CISSP, 3rd Edition

mp4   Hot:1   Size:6.11 GB   Created:2024-10-08 06:29:56   Update:2024-10-08 06:29:56  

Download link

File List

  • Module 4 Communication and Network Security/Lesson 30 Secure Network Components/004. 30.3 Security Zones and Firewalls.mp4 64 MB
    Introduction/001. CISSP Introduction.mp4 39.83 MB
    Module 1 Security and Risk Management Domain/001. Module introduction.en.srt 2.16 KB
    Module 1 Security and Risk Management Domain/001. Module introduction.mp4 9.26 MB
    Module 1 Security and Risk Management Domain/Lesson 1 Understand, Adhere to, and Promote Professional Ethics/001. Learning objectives.en.srt 422 B
    Module 1 Security and Risk Management Domain/Lesson 1 Understand, Adhere to, and Promote Professional Ethics/001. Learning objectives.mp4 2.04 MB
    Module 1 Security and Risk Management Domain/Lesson 1 Understand, Adhere to, and Promote Professional Ethics/002. 1.1 Organizational and Professional Ethics.en.srt 18.68 KB
    Module 1 Security and Risk Management Domain/Lesson 1 Understand, Adhere to, and Promote Professional Ethics/002. 1.1 Organizational and Professional Ethics.mp4 46.23 MB
    Module 1 Security and Risk Management Domain/Lesson 2 Understand and Apply Security Concepts/001. Learning objectives.en.srt 390 B
    Module 1 Security and Risk Management Domain/Lesson 2 Understand and Apply Security Concepts/001. Learning objectives.mp4 1.99 MB
    Module 1 Security and Risk Management Domain/Lesson 2 Understand and Apply Security Concepts/002. 2.1 Information Security Fundamentals.en.srt 17.03 KB
    Module 1 Security and Risk Management Domain/Lesson 2 Understand and Apply Security Concepts/002. 2.1 Information Security Fundamentals.mp4 38.18 MB
    Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/001. Learning objectives.en.srt 588 B
    Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/001. Learning objectives.mp4 2.5 MB
    Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/002. 3.1 Strategic Alignment.en.srt 15.65 KB
    Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/002. 3.1 Strategic Alignment.mp4 36.7 MB
    Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/003. 3.2 Organizational Roles and Responsibilities.en.srt 22.34 KB
    Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/003. 3.2 Organizational Roles and Responsibilities.mp4 51.04 MB
    Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/004. 3.3 Security Control Frameworks.en.srt 18.58 KB
    Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/004. 3.3 Security Control Frameworks.mp4 43.92 MB
    Module 1 Security and Risk Management Domain/Lesson 4 Determine Compliance and Other Requirements/001. Learning objectives.en.srt 662 B
    Module 1 Security and Risk Management Domain/Lesson 4 Determine Compliance and Other Requirements/001. Learning objectives.mp4 2.83 MB
    Module 1 Security and Risk Management Domain/Lesson 4 Determine Compliance and Other Requirements/002. 4.1 Regulatory and Contractual Obligations.en.srt 16.89 KB
    Module 1 Security and Risk Management Domain/Lesson 4 Determine Compliance and Other Requirements/002. 4.1 Regulatory and Contractual Obligations.mp4 41.52 MB
    Module 1 Security and Risk Management Domain/Lesson 4 Determine Compliance and Other Requirements/003. 4.2 Privacy and Data Protection.en.srt 19.01 KB
    Module 1 Security and Risk Management Domain/Lesson 4 Determine Compliance and Other Requirements/003. 4.2 Privacy and Data Protection.mp4 46.66 MB
    Module 1 Security and Risk Management Domain/Lesson 4 Determine Compliance and Other Requirements/004. Lesson 1-4 Assessment.en.srt 20.06 KB
    Module 1 Security and Risk Management Domain/Lesson 4 Determine Compliance and Other Requirements/004. Lesson 1-4 Assessment.mp4 36.09 MB
    Module 1 Security and Risk Management Domain/Lesson 5 Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context/001. Learning objectives.en.srt 558 B
    Module 1 Security and Risk Management Domain/Lesson 5 Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context/001. Learning objectives.mp4 2.5 MB
    Module 1 Security and Risk Management Domain/Lesson 5 Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context/002. 5.1 Cybercrime and Data Breaches.en.srt 17.23 KB
