesson 45 Perform Configuration Management/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

2.1 MB

002. 45.1 Configuration Management.en.srt

13.2 KB

002. 45.1 Configuration Management.mp4

28.6 MB

003. 45.2 Automated Provisioning.en.srt

11.1 KB

003. 45.2 Automated Provisioning.mp4

26.9 MB

/.../Lesson 46 Apply Foundational Security Operations Concepts/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

1.9 MB

002. 46.1 Security Operations.en.srt

16.8 KB

002. 46.1 Security Operations.mp4

40.8 MB

/.../Lesson 47 Apply Resource Protection/

001. Learning objectives.en.srt

0.6 KB

001. Learning objectives.mp4

2.7 MB

002. 47.1 Media Management and Protection.en.srt

17.8 KB

002. 47.1 Media Management and Protection.mp4

42.9 MB

003. 47.2 Mobile Device Management.en.srt

18.2 KB

003. 47.2 Mobile Device Management.mp4

45.0 MB

004. Lesson 43-47 Assessment.en.srt

20.8 KB

004. Lesson 43-47 Assessment.mp4

42.6 MB

/.../Lesson 48 Conduct Incident Management/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

2.1 MB

002. 48.1 Incident Management Planning.en.srt

17.7 KB

002. 48.1 Incident Management Planning.mp4

41.6 MB

003. 48.2 Incident Response and Handling.en.srt

19.2 KB

003. 48.2 Incident Response and Handling.mp4

46.0 MB

/.../Lesson 49 Operate and Maintain Detective and Preventative Measures/

001. Learning objectives.en.srt

0.6 KB

001. Learning objectives.mp4

3.3 MB

002. 49.1 Detective and Preventative Controls.en.srt

12.2 KB

002. 49.1 Detective and Preventative Controls.mp4

28.6 MB

003. 49.2 Anti-Malware Tools and Techniques.en.srt

19.0 KB

003. 49.2 Anti-Malware Tools and Techniques.mp4

49.0 MB

004. 49.3 Adversarial Artificial Intelligence.en.srt

13.4 KB

004. 49.3 Adversarial Artificial Intelligence.mp4

34.0 MB

005. 49.4 Deception and Disruption.en.srt

14.4 KB

005. 49.4 Deception and Disruption.mp4

32.4 MB

/.../Lesson 50 Implement and Support Patch and Vulnerability Management/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

2.0 MB

002. 50.1 Vulnerability and Patch Management.en.srt

21.8 KB

002. 50.1 Vulnerability and Patch Management.mp4

46.4 MB

/.../Lesson 51 Understand and Participate in Change Management Process/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

2.3 MB

002. 51.1 Change Management.en.srt

14.4 KB

002. 51.1 Change Management.mp4

32.0 MB

003. Lesson 48-51 Assessment.en.srt

24.7 KB

003. Lesson 48-51 Assessment.mp4

50.4 MB

/.../Lesson 52 Implement Recovery Strategies/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

2.0 MB

002. 52.1 Backup and Recovery.en.srt

18.7 KB

002. 52.1 Backup and Recovery.mp4

41.6 MB

003. 52.2 Resiliency.en.srt

24.1 KB

003. 52.2 Resiliency.mp4

52.0 MB

/.../Lesson 53 Implement Disaster Recovery Processes/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

1.8 MB

002. 53.1 Disaster Response and Recovery.en.srt

18.2 KB

002. 53.1 Disaster Response and Recovery.mp4

41.5 MB

/.../Lesson 54 Test Disaster Recovery Plans/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

1.9 MB

002. 54.1 DRP Training and Testing.en.srt

20.2 KB

002. 54.1 DRP Training and Testing.mp4

47.2 MB

/.../Lesson 55 Participate in Business Continuity (BC) Planning and Exercises/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

2.1 MB

002. 55.1 Business Continuity Integration.en.srt

16.4 KB

002. 55.1 Business Continuity Integration.mp4

42.3 MB

/.../Lesson 56 Implement and Manage Physical Security/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

