CISSP, 3rd Edition
File List
- Module 4 Communication and Network Security/Lesson 30 Secure Network Components/004. 30.3 Security Zones and Firewalls.mp4 64.0 MB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/004. 24.3 Cloud-based Systems.mp4 60.2 MB
- Module 8 Software Development Security/Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/003. 59.2 Secure Staging.mp4 60.1 MB
- Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/003. 62.2 Input and Output Validation.mp4 57.3 MB
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/002. 29.1 Network Models.mp4 56.2 MB
- Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/002. 11.1 Threat Actors and Attributes.mp4 53.0 MB
- Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/004. 10.3 Risk Assessment.mp4 52.9 MB
- Module 4 Communication and Network Security/Lesson 30 Secure Network Components/007. Lesson 30 Assessment.mp4 51.6 MB
- Module 7 Security Operations/Lesson 43 Understand and Comply with Investigations/002. 43.1 Evidence Handling.mp4 51.5 MB
- Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/003. 3.2 Organizational Roles and Responsibilities.mp4 51.0 MB
- Module 6 Security Assessment and Testing/Lesson 42 Conduct or Facilitate Security Audits/003. Lesson 40-42 Assessment.mp4 49.9 MB
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/008. 29.7 Wireless Architecture.mp4 49.9 MB
- Module 7 Security Operations/Lesson 52 Implement Recovery Strategies/003. 52.2 Resiliency.mp4 49.6 MB
- Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/002. 13.1 SETA Principles and Practices.mp4 49.1 MB
- Module 7 Security Operations/Lesson 56 Implement and Manage Physical Security/002. 56.1 Perimeter and Internal Security Controls.mp4 48.8 MB
- Module 7 Security Operations/Lesson 51 Understand and Participate in Change Management Process/003. Lesson 48-51 Assessment.mp4 48.1 MB
- Module 7 Security Operations/Lesson 43 Understand and Comply with Investigations/003. 43.2 Digital Forensics.mp4 47.2 MB
- Module 3 Security Architecture and Engineering/Lesson 23 Understand Security Capabilities of Information Systems/002. 23.1 Information Systems Security Capabilities.mp4 47.0 MB
- Module 5 Identity and Access Management (IAM)/Lesson 35 Implement and Manage Authorization Mechanisms/003. Lesson 32-35 Assessment.mp4 46.9 MB
- Module 6 Security Assessment and Testing/Lesson 42 Conduct or Facilitate Security Audits/002. 42.1 Security Audits.mp4 46.9 MB
- Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/003. 49.2 Anti-Malware Tools and Techniques.mp4 46.7 MB
- Module 1 Security and Risk Management Domain/Lesson 4 Determine Compliance and Other Requirements/003. 4.2 Privacy and Data Protection.mp4 46.7 MB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/009. Lesson 24 Assessment.mp4 46.5 MB
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/003. 29.2 IP Networking.mp4 46.4 MB
- Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/002. 25.1 Ciphers and Keys.mp4 46.3 MB
- Module 1 Security and Risk Management Domain/Lesson 1 Understand, Adhere to, and Promote Professional Ethics/002. 1.1 Organizational and Professional Ethics.mp4 46.2 MB
- Module 2 Asset Security/Lesson 17 Manage Data Lifecycle/002. 17.1 Data Collection and Retention.mp4 45.9 MB
- Module 2 Asset Security/Lesson 19 Determine Data Security Controls and Compliance Requirements/004. Lesson 14-19 Assessment.mp4 45.7 MB
- Module 5 Identity and Access Management (IAM)/Lesson 37 Implement Authentication Systems/002. 37.1 Authentication Protocols.mp4 45.7 MB
- Module 7 Security Operations/Lesson 44 Conduct Logging and Monitoring Activities/003. 44.2 Detection and Response Tools.mp4 45.7 MB
- Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/004. Lesson 10-13 Assessment.mp4 45.7 MB
- Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/004. 11.3 Attack Vectors.mp4 45.6 MB
- Module 8 Software Development Security/Lesson 58 Understand and Integrate Security in the Software Development Lifecycle/002. 58.1 Software Development Lifecycle.mp4 45.2 MB
- Module 4 Communication and Network Security/Lesson 30 Secure Network Components/005. 30.4 Network Access Control.mp4 45.1 MB
- Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/003. 25.2 Symmetric Encryption.mp4 45.1 MB
- Module 7 Security Operations/Lesson 54 Test Disaster Recovery Plans/002. 54.1 DRP Training and Testing.mp4 45.0 MB
- Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/005. 25.4 Hashing and Digital Signatures.mp4 44.9 MB
- Module 3 Security Architecture and Engineering/Lesson 20 Research, Implement, and Manage Engineering Processes Using Secure Design Principles/002. 20.1 Secure Design Principles.mp4 44.8 MB
- Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/002. 28.1 Site and Building Security.mp4 44.3 MB
- Module 7 Security Operations/Lesson 50 Implement and Support Patch and Vulnerability Management/002. 50.1 Vulnerability and Patch Management.mp4 44.3 MB
- Module 7 Security Operations/Lesson 44 Conduct Logging and Monitoring Activities/002. 44.1 Logging and Analysis.mp4 44.1 MB
- Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/004. 3.3 Security Control Frameworks.mp4 43.9 MB
- Module 7 Security Operations/Lesson 48 Conduct Incident Management/003. 48.2 Incident Response and Handling.mp4 43.8 MB
- Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/006. 25.5 PKI and Digital Certificates.mp4 43.8 MB
- Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/003. 28.2 Environmental Impact.mp4 43.7 MB
- Module 3 Security Architecture and Engineering/Lesson 21 Understand the Fundamental Concepts of Security Models/002. 21.1 Information Security Models.mp4 43.7 MB
- Module 6 Security Assessment and Testing/Lesson 41 Analyze Test Output and Generate Report/002. 41.1 Reporting and Response.mp4 43.2 MB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/008. 24.7 Automation and Solution Elements.mp4 43.1 MB
- Module 7 Security Operations/Lesson 47 Apply Resource Protection/003. 47.2 Mobile Device Management.mp4 42.9 MB
- Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/004. 25.3 Asymmetric Encryption.mp4 42.9 MB
- Module 1 Security and Risk Management Domain/Lesson 5 Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context/003. 5.2 Data Flow.mp4 42.5 MB
- Module 5 Identity and Access Management (IAM)/Lesson 35 Implement and Manage Authorization Mechanisms/002. 35.1 Authorization and Access Controls.mp4 42.1 MB
- Module 1 Security and Risk Management Domain/Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/003. 9.2 Personnel Security Practices.mp4 42.0 MB
- Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/005. 11.4 Threat Intelligence.mp4 41.7 MB
- Module 1 Security and Risk Management Domain/Lesson 4 Determine Compliance and Other Requirements/002. 4.1 Regulatory and Contractual Obligations.mp4 41.5 MB
- Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/003. 10.2 Risk Management Frameworks.mp4 41.4 MB