    Module 1 Security and Risk Management Domain/Lesson 5 Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context/002. 5.1 Cybercrime and Data Breaches.mp4 35.39 MB
    Module 1 Security and Risk Management Domain/Lesson 5 Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context/003. 5.2 Data Flow.en.srt 16.85 KB
    Module 1 Security and Risk Management Domain/Lesson 5 Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context/003. 5.2 Data Flow.mp4 42.46 MB
    Module 1 Security and Risk Management Domain/Lesson 6 Understand Requirements for Investigation Types/001. Learning objectives.en.srt 446 B
    Module 1 Security and Risk Management Domain/Lesson 6 Understand Requirements for Investigation Types/001. Learning objectives.mp4 2.03 MB
    Module 1 Security and Risk Management Domain/Lesson 6 Understand Requirements for Investigation Types/002. 6.1 Investigation Objectives and Requirements.en.srt 15.69 KB
    Module 1 Security and Risk Management Domain/Lesson 6 Understand Requirements for Investigation Types/002. 6.1 Investigation Objectives and Requirements.mp4 37.5 MB
    Module 1 Security and Risk Management Domain/Lesson 7 Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines/001. Learning objectives.en.srt 460 B
    Module 1 Security and Risk Management Domain/Lesson 7 Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines/001. Learning objectives.mp4 2.28 MB
    Module 1 Security and Risk Management Domain/Lesson 7 Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines/002. 7.1 Governance Documents.en.srt 16.58 KB
    Module 1 Security and Risk Management Domain/Lesson 7 Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines/002. 7.1 Governance Documents.mp4 36.89 MB
    Module 1 Security and Risk Management Domain/Lesson 8 Identify, Analyze, and Prioritize Business Continuity Requirements/001. Learning objectives.en.srt 552 B
    Module 1 Security and Risk Management Domain/Lesson 8 Identify, Analyze, and Prioritize Business Continuity Requirements/001. Learning objectives.mp4 2.38 MB
    Module 1 Security and Risk Management Domain/Lesson 8 Identify, Analyze, and Prioritize Business Continuity Requirements/002. 8.1 Business Continuity Planning.en.srt 14.8 KB
    Module 1 Security and Risk Management Domain/Lesson 8 Identify, Analyze, and Prioritize Business Continuity Requirements/002. 8.1 Business Continuity Planning.mp4 32.03 MB
    Module 1 Security and Risk Management Domain/Lesson 8 Identify, Analyze, and Prioritize Business Continuity Requirements/003. 8.2 Business Impact Analysis.en.srt 15.77 KB
    Module 1 Security and Risk Management Domain/Lesson 8 Identify, Analyze, and Prioritize Business Continuity Requirements/003. 8.2 Business Impact Analysis.mp4 39.84 MB
    Module 1 Security and Risk Management Domain/Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/001. Learning objectives.en.srt 628 B
    Module 1 Security and Risk Management Domain/Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/001. Learning objectives.mp4 2.96 MB
    Module 1 Security and Risk Management Domain/Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/002. 9.1 Personnel Policies and Agreements.en.srt 15.11 KB
    Module 1 Security and Risk Management Domain/Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/002. 9.1 Personnel Policies and Agreements.mp4 33.88 MB
    Module 1 Security and Risk Management Domain/Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/003. 9.2 Personnel Security Practices.en.srt 18.09 KB
    Module 1 Security and Risk Management Domain/Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/003. 9.2 Personnel Security Practices.mp4 42 MB
    Module 1 Security and Risk Management Domain/Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/004. Lesson 5-9 Assessment.en.srt 19.99 KB
    Module 1 Security and Risk Management Domain/Lesson 9 Contribute to and Enforce Personnel Security Policies and Procedures/004. Lesson 5-9 Assessment.mp4 37.97 MB
    Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/001. Learning objectives.en.srt 536 B
    Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/001. Learning objectives.mp4 2.66 MB
    Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/002. 10.1 Risk Management Concepts.en.srt 17.73 KB
    Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/002. 10.1 Risk Management Concepts.mp4 40.02 MB
    Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/003. 10.2 Risk Management Frameworks.en.srt 17.67 KB
    Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/003. 10.2 Risk Management Frameworks.mp4 41.38 MB
    Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/004. 10.3 Risk Assessment.en.srt 21.56 KB
    Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/004. 10.3 Risk Assessment.mp4 52.91 MB
    Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/005. 10.4 Controls and Countermeasures.en.srt 18.43 KB
    Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/005. 10.4 Controls and Countermeasures.mp4 40.56 MB
    Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/001. Learning objectives.en.srt 584 B
    Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/001. Learning objectives.mp4 2.77 MB
    Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/002. 11.1 Threat Actors and Attributes.en.srt 21.84 KB
    Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/002. 11.1 Threat Actors and Attributes.mp4 53.05 MB
    Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/003. 11.2 Threat Modeling.en.srt 14.78 KB
    Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/003. 11.2 Threat Modeling.mp4 34.55 MB
    Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/004. 11.3 Attack Vectors.en.srt 17.96 KB
    Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/004. 11.3 Attack Vectors.mp4 45.65 MB
    Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/005. 11.4 Threat Intelligence.en.srt 18.99 KB
    Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/005. 11.4 Threat Intelligence.mp4 41.71 MB
    Module 1 Security and Risk Management Domain/Lesson 12 Apply Supply Chain Risk Management Concepts/001. Learning objectives.en.srt 432 B
    Module 1 Security and Risk Management Domain/Lesson 12 Apply Supply Chain Risk Management Concepts/001. Learning objectives.mp4 1.85 MB
    Module 1 Security and Risk Management Domain/Lesson 12 Apply Supply Chain Risk Management Concepts/002. 12.1 Supply Chain Risk Management.en.srt 15.16 KB
    Module 1 Security and Risk Management Domain/Lesson 12 Apply Supply Chain Risk Management Concepts/002. 12.1 Supply Chain Risk Management.mp4 34.91 MB
    Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/001. Learning objectives.en.srt 759 B
    Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/001. Learning objectives.mp4 3.3 MB
    Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/002. 13.1 SETA Principles and Practices.en.srt 22.01 KB
    Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/002. 13.1 SETA Principles and Practices.mp4 49.13 MB
    Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/003. 13.2 Social Engineering.en.srt 15.81 KB
    Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/003. 13.2 Social Engineering.mp4 37.32 MB
    Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/004. Lesson 10-13 Assessment.en.srt 22.23 KB
    Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/004. Lesson 10-13 Assessment.mp4 45.66 MB
    Module 2 Asset Security/001. Module introduction.en.srt 1.37 KB
    Module 2 Asset Security/001. Module introduction.mp4 6.02 MB
    Module 2 Asset Security/Lesson 14 Identify and Classify Information and Assets/001. Learning objectives.en.srt 428 B
    Module 2 Asset Security/Lesson 14 Identify and Classify Information and Assets/001. Learning objectives.mp4 1.89 MB
    Module 2 Asset Security/Lesson 14 Identify and Classify Information and Assets/002. 14.1 Asset Classification.en.srt 17.69 KB
    Module 2 Asset Security/Lesson 14 Identify and Classify Information and Assets/002. 14.1 Asset Classification.mp4 39.23 MB
    Module 2 Asset Security/Lesson 15 Establish Information and Asset Handling Requirements/001. Learning objectives.en.srt 403 B
    Module 2 Asset Security/Lesson 15 Establish Information and Asset Handling Requirements/001. Learning objectives.mp4 1.95 MB
