FileMood

Download CISSP.Complete.Video.Course.2nd.Edition

CISSP Complete Video Course 2nd Edition

Name

CISSP.Complete.Video.Course.2nd.Edition

 DOWNLOAD Copy Link

Total Size

11.7 GB

Total Files

198

Hash

4D3AB332AE75166900561F841C5550C0F6E6DB4B

/

001 CISSP - Introduction.mp4

53.3 MB

002 Module introduction.mp4

10.3 MB

003 Learning objectives.mp4

2.6 MB

004 1.1 Information Security Fundamentals.mp4

120.9 MB

005 Learning objectives.mp4

3.0 MB

006 2.1 Frameworks, Benchmarks, and Guidelines.mp4

129.3 MB

007 2.2 Leadership Roles and Responsibilities.mp4

198.9 MB

008 Learning objectives.mp4

2.9 MB

009 3.1 Regulatory and Contractual Obligations.mp4

99.0 MB

010 3.2 Privacy and Data Protection.mp4

84.3 MB

011 Learning objectives.mp4

4.8 MB

012 4.1 Cybercrime and Data Breaches.mp4

100.5 MB

013 4.2 Licensing and Intellectual Property Law.mp4

85.4 MB

014 Lesson 1-4 Assessment.mp4

73.5 MB

015 Learning objectives.mp4

2.7 MB

016 5.1 Organizational and Professional Ethics.mp4

46.2 MB

017 Learning objectives.mp4

3.1 MB

018 6.1 Information Security Policy.mp4

92.4 MB

019 Learning objectives.mp4

3.3 MB

020 7.1 Business Continuity Planning.mp4

62.7 MB

021 7.2 Business Impact Analysis.mp4

92.5 MB

022 Learning objectives.mp4

3.2 MB

023 8.1 Personnel Policies and Agreements.mp4

131.3 MB

024 Lesson 5-8 Assessment.mp4

65.1 MB

025 Learning objectives.mp4

3.5 MB

026 9.1 Risk Management Concepts.mp4

130.0 MB

027 9.2 Risk Assessment.mp4

117.6 MB

028 9.3 Countermeasure Selection.mp4

110.4 MB

029 Learning objectives.mp4

2.6 MB

030 10.1 Threat Modeling.mp4

87.2 MB

031 10.2 Attack Vectors.mp4

115.1 MB

032 Learning objectives.mp4

2.3 MB

033 11.1 Supply Chain Risk Management.mp4

82.4 MB

034 Learning objectives.mp4

4.5 MB

035 12.1 SETA Principles and Practices.mp4

96.7 MB

036 12.2 Social Engineering Training.mp4

9.0 MB

037 Lesson 9-12 Assessment.mp4

70.7 MB

038 Module introduction.mp4

7.0 MB

039 Learning objectives.mp4

2.2 MB

040 13.1 Classification Frameworks.mp4

110.0 MB

041 Learning objectives.mp4

2.3 MB

042 14.1 Asset Ownership and Management.mp4

115.3 MB

043 Learning objectives.mp4

2.0 MB

044 15.1 Privacy Principles.mp4

117.9 MB

045 Learning objectives.mp4

2.4 MB

046 16.1 Data Retention and Destruction.mp4

140.5 MB

047 Learning objectives.mp4

2.4 MB

048 17.1 Data Security Standards and Selection.mp4

75.6 MB

049 Learning objectives.mp4

3.9 MB

050 18.1 Labeling and Handling Standards.mp4

93.8 MB

051 Lesson 13-18 Assessment.mp4

59.5 MB

052 Module introduction.mp4

11.4 MB

053 Learning objectives.mp4

2.4 MB

054 19.1 Security Design Principles.mp4

76.1 MB

055 Learning objectives.mp4

2.3 MB

056 20.1 Information Security Models.mp4

98.5 MB

057 Learning objectives.mp4

2.3 MB

058 21.1 Security Evaluation Models.mp4

72.3 MB

059 Learning objectives.mp4

3.6 MB

060 22.1 Information Systems Security Capabilities.mp4

73.6 MB

061 Lesson 19-22 Assessment.mp4

61.0 MB

062 Learning objectives.mp4

3.6 MB

063 23.1 Traditional Computing Environments.mp4

65.3 MB