- Module 2 Asset Security/Lesson 17 Manage Data Lifecycle/003. 17.2 Deletion and Destruction.mp4 41.3 MB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/007. 24.6 Virtualized Systems.mp4 41.1 MB
- Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/002. 39.1 Infrastructure Testing.mp4 41.0 MB
- Module 7 Security Operations/Lesson 47 Apply Resource Protection/002. 47.1 Media Management and Protection.mp4 40.9 MB
- Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/002. 26.1 Cryptographic Attacks.mp4 40.6 MB
- Module 7 Security Operations/Lesson 47 Apply Resource Protection/004. Lesson 43-47 Assessment.mp4 40.6 MB
- Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/005. 10.4 Controls and Countermeasures.mp4 40.6 MB
- Module 5 Identity and Access Management (IAM)/Lesson 33 Manage Identification and Authentication of People, Devices, and Services/003. 33.2 Authentication Factors.mp4 40.5 MB
- Module 2 Asset Security/Lesson 16 Provision Resources Securely/002. 16.1 Asset Management.mp4 40.4 MB
- Module 7 Security Operations/Lesson 55 Participate in Business Continuity (BC) Planning and Exercises/002. 55.1 Business Continuity Integration.mp4 40.4 MB
- Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/005. Lesson 38-39 Assessment.mp4 40.4 MB
- Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/005. Lesson 25-26 Assessment.mp4 40.3 MB
- Module 4 Communication and Network Security/Lesson 30 Secure Network Components/003. 30.2 Wireless (Wi-Fi) Transmission.mp4 40.2 MB
- Module 7 Security Operations/Lesson 57 Address Personnel Safety and Security Concerns/003. Lesson 52-57 Assessment.mp4 40.2 MB
- Module 5 Identity and Access Management (IAM)/Lesson 36 Manage the Identity and Access Provisioning Lifecycle/003. 36.2 Privileged Accounts.mp4 40.1 MB
- Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/002. 10.1 Risk Management Concepts.mp4 40.0 MB
- Module 1 Security and Risk Management Domain/Lesson 8 Identify, Analyze, and Prioritize Business Continuity Requirements/003. 8.2 Business Impact Analysis.mp4 39.8 MB
- Introduction/001. CISSP Introduction.mp4 39.8 MB
- Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/003. 31.2 Multimedia Collaboration.mp4 39.8 MB
- Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/005. Lesson 60-62 Assessment.mp4 39.8 MB
- Module 7 Security Operations/Lesson 48 Conduct Incident Management/002. 48.1 Incident Management Planning.mp4 39.7 MB
- Module 7 Security Operations/Lesson 52 Implement Recovery Strategies/002. 52.1 Backup and Recovery.mp4 39.7 MB
- Module 7 Security Operations/Lesson 57 Address Personnel Safety and Security Concerns/002. 57.1 Workplace Safety.mp4 39.7 MB
- Module 7 Security Operations/Lesson 53 Implement Disaster Recovery Processes/002. 53.1 Disaster Response and Recovery.mp4 39.6 MB
- Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/003. 39.2 Penetration Testing.mp4 39.5 MB
- Module 6 Security Assessment and Testing/Lesson 38 Design and Validate Assessment, Test, and Audit Strategies/003. 38.2 Planning Engagements.mp4 39.2 MB
- Module 2 Asset Security/Lesson 14 Identify and Classify Information and Assets/002. 14.1 Asset Classification.mp4 39.2 MB
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/009. Lesson 29 Assessment.mp4 39.1 MB
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/007. 29.6 Micro-segmentation.mp4 39.0 MB
- Module 7 Security Operations/Lesson 46 Apply Foundational Security Operations Concepts/002. 46.1 Security Operations.mp4 38.9 MB
- Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/004. 31.3 Remote Access.mp4 38.6 MB
- Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/003. 26.2 Hash and Kerberos Post-Exploitation Attacks.mp4 38.6 MB
- Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/004. 26.3 Ransomware.mp4 38.2 MB
- Module 1 Security and Risk Management Domain/Lesson 2 Understand and Apply Security Concepts/002. 2.1 Information Security Fundamentals.mp4 38.2 MB
- Module 1 Security and Risk Management Domain/Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/004. Lesson 5-9 Assessment.mp4 38.0 MB
- Module 5 Identity and Access Management (IAM)/Lesson 36 Manage the Identity and Access Provisioning Lifecycle/002. 36.1 Identity and Access Management.mp4 37.9 MB
- Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/004. Lesson 27-28 Assessment.mp4 37.7 MB
- Module 1 Security and Risk Management Domain/Lesson 6 Understand Requirements for Investigation Types/002. 6.1 Investigation Objectives and Requirements.mp4 37.5 MB
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/005. 29.4 Secure Communications Protocols.mp4 37.3 MB
- Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/003. 13.2 Social Engineering.mp4 37.3 MB
- Module 8 Software Development Security/Lesson 61 Assess the Security Impact of Acquired Software/002. 61.1 Software Procurement and Acquisition.mp4 37.1 MB
- Module 1 Security and Risk Management Domain/Lesson 7 Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines/002. 7.1 Governance Documents.mp4 36.9 MB
- Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/002. 3.1 Strategic Alignment.mp4 36.7 MB
- Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/004. 39.3 Code Assessment.mp4 36.7 MB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/005. 24.4 Embedded Systems.mp4 36.6 MB
- Module 5 Identity and Access Management (IAM)/Lesson 33 Manage Identification and Authentication of People, Devices, and Services/002. 33.1 Identity Management (IdM).mp4 36.6 MB
- Module 8 Software Development Security/Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/002. 59.1 Code, Languages, Libraries, and Tools.mp4 36.5 MB
- Module 2 Asset Security/Lesson 18 Ensure Appropriate Asset Retention/002. 18.1 Asset Lifecycle - EOL.mp4 36.3 MB
- Module 4 Communication and Network Security/Lesson 30 Secure Network Components/002. 30.1 Wired Transmission.mp4 36.3 MB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/003. 24.2 Database Systems.mp4 36.2 MB
- Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/004. 62.3 Secure Coding Practices.mp4 36.2 MB
- Module 1 Security and Risk Management Domain/Lesson 4 Determine Compliance and Other Requirements/004. Lesson 1-4 Assessment.mp4 36.1 MB
- Module 3 Security Architecture and Engineering/Lesson 23 Understand Security Capabilities of Information Systems/003. Lesson 20-23 Assessment.mp4 36.1 MB
- Module 1 Security and Risk Management Domain/Lesson 5 Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context/002. 5.1 Cybercrime and Data Breaches.mp4 35.4 MB
- Module 1 Security and Risk Management Domain/Lesson 12 Apply Supply Chain Risk Management Concepts/002. 12.1 Supply Chain Risk Management.mp4 34.9 MB
- Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/006. Lesson 31 Assessment.mp4 34.8 MB
- Module 2 Asset Security/Lesson 19 Determine Data Security Controls and Compliance Requirements/003. 19.2 Data Protection Methods.mp4 34.8 MB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/002. 24.1 Traditional Systems Architectures.mp4 34.7 MB
- Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/003. 11.2 Threat Modeling.mp4 34.5 MB
- Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/002. 31.1 Voice-over-IP (VoIP).mp4 34.5 MB
- Module 5 Identity and Access Management (IAM)/Lesson 37 Implement Authentication Systems/004. Lesson 36-37 Assessment.mp4 34.5 MB
- Module 6 Security Assessment and Testing/Lesson 40 Collect Security Process Data/004. 40.3 Continuous Monitoring.mp4 34.3 MB
- Module 5 Identity and Access Management (IAM)/Lesson 34 Federated Identity with a Third-party Service/002. 34.1 Federated Identity Management.mp4 34.3 MB
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/006. 29.5 Secure Network Protocols.mp4 34.2 MB
- Module 1 Security and Risk Management Domain/Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/002. 9.1 Personnel Policies and Agreements.mp4 33.9 MB
- Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/002. 62.1 Source Code Flaws.mp4 33.8 MB
- Module 6 Security Assessment and Testing/Lesson 40 Collect Security Process Data/002. 40.1 Management Metrics.mp4 33.4 MB
- Module 6 Security Assessment and Testing/Lesson 40 Collect Security Process Data/003. 40.2 SETA Measures and Metrics.mp4 33.1 MB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/006. 24.5 IoT and IIoT.mp4 32.8 MB
- Module 6 Security Assessment and Testing/Lesson 38 Design and Validate Assessment, Test, and Audit Strategies/002. 38.1 Security Assessment Overview.mp4 32.6 MB
- Module 5 Identity and Access Management (IAM)/Lesson 32 Control Physical and Logical Access to Assets/002. 32.1 Access Control Fundamentals.mp4 32.4 MB
- Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/004. 49.3 Adversarial Artificial Intelligence.mp4 32.4 MB
- Module 5 Identity and Access Management (IAM)/Lesson 33 Manage Identification and Authentication of People, Devices, and Services/004. 33.3 Biometric Authentication.mp4 32.4 MB
- Module 8 Software Development Security/Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/004. Lesson 58-59 Assessment.mp4 32.3 MB
- Module 2 Asset Security/Lesson 15 Establish Information and Asset Handling Requirements/002. 15.1 Data and Asset Handling.mp4 32.0 MB
- Module 1 Security and Risk Management Domain/Lesson 8 Identify, Analyze, and Prioritize Business Continuity Requirements/002. 8.1 Business Continuity Planning.mp4 32.0 MB
- Module 4 Communication and Network Security/Lesson 30 Secure Network Components/006. 30.5 Endpoint Security.mp4 31.6 MB
- Module 9 Attaining and Maintaining Your CISSP/Lesson 63 Preparing for Your Examination/003. 63.2 Test Taking Strategies.mp4 31.1 MB
- Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/005. 49.4 Deception and Disruption.mp4 30.9 MB
- Module 7 Security Operations/Lesson 51 Understand and Participate in Change Management Process/002. 51.1 Change Management.mp4 30.6 MB
- Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/005. 31.4 Virtual Private Cloud.mp4 30.5 MB
- Module 3 Security Architecture and Engineering/Lesson 22 Select Controls Based Upon System Security Requirements/002. 22.1 Security Evaluation Criteria.mp4 30.3 MB
- Module 8 Software Development Security/Lesson 58 Understand and Integrate Security in the Software Development Lifecycle/003. 58.2 Security Collaboration.mp4 29.8 MB
- Module 8 Software Development Security/Lesson 60 Assess the Effectiveness of Software Security/002. 60.1 Software Security Assessment.mp4 29.7 MB
- Module 9 Attaining and Maintaining Your CISSP/Lesson 63 Preparing for Your Examination/004. 63.3 Preparing for Test Day.mp4 29.0 MB
- Module 2 Asset Security/Lesson 19 Determine Data Security Controls and Compliance Requirements/002. 19.1 Control Baselines, Tailoring, and Scoping.mp4 28.9 MB
- Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/007. 25.6 Emerging Cryptography.mp4 28.0 MB
- Module 3 Security Architecture and Engineering/Lesson 27 Apply Security Principles to Site and Facility Design/002. 27.1 Physical Security Principles.mp4 27.9 MB
- Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/002. 49.1 Detective and Preventative Controls.mp4 27.3 MB
- Module 7 Security Operations/Lesson 45 Perform Configuration Management/002. 45.1 Configuration Management.mp4 27.3 MB
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/004. 29.3 Non-IP Networking.mp4 26.6 MB
- Module 9 Attaining and Maintaining Your CISSP/Lesson 63 Preparing for Your Examination/002. 63.1 Understanding the Exam Structure.mp4 25.9 MB
- Module 7 Security Operations/Lesson 45 Perform Configuration Management/003. 45.2 Automated Provisioning.mp4 25.6 MB
- Module 5 Identity and Access Management (IAM)/Lesson 37 Implement Authentication Systems/003. 37.2 FIDO and WebAuthn.mp4 25.0 MB
- Module 9 Attaining and Maintaining Your CISSP/Lesson 64 The Certification Process/002. 64.1 What to Expect at the Testing Center.mp4 23.4 MB
- Module 9 Attaining and Maintaining Your CISSP/Lesson 64 The Certification Process/003. 64.2 Endorsement and Continuing Education.mp4 19.1 MB
- Module 1 Security and Risk Management Domain/001. Module introduction.mp4 9.3 MB
- Module 7 Security Operations/001. Module introduction.mp4 9.0 MB
- Module 3 Security Architecture and Engineering/001. Module introduction.mp4 8.0 MB
- Module 4 Communication and Network Security/001. Module introduction.mp4 7.6 MB
- Module 8 Software Development Security/001. Module introduction.mp4 7.4 MB
- Summary/001. CISSP Summary.mp4 6.7 MB
- Module 5 Identity and Access Management (IAM)/001. Module introduction.mp4 6.3 MB
- Module 2 Asset Security/001. Module introduction.mp4 6.0 MB
- Module 6 Security Assessment and Testing/001. Module introduction.mp4 5.9 MB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/001. Learning objectives.mp4 5.2 MB
- Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/001. Learning objectives.mp4 4.6 MB
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/001. Learning objectives.mp4 4.5 MB
- Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/001. Learning objectives.mp4 3.8 MB
- Module 4 Communication and Network Security/Lesson 30 Secure Network Components/001. Learning objectives.mp4 3.6 MB
- Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/001. Learning objectives.mp4 3.5 MB
- Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/001. Learning objectives.mp4 3.5 MB
- Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/001. Learning objectives.mp4 3.3 MB
- Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/001. Learning objectives.mp4 3.1 MB
- Module 2 Asset Security/Lesson 19 Determine Data Security Controls and Compliance Requirements/001. Learning objectives.mp4 3.1 MB
- Module 1 Security and Risk Management Domain/Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/001. Learning objectives.mp4 3.0 MB
- Module 5 Identity and Access Management (IAM)/Lesson 33 Manage Identification and Authentication of People, Devices, and Services/001. Learning objectives.mp4 2.9 MB
- Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/001. Learning objectives.mp4 2.9 MB