2.0 MB

002. 56.1 Perimeter and Internal Security Controls.en.srt

20.7 KB

002. 56.1 Perimeter and Internal Security Controls.mp4

51.2 MB

/.../Lesson 57 Address Personnel Safety and Security Concerns/

001. Learning objectives.en.srt

0.6 KB

001. Learning objectives.mp4

2.7 MB

002. 57.1 Workplace Safety.en.srt

17.0 KB

002. 57.1 Workplace Safety.mp4

41.6 MB

003. Lesson 52-57 Assessment.en.srt

22.2 KB

003. Lesson 52-57 Assessment.mp4

42.1 MB

/Module 8 Software Development Security/

001. Module introduction.en.srt

2.0 KB

001. Module introduction.mp4

7.8 MB

/.../Lesson 58 Understand and Integrate Security in the Software Development Lifecycle/

001. Learning objectives.en.srt

0.6 KB

001. Learning objectives.mp4

2.5 MB

002. 58.1 Software Development Lifecycle.en.srt

19.3 KB

002. 58.1 Software Development Lifecycle.mp4

47.4 MB

003. 58.2 Security Collaboration.en.srt

13.7 KB

003. 58.2 Security Collaboration.mp4

31.3 MB

/.../Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/

001. Learning objectives.en.srt

0.7 KB

001. Learning objectives.mp4

3.0 MB

002. 59.1 Code, Languages, Libraries, and Tools.en.srt

15.6 KB

002. 59.1 Code, Languages, Libraries, and Tools.mp4

38.2 MB

003. 59.2 Secure Staging.en.srt

26.4 KB

003. 59.2 Secure Staging.mp4

63.0 MB

004. Lesson 58-59 Assessment.en.srt

18.5 KB

004. Lesson 58-59 Assessment.mp4

33.9 MB

/.../Lesson 60 Assess the Effectiveness of Software Security/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

1.9 MB

002. 60.1 Software Security Assessment.en.srt

13.7 KB

002. 60.1 Software Security Assessment.mp4

31.2 MB

/.../Lesson 61 Assess the Security Impact of Acquired Software/

001. Learning objectives.en.srt

0.4 KB

001. Learning objectives.mp4

2.0 MB

002. 61.1 Software Procurement and Acquisition.en.srt

18.1 KB

002. 61.1 Software Procurement and Acquisition.mp4

38.9 MB

/.../Lesson 62 Define and Apply Secure Coding Guidelines and Standards/

001. Learning objectives.en.srt

0.8 KB

001. Learning objectives.mp4

3.7 MB

002. 62.1 Source Code Flaws.en.srt

14.6 KB

002. 62.1 Source Code Flaws.mp4

35.4 MB

003. 62.2 Input and Output Validation.en.srt

26.0 KB

003. 62.2 Input and Output Validation.mp4

60.0 MB

004. 62.3 Secure Coding Practices.en.srt

16.4 KB

004. 62.3 Secure Coding Practices.mp4

37.9 MB

005. Lesson 60-62 Assessment.en.srt

20.6 KB

005. Lesson 60-62 Assessment.mp4

41.7 MB

/Module 9 Attaining and Maintaining Your CISSP/

001. Module introduction.en.srt

0.5 KB

001. Module introduction.mp4

2.5 MB

/.../Lesson 63 Preparing for Your Examination/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

2.4 MB

002. 63.1 Understanding the Exam Structure.en.srt

9.6 KB

002. 63.1 Understanding the Exam Structure.mp4

27.1 MB

003. 63.2 Test Taking Strategies.en.srt

13.2 KB

003. 63.2 Test Taking Strategies.mp4

32.6 MB

004. 63.3 Preparing for Test Day.en.srt

12.0 KB

004. 63.3 Preparing for Test Day.mp4

30.4 MB

/.../Lesson 64 The Certification Process/

001. Learning objectives.en.srt

0.5 KB

001. Learning objectives.mp4

2.3 MB

002. 64.1 What to Expect at the Testing Center.en.srt

9.5 KB

002. 64.1 What to Expect at the Testing Center.mp4

24.5 MB

003. 64.2 Endorsement and Continuing Education.en.srt

7.3 KB

003. 64.2 Endorsement and Continuing Education.mp4

20.0 MB

/Summary/

001. CISSP Summary.en.srt

1.3 KB

001. CISSP Summary.mp4

7.0 MB

 

Total files 452


Copyright © 2025 FileMood.com