    Module 2 Asset Security/Lesson 15 Establish Information and Asset Handling Requirements/002. 15.1 Data and Asset Handling.en.srt 13.18 KB
    Module 2 Asset Security/Lesson 15 Establish Information and Asset Handling Requirements/002. 15.1 Data and Asset Handling.mp4 32.03 MB
    Module 2 Asset Security/Lesson 16 Provision Resources Securely/001. Learning objectives.en.srt 343 B
    Module 2 Asset Security/Lesson 16 Provision Resources Securely/001. Learning objectives.mp4 1.73 MB
    Module 2 Asset Security/Lesson 16 Provision Resources Securely/002. 16.1 Asset Management.en.srt 17.11 KB
    Module 2 Asset Security/Lesson 16 Provision Resources Securely/002. 16.1 Asset Management.mp4 40.42 MB
    Module 2 Asset Security/Lesson 17 Manage Data Lifecycle/001. Learning objectives.en.srt 470 B
    Module 2 Asset Security/Lesson 17 Manage Data Lifecycle/001. Learning objectives.mp4 2.11 MB
    Module 2 Asset Security/Lesson 17 Manage Data Lifecycle/002. 17.1 Data Collection and Retention.en.srt 19.66 KB
    Module 2 Asset Security/Lesson 17 Manage Data Lifecycle/002. 17.1 Data Collection and Retention.mp4 45.93 MB
    Module 2 Asset Security/Lesson 17 Manage Data Lifecycle/003. 17.2 Deletion and Destruction.en.srt 16.18 KB
    Module 2 Asset Security/Lesson 17 Manage Data Lifecycle/003. 17.2 Deletion and Destruction.mp4 41.31 MB
    Module 2 Asset Security/Lesson 18 Ensure Appropriate Asset Retention/001. Learning objectives.en.srt 439 B
    Module 2 Asset Security/Lesson 18 Ensure Appropriate Asset Retention/001. Learning objectives.mp4 1.9 MB
    Module 2 Asset Security/Lesson 18 Ensure Appropriate Asset Retention/002. 18.1 Asset Lifecycle - EOL.en.srt 14.87 KB
    Module 2 Asset Security/Lesson 18 Ensure Appropriate Asset Retention/002. 18.1 Asset Lifecycle - EOL.mp4 36.3 MB
    Module 2 Asset Security/Lesson 19 Determine Data Security Controls and Compliance Requirements/001. Learning objectives.en.srt 738 B
    Module 2 Asset Security/Lesson 19 Determine Data Security Controls and Compliance Requirements/001. Learning objectives.mp4 3.12 MB
    Module 2 Asset Security/Lesson 19 Determine Data Security Controls and Compliance Requirements/002. 19.1 Control Baselines, Tailoring, and Scoping.en.srt 12.48 KB
    Module 2 Asset Security/Lesson 19 Determine Data Security Controls and Compliance Requirements/002. 19.1 Control Baselines, Tailoring, and Scoping.mp4 28.94 MB
    Module 2 Asset Security/Lesson 19 Determine Data Security Controls and Compliance Requirements/003. 19.2 Data Protection Methods.en.srt 15.05 KB
    Module 2 Asset Security/Lesson 19 Determine Data Security Controls and Compliance Requirements/003. 19.2 Data Protection Methods.mp4 34.77 MB
    Module 2 Asset Security/Lesson 19 Determine Data Security Controls and Compliance Requirements/004. Lesson 14-19 Assessment.en.srt 25.12 KB
    Module 2 Asset Security/Lesson 19 Determine Data Security Controls and Compliance Requirements/004. Lesson 14-19 Assessment.mp4 45.71 MB
    Module 3 Security Architecture and Engineering/001. Module introduction.en.srt 1.82 KB
    Module 3 Security Architecture and Engineering/001. Module introduction.mp4 7.96 MB
    Module 3 Security Architecture and Engineering/Lesson 20 Research, Implement, and Manage Engineering Processes Using Secure Design Principles/001. Learning objectives.en.srt 472 B
    Module 3 Security Architecture and Engineering/Lesson 20 Research, Implement, and Manage Engineering Processes Using Secure Design Principles/001. Learning objectives.mp4 2.06 MB
    Module 3 Security Architecture and Engineering/Lesson 20 Research, Implement, and Manage Engineering Processes Using Secure Design Principles/002. 20.1 Secure Design Principles.en.srt 18.18 KB
    Module 3 Security Architecture and Engineering/Lesson 20 Research, Implement, and Manage Engineering Processes Using Secure Design Principles/002. 20.1 Secure Design Principles.mp4 44.76 MB
    Module 3 Security Architecture and Engineering/Lesson 21 Understand the Fundamental Concepts of Security Models/001. Learning objectives.en.srt 412 B