- Module 8 Software Development Security/Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/001. Learning objectives.mp4 2.9 MB
- Module 5 Identity and Access Management (IAM)/Lesson 37 Implement Authentication Systems/001. Learning objectives.mp4 2.8 MB
- Module 1 Security and Risk Management Domain/Lesson 4 Determine Compliance and Other Requirements/001. Learning objectives.mp4 2.8 MB
- Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/001. Learning objectives.mp4 2.8 MB
- Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/001. Learning objectives.mp4 2.8 MB
- Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/001. Learning objectives.mp4 2.7 MB
- Module 3 Security Architecture and Engineering/Lesson 23 Understand Security Capabilities of Information Systems/001. Learning objectives.mp4 2.6 MB
- Module 7 Security Operations/Lesson 57 Address Personnel Safety and Security Concerns/001. Learning objectives.mp4 2.6 MB
- Module 7 Security Operations/Lesson 47 Apply Resource Protection/001. Learning objectives.mp4 2.5 MB
- Module 1 Security and Risk Management Domain/Lesson 5 Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context/001. Learning objectives.mp4 2.5 MB
- Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/001. Learning objectives.mp4 2.5 MB
- Module 8 Software Development Security/Lesson 58 Understand and Integrate Security in the Software Development Lifecycle/001. Learning objectives.mp4 2.4 MB
- Module 1 Security and Risk Management Domain/Lesson 8 Identify, Analyze, and Prioritize Business Continuity Requirements/001. Learning objectives.mp4 2.4 MB
- Module 5 Identity and Access Management (IAM)/Lesson 35 Implement and Manage Authorization Mechanisms/001. Learning objectives.mp4 2.4 MB
- Module 9 Attaining and Maintaining Your CISSP/001. Module introduction.mp4 2.4 MB
- Module 6 Security Assessment and Testing/Lesson 42 Conduct or Facilitate Security Audits/001. Learning objectives.mp4 2.4 MB
- Module 9 Attaining and Maintaining Your CISSP/Lesson 63 Preparing for Your Examination/001. Learning objectives.mp4 2.3 MB
- Module 5 Identity and Access Management (IAM)/Lesson 36 Manage the Identity and Access Provisioning Lifecycle/001. Learning objectives.mp4 2.3 MB
- Module 1 Security and Risk Management Domain/Lesson 7 Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines/001. Learning objectives.mp4 2.3 MB
- Module 6 Security Assessment and Testing/Lesson 40 Collect Security Process Data/001. Learning objectives.mp4 2.3 MB
- Module 7 Security Operations/Lesson 51 Understand and Participate in Change Management Process/001. Learning objectives.mp4 2.2 MB
- Module 9 Attaining and Maintaining Your CISSP/Lesson 64 The Certification Process/001. Learning objectives.mp4 2.2 MB
- Module 6 Security Assessment and Testing/Lesson 38 Design and Validate Assessment, Test, and Audit Strategies/001. Learning objectives.mp4 2.2 MB
- Module 5 Identity and Access Management (IAM)/Lesson 32 Control Physical and Logical Access to Assets/001. Learning objectives.mp4 2.2 MB
- Module 7 Security Operations/Lesson 44 Conduct Logging and Monitoring Activities/001. Learning objectives.mp4 2.2 MB
- Module 2 Asset Security/Lesson 17 Manage Data Lifecycle/001. Learning objectives.mp4 2.1 MB
- Module 3 Security Architecture and Engineering/Lesson 20 Research, Implement, and Manage Engineering Processes Using Secure Design Principles/001. Learning objectives.mp4 2.1 MB
- Module 1 Security and Risk Management Domain/Lesson 1 Understand, Adhere to, and Promote Professional Ethics/001. Learning objectives.mp4 2.0 MB
- Module 1 Security and Risk Management Domain/Lesson 6 Understand Requirements for Investigation Types/001. Learning objectives.mp4 2.0 MB
- Module 7 Security Operations/Lesson 55 Participate in Business Continuity (BC) Planning and Exercises/001. Learning objectives.mp4 2.0 MB
- Module 7 Security Operations/Lesson 45 Perform Configuration Management/001. Learning objectives.mp4 2.0 MB
- Module 7 Security Operations/Lesson 43 Understand and Comply with Investigations/001. Learning objectives.mp4 2.0 MB
- Module 7 Security Operations/Lesson 48 Conduct Incident Management/001. Learning objectives.mp4 2.0 MB
- Module 1 Security and Risk Management Domain/Lesson 2 Understand and Apply Security Concepts/001. Learning objectives.mp4 2.0 MB
- Module 3 Security Architecture and Engineering/Lesson 27 Apply Security Principles to Site and Facility Design/001. Learning objectives.mp4 2.0 MB
- Module 3 Security Architecture and Engineering/Lesson 22 Select Controls Based Upon System Security Requirements/001. Learning objectives.mp4 2.0 MB
- Module 2 Asset Security/Lesson 15 Establish Information and Asset Handling Requirements/001. Learning objectives.mp4 2.0 MB
- Module 7 Security Operations/Lesson 52 Implement Recovery Strategies/001. Learning objectives.mp4 1.9 MB
- Module 5 Identity and Access Management (IAM)/Lesson 34 Federated Identity with a Third-party Service/001. Learning objectives.mp4 1.9 MB
- Module 7 Security Operations/Lesson 50 Implement and Support Patch and Vulnerability Management/001. Learning objectives.mp4 1.9 MB
- Module 3 Security Architecture and Engineering/Lesson 21 Understand the Fundamental Concepts of Security Models/001. Learning objectives.mp4 1.9 MB
- Module 8 Software Development Security/Lesson 61 Assess the Security Impact of Acquired Software/001. Learning objectives.mp4 1.9 MB
- Module 7 Security Operations/Lesson 56 Implement and Manage Physical Security/001. Learning objectives.mp4 1.9 MB
- Module 6 Security Assessment and Testing/Lesson 41 Analyze Test Output and Generate Report/001. Learning objectives.mp4 1.9 MB
- Module 2 Asset Security/Lesson 18 Ensure Appropriate Asset Retention/001. Learning objectives.mp4 1.9 MB
- Module 2 Asset Security/Lesson 14 Identify and Classify Information and Assets/001. Learning objectives.mp4 1.9 MB
- Module 1 Security and Risk Management Domain/Lesson 12 Apply Supply Chain Risk Management Concepts/001. Learning objectives.mp4 1.8 MB
- Module 7 Security Operations/Lesson 46 Apply Foundational Security Operations Concepts/001. Learning objectives.mp4 1.8 MB
- Module 8 Software Development Security/Lesson 60 Assess the Effectiveness of Software Security/001. Learning objectives.mp4 1.8 MB
- Module 7 Security Operations/Lesson 54 Test Disaster Recovery Plans/001. Learning objectives.mp4 1.8 MB
- Module 7 Security Operations/Lesson 53 Implement Disaster Recovery Processes/001. Learning objectives.mp4 1.8 MB
- Module 2 Asset Security/Lesson 16 Provision Resources Securely/001. Learning objectives.mp4 1.7 MB
- Module 8 Software Development Security/Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/003. 59.2 Secure Staging.en.srt 25.7 KB
- Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/003. 62.2 Input and Output Validation.en.srt 25.4 KB
- Module 2 Asset Security/Lesson 19 Determine Data Security Controls and Compliance Requirements/004. Lesson 14-19 Assessment.en.srt 25.1 KB