064 23.2 Cloud Computing.mp4

113.0 MB

065 Learning objectives.mp4

2.2 MB

066 24.1 Web Vulnerabilities.mp4

99.9 MB

067 Learning objectives.mp4

2.3 MB

068 25.1 Mobile Systems Vulnerabilities.mp4

85.9 MB

069 Learning objectives.mp4

3.3 MB

070 26.1 Embedded Systems Vulnerabilities.mp4

79.9 MB

071 Lesson 23-26 Assessment.mp4

63.1 MB

072 Learning objectives.mp4

5.6 MB

073 27.1 Cryptographic Fundamentals.mp4

99.9 MB

074 27.2 Symmetric Encryption.mp4

92.1 MB

075 27.3 Asymmetric Encryption.mp4

99.4 MB

076 27.4 Hashing and Digital Signatures.mp4

102.3 MB

077 27.5 PKI and Digital Certificates.mp4

111.3 MB

078 27.6 Cryptographic Attacks and Vulnerabilities.mp4

83.2 MB

079 Learning objectives.mp4

2.3 MB

080 28.1 Physical Security Principles.mp4

79.8 MB

081 Learning objectives.mp4

4.4 MB

082 29.1 Site and Facility Security Controls.mp4

110.1 MB

083 29.2 Environmental Issues and Controls.mp4

86.5 MB

084 Lesson 27-29 Assessment.mp4

63.8 MB

085 Module introduction.mp4

8.0 MB

086 Learning objectives.mp4

3.6 MB

087 30.1 Network Models and IP Convergence.mp4

116.5 MB

088 30.2 Non-IP Multilayer Protocols.mp4

43.7 MB

089 30.3 Wireless Networks.mp4

121.2 MB

090 Learning objectives.mp4

3.0 MB

091 31.1 Transmission and Connectivity.mp4

150.9 MB

092 31.2 Network Access Control Devices.mp4

117.6 MB

093 31.3 Endpoint Security.mp4

76.1 MB

094 Learning objectives.mp4

6.3 MB

095 32.1 Voice and Multimedia.mp4

108.1 MB

096 32.2 Remote Access.mp4

112.6 MB

097 32.3 Data Communications.mp4

118.3 MB

098 32.4 Virtualization and Software-defined Networks.mp4

102.0 MB

099 Lesson 30-32 Assessment.mp4

88.1 MB

100 Module introduction.mp4

7.7 MB

101 Learning objectives.mp4

2.4 MB

102 33.1 Access Control Fundamentals.mp4

116.8 MB

103 Learning objectives.mp4

3.8 MB

104 34.1 Identification and Authentication.mp4

149.4 MB

105 34.2 Identity and Access Services.mp4

125.8 MB

106 Learning objectives.mp4

2.4 MB

107 35.1 Identity Management (IdM).mp4

118.7 MB

108 Learning objectives.mp4

2.4 MB

109 36.1 Access Control Models.mp4

93.8 MB

110 Learning objectives.mp4

4.1 MB

111 37.1 Identity and Access Management (IAM).mp4

99.1 MB

112 Lesson 33-37 Assessment.mp4

90.7 MB

113 Module introduction.mp4

7.9 MB

114 Learning objectives.mp4

2.9 MB

115 38.1 Assessment and Testing Overview.mp4

84.5 MB

116 38.2 Planning Engagements.mp4

106.6 MB

117 Learning objectives.mp4

2.6 MB

118 39.1 Infrastructure Assessments.mp4

149.5 MB

119 39.2 Code Testing and Analysis.mp4

64.8 MB

120 Learning objectives.mp4

2.9 MB

121 40.1 Activity and Error Reporting.mp4

73.4 MB

122 40.2 Information Security Continuous Monitoring.mp4

83.5 MB

123 Learning objectives.mp4

2.6 MB

124 41.1 Metrics, KPIs, and Business Intelligence.mp4

45.7 MB

125 Learning objectives.mp4

3.8 MB

126 42.1 Managing Third-party Audits and Examinations.mp4

111.8 MB

127 Lesson 38-42 Assessment.mp4

89.9 MB

128 Module introduction.mp4

11.7 MB

129 Learning objectives.mp4

2.9 MB

130 43.1 Evidence Handling.mp4

79.4 MB

131 43.2 Forensic Investigative Techniques.mp4