- Module 4 Communication and Network Security/Lesson 30 Secure Network Components/004. 30.3 Security Zones and Firewalls.en.srt 25.1 KB
- Module 4 Communication and Network Security/Lesson 30 Secure Network Components/007. Lesson 30 Assessment.en.srt 24.9 KB
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/002. 29.1 Network Models.en.srt 24.9 KB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/004. 24.3 Cloud-based Systems.en.srt 24.2 KB
- Module 7 Security Operations/Lesson 51 Understand and Participate in Change Management Process/003. Lesson 48-51 Assessment.en.srt 24.2 KB
- Module 7 Security Operations/Lesson 43 Understand and Comply with Investigations/002. 43.1 Evidence Handling.en.srt 23.7 KB
- Module 7 Security Operations/Lesson 52 Implement Recovery Strategies/003. 52.2 Resiliency.en.srt 23.6 KB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/009. Lesson 24 Assessment.en.srt 23.4 KB
- Module 5 Identity and Access Management (IAM)/Lesson 35 Implement and Manage Authorization Mechanisms/003. Lesson 32-35 Assessment.en.srt 23.2 KB
- Module 6 Security Assessment and Testing/Lesson 42 Conduct or Facilitate Security Audits/003. Lesson 40-42 Assessment.en.srt 23.0 KB
- Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/003. 3.2 Organizational Roles and Responsibilities.en.srt 22.3 KB
- Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/004. Lesson 10-13 Assessment.en.srt 22.2 KB
- Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/002. 13.1 SETA Principles and Practices.en.srt 22.0 KB
- Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/005. Lesson 25-26 Assessment.en.srt 21.9 KB
- Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/002. 11.1 Threat Actors and Attributes.en.srt 21.8 KB
- Module 7 Security Operations/Lesson 57 Address Personnel Safety and Security Concerns/003. Lesson 52-57 Assessment.en.srt 21.7 KB
- Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/005. Lesson 38-39 Assessment.en.srt 21.6 KB
- Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/004. 10.3 Risk Assessment.en.srt 21.6 KB
- Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/004. Lesson 27-28 Assessment.en.srt 21.4 KB
- Module 7 Security Operations/Lesson 50 Implement and Support Patch and Vulnerability Management/002. 50.1 Vulnerability and Patch Management.en.srt 21.3 KB
- Module 6 Security Assessment and Testing/Lesson 42 Conduct or Facilitate Security Audits/002. 42.1 Security Audits.en.srt 21.0 KB
- Module 5 Identity and Access Management (IAM)/Lesson 37 Implement Authentication Systems/002. 37.1 Authentication Protocols.en.srt 21.0 KB
- Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/005. 25.4 Hashing and Digital Signatures.en.srt 20.9 KB
- Module 3 Security Architecture and Engineering/Lesson 23 Understand Security Capabilities of Information Systems/002. 23.1 Information Systems Security Capabilities.en.srt 20.7 KB
- Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/004. 25.3 Asymmetric Encryption.en.srt 20.7 KB
- Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/006. 25.5 PKI and Digital Certificates.en.srt 20.4 KB
- Module 7 Security Operations/Lesson 47 Apply Resource Protection/004. Lesson 43-47 Assessment.en.srt 20.3 KB
- Module 7 Security Operations/Lesson 56 Implement and Manage Physical Security/002. 56.1 Perimeter and Internal Security Controls.en.srt 20.3 KB
- Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/005. Lesson 60-62 Assessment.en.srt 20.1 KB
- Module 1 Security and Risk Management Domain/Lesson 4 Determine Compliance and Other Requirements/004. Lesson 1-4 Assessment.en.srt 20.1 KB
- Module 1 Security and Risk Management Domain/Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/004. Lesson 5-9 Assessment.en.srt 20.0 KB
- Module 7 Security Operations/Lesson 44 Conduct Logging and Monitoring Activities/003. 44.2 Detection and Response Tools.en.srt 19.9 KB
- Module 7 Security Operations/Lesson 54 Test Disaster Recovery Plans/002. 54.1 DRP Training and Testing.en.srt 19.8 KB
- Module 4 Communication and Network Security/Lesson 30 Secure Network Components/005. 30.4 Network Access Control.en.srt 19.7 KB
- Module 2 Asset Security/Lesson 17 Manage Data Lifecycle/002. 17.1 Data Collection and Retention.en.srt 19.7 KB
- Module 7 Security Operations/Lesson 43 Understand and Comply with Investigations/003. 43.2 Digital Forensics.en.srt 19.5 KB
- Module 6 Security Assessment and Testing/Lesson 41 Analyze Test Output and Generate Report/002. 41.1 Reporting and Response.en.srt 19.3 KB
- Module 7 Security Operations/Lesson 44 Conduct Logging and Monitoring Activities/002. 44.1 Logging and Analysis.en.srt 19.2 KB
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/008. 29.7 Wireless Architecture.en.srt 19.2 KB
- Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/003. 25.2 Symmetric Encryption.en.srt 19.1 KB
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/003. 29.2 IP Networking.en.srt 19.0 KB
- Module 1 Security and Risk Management Domain/Lesson 4 Determine Compliance and Other Requirements/003. 4.2 Privacy and Data Protection.en.srt 19.0 KB
- Module 3 Security Architecture and Engineering/Lesson 23 Understand Security Capabilities of Information Systems/003. Lesson 20-23 Assessment.en.srt 19.0 KB
- Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/005. 11.4 Threat Intelligence.en.srt 19.0 KB
- Module 8 Software Development Security/Lesson 58 Understand and Integrate Security in the Software Development Lifecycle/002. 58.1 Software Development Lifecycle.en.srt 18.9 KB
- Module 7 Security Operations/Lesson 48 Conduct Incident Management/003. 48.2 Incident Response and Handling.en.srt 18.8 KB
- Module 1 Security and Risk Management Domain/Lesson 1 Understand, Adhere to, and Promote Professional Ethics/002. 1.1 Organizational and Professional Ethics.en.srt 18.7 KB
- Module 3 Security Architecture and Engineering/Lesson 21 Understand the Fundamental Concepts of Security Models/002. 21.1 Information Security Models.en.srt 18.7 KB
- Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/004. 3.3 Security Control Frameworks.en.srt 18.6 KB
- Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/002. 25.1 Ciphers and Keys.en.srt 18.6 KB
- Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/003. 49.2 Anti-Malware Tools and Techniques.en.srt 18.6 KB
- Module 6 Security Assessment and Testing/Lesson 38 Design and Validate Assessment, Test, and Audit Strategies/003. 38.2 Planning Engagements.en.srt 18.5 KB
- Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/005. 10.4 Controls and Countermeasures.en.srt 18.4 KB
- Module 7 Security Operations/Lesson 52 Implement Recovery Strategies/002. 52.1 Backup and Recovery.en.srt 18.2 KB
- Module 5 Identity and Access Management (IAM)/Lesson 37 Implement Authentication Systems/004. Lesson 36-37 Assessment.en.srt 18.2 KB
- Module 3 Security Architecture and Engineering/Lesson 20 Research, Implement, and Manage Engineering Processes Using Secure Design Principles/002. 20.1 Secure Design Principles.en.srt 18.2 KB
- Module 5 Identity and Access Management (IAM)/Lesson 33 Manage Identification and Authentication of People, Devices, and Services/003. 33.2 Authentication Factors.en.srt 18.1 KB
- Module 1 Security and Risk Management Domain/Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/003. 9.2 Personnel Security Practices.en.srt 18.1 KB
- Module 8 Software Development Security/Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/004. Lesson 58-59 Assessment.en.srt 18.1 KB
- Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/004. 11.3 Attack Vectors.en.srt 18.0 KB
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/009. Lesson 29 Assessment.en.srt 17.9 KB
- Module 7 Security Operations/Lesson 47 Apply Resource Protection/003. 47.2 Mobile Device Management.en.srt 17.7 KB
- Module 7 Security Operations/Lesson 53 Implement Disaster Recovery Processes/002. 53.1 Disaster Response and Recovery.en.srt 17.7 KB
- Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/002. 10.1 Risk Management Concepts.en.srt 17.7 KB
- Module 8 Software Development Security/Lesson 61 Assess the Security Impact of Acquired Software/002. 61.1 Software Procurement and Acquisition.en.srt 17.7 KB
- Module 2 Asset Security/Lesson 14 Identify and Classify Information and Assets/002. 14.1 Asset Classification.en.srt 17.7 KB
- Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/003. 10.2 Risk Management Frameworks.en.srt 17.7 KB
- Module 5 Identity and Access Management (IAM)/Lesson 35 Implement and Manage Authorization Mechanisms/002. 35.1 Authorization and Access Controls.en.srt 17.5 KB
- Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/006. Lesson 31 Assessment.en.srt 17.5 KB
- Module 7 Security Operations/Lesson 47 Apply Resource Protection/002. 47.1 Media Management and Protection.en.srt 17.4 KB
- Module 7 Security Operations/Lesson 48 Conduct Incident Management/002. 48.1 Incident Management Planning.en.srt 17.3 KB
- Module 1 Security and Risk Management Domain/Lesson 5 Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context/002. 5.1 Cybercrime and Data Breaches.en.srt 17.2 KB
- Module 5 Identity and Access Management (IAM)/Lesson 36 Manage the Identity and Access Provisioning Lifecycle/002. 36.1 Identity and Access Management.en.srt 17.1 KB
- Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/002. 28.1 Site and Building Security.en.srt 17.1 KB
- Module 2 Asset Security/Lesson 16 Provision Resources Securely/002. 16.1 Asset Management.en.srt 17.1 KB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/007. 24.6 Virtualized Systems.en.srt 17.1 KB
- Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/003. 39.2 Penetration Testing.en.srt 17.1 KB
- Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/002. 39.1 Infrastructure Testing.en.srt 17.1 KB
- Module 1 Security and Risk Management Domain/Lesson 2 Understand and Apply Security Concepts/002. 2.1 Information Security Fundamentals.en.srt 17.0 KB
- Module 1 Security and Risk Management Domain/Lesson 4 Determine Compliance and Other Requirements/002. 4.1 Regulatory and Contractual Obligations.en.srt 16.9 KB
- Module 1 Security and Risk Management Domain/Lesson 5 Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context/003. 5.2 Data Flow.en.srt 16.9 KB
- Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/003. 31.2 Multimedia Collaboration.en.srt 16.8 KB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/008. 24.7 Automation and Solution Elements.en.srt 16.7 KB
- Module 7 Security Operations/Lesson 57 Address Personnel Safety and Security Concerns/002. 57.1 Workplace Safety.en.srt 16.6 KB
- Module 1 Security and Risk Management Domain/Lesson 7 Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines/002. 7.1 Governance Documents.en.srt 16.6 KB
- Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/003. 28.2 Environmental Impact.en.srt 16.5 KB
- Module 7 Security Operations/Lesson 46 Apply Foundational Security Operations Concepts/002. 46.1 Security Operations.en.srt 16.4 KB
- Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/002. 26.1 Cryptographic Attacks.en.srt 16.3 KB
- Module 6 Security Assessment and Testing/Lesson 40 Collect Security Process Data/003. 40.2 SETA Measures and Metrics.en.srt 16.3 KB
- Module 2 Asset Security/Lesson 17 Manage Data Lifecycle/003. 17.2 Deletion and Destruction.en.srt 16.2 KB
- Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/003. 26.2 Hash and Kerberos Post-Exploitation Attacks.en.srt 16.1 KB
- Module 7 Security Operations/Lesson 55 Participate in Business Continuity (BC) Planning and Exercises/002. 55.1 Business Continuity Integration.en.srt 16.0 KB
- Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/004. 62.3 Secure Coding Practices.en.srt 16.0 KB
- Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/003. 13.2 Social Engineering.en.srt 15.8 KB
- Module 1 Security and Risk Management Domain/Lesson 8 Identify, Analyze, and Prioritize Business Continuity Requirements/003. 8.2 Business Impact Analysis.en.srt 15.8 KB
- Module 1 Security and Risk Management Domain/Lesson 6 Understand Requirements for Investigation Types/002. 6.1 Investigation Objectives and Requirements.en.srt 15.7 KB
- Module 4 Communication and Network Security/Lesson 30 Secure Network Components/003. 30.2 Wireless (Wi-Fi) Transmission.en.srt 15.7 KB
- Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/004. 31.3 Remote Access.en.srt 15.7 KB
- Module 5 Identity and Access Management (IAM)/Lesson 36 Manage the Identity and Access Provisioning Lifecycle/003. 36.2 Privileged Accounts.en.srt 15.7 KB
- Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/002. 3.1 Strategic Alignment.en.srt 15.7 KB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/005. 24.4 Embedded Systems.en.srt 15.5 KB
- Module 4 Communication and Network Security/Lesson 30 Secure Network Components/002. 30.1 Wired Transmission.en.srt 15.4 KB
- Module 5 Identity and Access Management (IAM)/Lesson 34 Federated Identity with a Third-party Service/002. 34.1 Federated Identity Management.en.srt 15.4 KB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/002. 24.1 Traditional Systems Architectures.en.srt 15.4 KB
- Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/004. 26.3 Ransomware.en.srt 15.3 KB
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/007. 29.6 Micro-segmentation.en.srt 15.3 KB
- Module 6 Security Assessment and Testing/Lesson 40 Collect Security Process Data/002. 40.1 Management Metrics.en.srt 15.3 KB
- Module 8 Software Development Security/Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/002. 59.1 Code, Languages, Libraries, and Tools.en.srt 15.2 KB
- Module 1 Security and Risk Management Domain/Lesson 12 Apply Supply Chain Risk Management Concepts/002. 12.1 Supply Chain Risk Management.en.srt 15.2 KB
- Module 1 Security and Risk Management Domain/Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/002. 9.1 Personnel Policies and Agreements.en.srt 15.1 KB
- Module 2 Asset Security/Lesson 19 Determine Data Security Controls and Compliance Requirements/003. 19.2 Data Protection Methods.en.srt 15.0 KB