130.3 MB

132 Learning objectives.mp4

2.6 MB

133 44.1 Investigation Objectives and Requirements.mp4

62.3 MB

134 Learning objectives.mp4

3.1 MB

135 45.1 Logging and Analysis.mp4

114.0 MB

136 Lesson 43-45 Assessment.mp4

94.6 MB

137 Learning objectives.mp4

2.1 MB

138 46.1 Configuration Management.mp4

44.0 MB

139 Learning objectives.mp4

2.4 MB

140 47.1 Security Operations.mp4

110.9 MB

141 Learning objectives.mp4

2.9 MB

142 48.1 Media Management.mp4

116.1 MB

143 48.2 Mobile Device Management.mp4

120.6 MB

144 Learning objectives.mp4

3.3 MB

145 49.1 Incident Management Planning.mp4

113.3 MB

146 49.2 Incident Response.mp4

97.5 MB

147 Lesson 46-49 Assessment.mp4

121.9 MB

148 Learning objectives.mp4

4.5 MB

149 50.1 Detective and Preventative Solutions.mp4

79.4 MB

150 50.2 Firewalls and Filters.mp4

121.8 MB

151 50.3 IDS_IPS.mp4

84.0 MB

152 50.4 Anti-Malware Techniques.mp4

59.9 MB

153 Learning objectives.mp4

3.9 MB

154 51.1 Vulnerability Management.mp4

106.2 MB

155 51.2 Patch Management.mp4

72.3 MB

156 51.3 Threat Intelligence and Information Sharing.mp4

75.3 MB

157 Learning objectives.mp4

2.3 MB

158 52.1 Change Management.mp4

68.9 MB

159 Learning objectives.mp4

4.6 MB

160 53.1 Site Recovery Strategies.mp4

83.1 MB

161 53.2 Data Backup and Restoration.mp4

115.1 MB

162 53.3 Resiliency and Fault Tolerance.mp4

100.1 MB

163 Lesson 50-53 Assessment.mp4

157.1 MB

164 Learning objectives.mp4

2.5 MB

165 54.1 DR Planning and Response.mp4

110.0 MB

166 Learning objectives.mp4

2.4 MB

167 55.1 DRP Training and Testing.mp4

65.5 MB

168 Learning objectives.mp4

2.8 MB

169 56.1 BCP Relationship.mp4

87.5 MB

170 Learning objectives.mp4

2.6 MB

171 57.1 Perimeter and Internal Security Controls.mp4

121.8 MB

172 Learning objectives.mp4

3.9 MB

173 58.1 Personnel and Workplace Safety.mp4

52.2 MB

174 Lesson 54-58 Assessment.mp4

142.3 MB

175 Module introduction.mp4

8.1 MB

176 Learning objectives.mp4

3.1 MB

177 59.1 Software Development Life Cycle.mp4

122.5 MB

178 59.2 Secure DevOps.mp4

79.0 MB

179 Learning objectives.mp4

2.6 MB

180 60.1 Staging and Deployment Strategies.mp4

97.8 MB

181 Learning objectives.mp4

2.6 MB

182 61.1 Assessing the Effectiveness of Software Security.mp4

98.5 MB

183 61.1 Assessing the Effectiveness of Software Security.mp4

98.5 MB

184 Learning objectives.mp4

2.6 MB

185 62.1 Software Procurement and Acquisition.mp4

117.6 MB

186 Learning objectives.mp4

4.7 MB

187 63.1 Source Code Weaknesses.mp4

104.9 MB

188 63.2 Secure Coding Techniques.mp4

91.5 MB

189 Lesson 59-63 Assessment.mp4

112.6 MB

190 Module introduction.mp4

4.6 MB

191 Learning objectives.mp4

2.4 MB

192 64.1 Understanding the Exam Structure.mp4

13.3 MB

193 64.2 Test Taking Strategies.mp4

28.4 MB

194 64.3 Preparing for Test Day.mp4

14.7 MB

195 Learning objectives.mp4

2.8 MB

196 65.1 What to Expect at the Testing Center.mp4

24.4 MB

197 65.2 Attaining and Maintaining Your CISSP Certification.mp4

11.2 MB

198 CISSP - Summary.mp4

6.7 MB

 

Total files 198


Copyright © 2024 FileMood.com