- Module 2 Asset Security/Lesson 18 Ensure Appropriate Asset Retention/002. 18.1 Asset Lifecycle - EOL.en.srt 14.9 KB
- Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/002. 31.1 Voice-over-IP (VoIP).en.srt 14.9 KB
- Module 5 Identity and Access Management (IAM)/Lesson 33 Manage Identification and Authentication of People, Devices, and Services/002. 33.1 Identity Management (IdM).en.srt 14.8 KB
- Module 1 Security and Risk Management Domain/Lesson 8 Identify, Analyze, and Prioritize Business Continuity Requirements/002. 8.1 Business Continuity Planning.en.srt 14.8 KB
- Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/003. 11.2 Threat Modeling.en.srt 14.8 KB
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/006. 29.5 Secure Network Protocols.en.srt 14.7 KB
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/005. 29.4 Secure Communications Protocols.en.srt 14.6 KB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/003. 24.2 Database Systems.en.srt 14.5 KB
- Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/002. 62.1 Source Code Flaws.en.srt 14.2 KB
- Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/004. 39.3 Code Assessment.en.srt 14.2 KB
- Module 6 Security Assessment and Testing/Lesson 40 Collect Security Process Data/004. 40.3 Continuous Monitoring.en.srt 14.2 KB
- Module 7 Security Operations/Lesson 51 Understand and Participate in Change Management Process/002. 51.1 Change Management.en.srt 14.1 KB
- Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/005. 49.4 Deception and Disruption.en.srt 14.0 KB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/006. 24.5 IoT and IIoT.en.srt 14.0 KB
- Module 6 Security Assessment and Testing/Lesson 38 Design and Validate Assessment, Test, and Audit Strategies/002. 38.1 Security Assessment Overview.en.srt 13.6 KB
- Module 5 Identity and Access Management (IAM)/Lesson 32 Control Physical and Logical Access to Assets/002. 32.1 Access Control Fundamentals.en.srt 13.5 KB
- Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/005. 31.4 Virtual Private Cloud.en.srt 13.5 KB
- Module 4 Communication and Network Security/Lesson 30 Secure Network Components/006. 30.5 Endpoint Security.en.srt 13.5 KB
- Module 8 Software Development Security/Lesson 58 Understand and Integrate Security in the Software Development Lifecycle/003. 58.2 Security Collaboration.en.srt 13.4 KB
- Module 8 Software Development Security/Lesson 60 Assess the Effectiveness of Software Security/002. 60.1 Software Security Assessment.en.srt 13.4 KB
- Module 5 Identity and Access Management (IAM)/Lesson 33 Manage Identification and Authentication of People, Devices, and Services/004. 33.3 Biometric Authentication.en.srt 13.3 KB
- Module 2 Asset Security/Lesson 15 Establish Information and Asset Handling Requirements/002. 15.1 Data and Asset Handling.en.srt 13.2 KB
- Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/004. 49.3 Adversarial Artificial Intelligence.en.srt 13.0 KB
- Module 3 Security Architecture and Engineering/Lesson 27 Apply Security Principles to Site and Facility Design/002. 27.1 Physical Security Principles.en.srt 13.0 KB
- Module 7 Security Operations/Lesson 45 Perform Configuration Management/002. 45.1 Configuration Management.en.srt 12.9 KB
- Module 9 Attaining and Maintaining Your CISSP/Lesson 63 Preparing for Your Examination/003. 63.2 Test Taking Strategies.en.srt 12.9 KB
- Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/007. 25.6 Emerging Cryptography.en.srt 12.6 KB
- Module 2 Asset Security/Lesson 19 Determine Data Security Controls and Compliance Requirements/002. 19.1 Control Baselines, Tailoring, and Scoping.en.srt 12.5 KB
- Module 3 Security Architecture and Engineering/Lesson 22 Select Controls Based Upon System Security Requirements/002. 22.1 Security Evaluation Criteria.en.srt 12.1 KB
- Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/002. 49.1 Detective and Preventative Controls.en.srt 11.9 KB
- Module 9 Attaining and Maintaining Your CISSP/Lesson 63 Preparing for Your Examination/004. 63.3 Preparing for Test Day.en.srt 11.7 KB
- Module 5 Identity and Access Management (IAM)/Lesson 37 Implement Authentication Systems/003. 37.2 FIDO and WebAuthn.en.srt 11.6 KB
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/004. 29.3 Non-IP Networking.en.srt 11.2 KB
- Module 7 Security Operations/Lesson 45 Perform Configuration Management/003. 45.2 Automated Provisioning.en.srt 10.8 KB
- Introduction/001. CISSP Introduction.en.srt 10.5 KB
- Module 9 Attaining and Maintaining Your CISSP/Lesson 63 Preparing for Your Examination/002. 63.1 Understanding the Exam Structure.en.srt 9.4 KB
- Module 9 Attaining and Maintaining Your CISSP/Lesson 64 The Certification Process/002. 64.1 What to Expect at the Testing Center.en.srt 9.3 KB
- Module 9 Attaining and Maintaining Your CISSP/Lesson 64 The Certification Process/003. 64.2 Endorsement and Continuing Education.en.srt 7.2 KB
- Module 1 Security and Risk Management Domain/001. Module introduction.en.srt 2.2 KB
- Module 7 Security Operations/001. Module introduction.en.srt 2.1 KB
- Module 4 Communication and Network Security/001. Module introduction.en.srt 1.9 KB
- Module 8 Software Development Security/001. Module introduction.en.srt 1.9 KB
- Module 3 Security Architecture and Engineering/001. Module introduction.en.srt 1.8 KB
- Module 6 Security Assessment and Testing/001. Module introduction.en.srt 1.5 KB
- Module 5 Identity and Access Management (IAM)/001. Module introduction.en.srt 1.5 KB
- Module 2 Asset Security/001. Module introduction.en.srt 1.4 KB
- Summary/001. CISSP Summary.en.srt 1.3 KB
- Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/001. Learning objectives.en.srt 1.1 KB
- Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/001. Learning objectives.en.srt 962 bytes
- Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/001. Learning objectives.en.srt 909 bytes
- Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/001. Learning objectives.en.srt 834 bytes
- Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/001. Learning objectives.en.srt 791 bytes
- Module 4 Communication and Network Security/Lesson 30 Secure Network Components/001. Learning objectives.en.srt 772 bytes
- Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/001. Learning objectives.en.srt 759 bytes
- Module 2 Asset Security/Lesson 19 Determine Data Security Controls and Compliance Requirements/001. Learning objectives.en.srt 738 bytes
- Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/001. Learning objectives.en.srt 701 bytes
- Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/001. Learning objectives.en.srt 678 bytes
- Module 5 Identity and Access Management (IAM)/Lesson 37 Implement Authentication Systems/001. Learning objectives.en.srt 665 bytes
- Module 1 Security and Risk Management Domain/Lesson 4 Determine Compliance and Other Requirements/001. Learning objectives.en.srt 662 bytes
- Module 8 Software Development Security/Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/001. Learning objectives.en.srt 658 bytes
- Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/001. Learning objectives.en.srt 634 bytes
- Module 1 Security and Risk Management Domain/Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/001. Learning objectives.en.srt 628 bytes
- Module 7 Security Operations/Lesson 47 Apply Resource Protection/001. Learning objectives.en.srt 590 bytes
- Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/001. Learning objectives.en.srt 588 bytes
- Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/001. Learning objectives.en.srt 584 bytes
- Module 7 Security Operations/Lesson 57 Address Personnel Safety and Security Concerns/001. Learning objectives.en.srt 569 bytes
- Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/001. Learning objectives.en.srt 562 bytes
- Module 1 Security and Risk Management Domain/Lesson 5 Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context/001. Learning objectives.en.srt 558 bytes
- Module 8 Software Development Security/Lesson 58 Understand and Integrate Security in the Software Development Lifecycle/001. Learning objectives.en.srt 555 bytes
- Module 1 Security and Risk Management Domain/Lesson 8 Identify, Analyze, and Prioritize Business Continuity Requirements/001. Learning objectives.en.srt 552 bytes
- Module 6 Security Assessment and Testing/Lesson 42 Conduct or Facilitate Security Audits/001. Learning objectives.en.srt 551 bytes
- Module 5 Identity and Access Management (IAM)/Lesson 35 Implement and Manage Authorization Mechanisms/001. Learning objectives.en.srt 540 bytes
- Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/001. Learning objectives.en.srt 536 bytes
- Module 5 Identity and Access Management (IAM)/Lesson 33 Manage Identification and Authentication of People, Devices, and Services/001. Learning objectives.en.srt 535 bytes
- Module 6 Security Assessment and Testing/Lesson 40 Collect Security Process Data/001. Learning objectives.en.srt 530 bytes
- Module 7 Security Operations/Lesson 51 Understand and Participate in Change Management Process/001. Learning objectives.en.srt 523 bytes
- Module 9 Attaining and Maintaining Your CISSP/Lesson 63 Preparing for Your Examination/001. Learning objectives.en.srt 523 bytes
- Module 9 Attaining and Maintaining Your CISSP/001. Module introduction.en.srt 518 bytes
- Module 3 Security Architecture and Engineering/Lesson 23 Understand Security Capabilities of Information Systems/001. Learning objectives.en.srt 509 bytes
- Module 5 Identity and Access Management (IAM)/Lesson 36 Manage the Identity and Access Provisioning Lifecycle/001. Learning objectives.en.srt 498 bytes
- Module 5 Identity and Access Management (IAM)/Lesson 32 Control Physical and Logical Access to Assets/001. Learning objectives.en.srt 479 bytes
- Module 7 Security Operations/Lesson 48 Conduct Incident Management/001. Learning objectives.en.srt 478 bytes
- Module 7 Security Operations/Lesson 44 Conduct Logging and Monitoring Activities/001. Learning objectives.en.srt 475 bytes
- Module 9 Attaining and Maintaining Your CISSP/Lesson 64 The Certification Process/001. Learning objectives.en.srt 474 bytes
- Module 3 Security Architecture and Engineering/Lesson 20 Research, Implement, and Manage Engineering Processes Using Secure Design Principles/001. Learning objectives.en.srt 472 bytes
- Module 2 Asset Security/Lesson 17 Manage Data Lifecycle/001. Learning objectives.en.srt 470 bytes
- Module 6 Security Assessment and Testing/Lesson 38 Design and Validate Assessment, Test, and Audit Strategies/001. Learning objectives.en.srt 468 bytes
- Module 7 Security Operations/Lesson 45 Perform Configuration Management/001. Learning objectives.en.srt 466 bytes
- Module 1 Security and Risk Management Domain/Lesson 7 Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines/001. Learning objectives.en.srt 460 bytes
- Module 7 Security Operations/Lesson 52 Implement Recovery Strategies/001. Learning objectives.en.srt 450 bytes
- Module 1 Security and Risk Management Domain/Lesson 6 Understand Requirements for Investigation Types/001. Learning objectives.en.srt 446 bytes
- Module 2 Asset Security/Lesson 18 Ensure Appropriate Asset Retention/001. Learning objectives.en.srt 439 bytes
- Module 1 Security and Risk Management Domain/Lesson 12 Apply Supply Chain Risk Management Concepts/001. Learning objectives.en.srt 432 bytes
- Module 7 Security Operations/Lesson 43 Understand and Comply with Investigations/001. Learning objectives.en.srt 429 bytes
- Module 2 Asset Security/Lesson 14 Identify and Classify Information and Assets/001. Learning objectives.en.srt 428 bytes
- Module 7 Security Operations/Lesson 50 Implement and Support Patch and Vulnerability Management/001. Learning objectives.en.srt 424 bytes
- Module 1 Security and Risk Management Domain/Lesson 1 Understand, Adhere to, and Promote Professional Ethics/001. Learning objectives.en.srt 422 bytes
- Module 7 Security Operations/Lesson 55 Participate in Business Continuity (BC) Planning and Exercises/001. Learning objectives.en.srt 419 bytes
- Module 3 Security Architecture and Engineering/Lesson 22 Select Controls Based Upon System Security Requirements/001. Learning objectives.en.srt 415 bytes
- Module 3 Security Architecture and Engineering/Lesson 27 Apply Security Principles to Site and Facility Design/001. Learning objectives.en.srt 415 bytes
- Module 5 Identity and Access Management (IAM)/Lesson 34 Federated Identity with a Third-party Service/001. Learning objectives.en.srt 415 bytes
- Module 3 Security Architecture and Engineering/Lesson 21 Understand the Fundamental Concepts of Security Models/001. Learning objectives.en.srt 412 bytes
- Module 8 Software Development Security/Lesson 61 Assess the Security Impact of Acquired Software/001. Learning objectives.en.srt 412 bytes
- Module 8 Software Development Security/Lesson 60 Assess the Effectiveness of Software Security/001. Learning objectives.en.srt 410 bytes
- Module 7 Security Operations/Lesson 56 Implement and Manage Physical Security/001. Learning objectives.en.srt 406 bytes
- Module 2 Asset Security/Lesson 15 Establish Information and Asset Handling Requirements/001. Learning objectives.en.srt 403 bytes
- Module 7 Security Operations/Lesson 46 Apply Foundational Security Operations Concepts/001. Learning objectives.en.srt 396 bytes
- Module 6 Security Assessment and Testing/Lesson 41 Analyze Test Output and Generate Report/001. Learning objectives.en.srt 392 bytes
- Module 1 Security and Risk Management Domain/Lesson 2 Understand and Apply Security Concepts/001. Learning objectives.en.srt 390 bytes
- Module 7 Security Operations/Lesson 54 Test Disaster Recovery Plans/001. Learning objectives.en.srt 368 bytes
- Module 7 Security Operations/Lesson 53 Implement Disaster Recovery Processes/001. Learning objectives.en.srt 365 bytes
- Module 2 Asset Security/Lesson 16 Provision Resources Securely/001. Learning objectives.en.srt 343 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.