    Module 3 Security Architecture and Engineering/Lesson 21 Understand the Fundamental Concepts of Security Models/001. Learning objectives.mp4 1.94 MB
    Module 3 Security Architecture and Engineering/Lesson 21 Understand the Fundamental Concepts of Security Models/002. 21.1 Information Security Models.en.srt 18.68 KB
    Module 3 Security Architecture and Engineering/Lesson 21 Understand the Fundamental Concepts of Security Models/002. 21.1 Information Security Models.mp4 43.66 MB
    Module 3 Security Architecture and Engineering/Lesson 22 Select Controls Based Upon System Security Requirements/001. Learning objectives.en.srt 415 B
    Module 3 Security Architecture and Engineering/Lesson 22 Select Controls Based Upon System Security Requirements/001. Learning objectives.mp4 1.98 MB
    Module 3 Security Architecture and Engineering/Lesson 22 Select Controls Based Upon System Security Requirements/002. 22.1 Security Evaluation Criteria.en.srt 12.09 KB
    Module 3 Security Architecture and Engineering/Lesson 22 Select Controls Based Upon System Security Requirements/002. 22.1 Security Evaluation Criteria.mp4 30.33 MB
    Module 3 Security Architecture and Engineering/Lesson 23 Understand Security Capabilities of Information Systems/001. Learning objectives.en.srt 509 B
    Module 3 Security Architecture and Engineering/Lesson 23 Understand Security Capabilities of Information Systems/001. Learning objectives.mp4 2.63 MB
    Module 3 Security Architecture and Engineering/Lesson 23 Understand Security Capabilities of Information Systems/002. 23.1 Information Systems Security Capabilities.en.srt 20.73 KB
    Module 3 Security Architecture and Engineering/Lesson 23 Understand Security Capabilities of Information Systems/002. 23.1 Information Systems Security Capabilities.mp4 47.05 MB
    Module 3 Security Architecture and Engineering/Lesson 23 Understand Security Capabilities of Information Systems/003. Lesson 20-23 Assessment.en.srt 19 KB
    Module 3 Security Architecture and Engineering/Lesson 23 Understand Security Capabilities of Information Systems/003. Lesson 20-23 Assessment.mp4 36.07 MB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/001. Learning objectives.en.srt 1.09 KB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/001. Learning objectives.mp4 5.24 MB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/002. 24.1 Traditional Systems Architectures.en.srt 15.36 KB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/002. 24.1 Traditional Systems Architectures.mp4 34.65 MB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/003. 24.2 Database Systems.en.srt 14.49 KB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/003. 24.2 Database Systems.mp4 36.23 MB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/004. 24.3 Cloud-based Systems.en.srt 24.17 KB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/004. 24.3 Cloud-based Systems.mp4 60.22 MB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/005. 24.4 Embedded Systems.en.srt 15.48 KB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/005. 24.4 Embedded Systems.mp4 36.58 MB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/006. 24.5 IoT and IIoT.en.srt 13.96 KB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/006. 24.5 IoT and IIoT.mp4 32.84 MB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/007. 24.6 Virtualized Systems.en.srt 17.1 KB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/007. 24.6 Virtualized Systems.mp4 41.11 MB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/008. 24.7 Automation and Solution Elements.en.srt 16.72 KB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/008. 24.7 Automation and Solution Elements.mp4 43.1 MB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/009. Lesson 24 Assessment.en.srt 23.38 KB
    Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/009. Lesson 24 Assessment.mp4 46.53 MB
    Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/001. Learning objectives.en.srt 962 B
    Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/001. Learning objectives.mp4 4.61 MB
    Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/002. 25.1 Ciphers and Keys.en.srt 18.58 KB
    Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/002. 25.1 Ciphers and Keys.mp4 46.33 MB
    Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/003. 25.2 Symmetric Encryption.en.srt 19.05 KB
    Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/003. 25.2 Symmetric Encryption.mp4 45.06 MB
    Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/004. 25.3 Asymmetric Encryption.en.srt 20.68 KB
    Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/004. 25.3 Asymmetric Encryption.mp4 42.86 MB
    Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/005. 25.4 Hashing and Digital Signatures.en.srt 20.91 KB
    Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/005. 25.4 Hashing and Digital Signatures.mp4 44.87 MB
    Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/006. 25.5 PKI and Digital Certificates.en.srt 20.36 KB
    Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/006. 25.5 PKI and Digital Certificates.mp4 43.85 MB
    Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/007. 25.6 Emerging Cryptography.en.srt 12.61 KB
    Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/007. 25.6 Emerging Cryptography.mp4 28.03 MB
    Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/001. Learning objectives.en.srt 701 B
    Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/001. Learning objectives.mp4 3.5 MB
    Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/002. 26.1 Cryptographic Attacks.en.srt 16.27 KB
    Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/002. 26.1 Cryptographic Attacks.mp4 40.59 MB
    Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/003. 26.2 Hash and Kerberos Post-Exploitation Attacks.en.srt 16.14 KB
    Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/003. 26.2 Hash and Kerberos Post-Exploitation Attacks.mp4 38.57 MB
    Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/004. 26.3 Ransomware.en.srt 15.33 KB
    Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/004. 26.3 Ransomware.mp4 38.19 MB
    Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/005. Lesson 25-26 Assessment.en.srt 21.87 KB
    Module 3 Security Architecture and Engineering/Lesson 26 Understand Methods of Cryptanalytic Attacks/005. Lesson 25-26 Assessment.mp4 40.31 MB
    Module 3 Security Architecture and Engineering/Lesson 27 Apply Security Principles to Site and Facility Design/001. Learning objectives.en.srt 415 B
    Module 3 Security Architecture and Engineering/Lesson 27 Apply Security Principles to Site and Facility Design/001. Learning objectives.mp4 1.98 MB
    Module 3 Security Architecture and Engineering/Lesson 27 Apply Security Principles to Site and Facility Design/002. 27.1 Physical Security Principles.en.srt 13.03 KB
    Module 3 Security Architecture and Engineering/Lesson 27 Apply Security Principles to Site and Facility Design/002. 27.1 Physical Security Principles.mp4 27.9 MB
    Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/001. Learning objectives.en.srt 678 B
    Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/001. Learning objectives.mp4 2.92 MB
    Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/002. 28.1 Site and Building Security.en.srt 17.11 KB
    Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/002. 28.1 Site and Building Security.mp4 44.34 MB
    Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/003. 28.2 Environmental Impact.en.srt 16.48 KB
    Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/003. 28.2 Environmental Impact.mp4 43.66 MB
    Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/004. Lesson 27-28 Assessment.en.srt 21.38 KB
    Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/004. Lesson 27-28 Assessment.mp4 37.68 MB
    Module 4 Communication and Network Security/001. Module introduction.en.srt 1.94 KB
    Module 4 Communication and Network Security/001. Module introduction.mp4 7.58 MB
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/001. Learning objectives.en.srt 909 B
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/001. Learning objectives.mp4 4.49 MB
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/002. 29.1 Network Models.en.srt 24.88 KB
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/002. 29.1 Network Models.mp4 56.19 MB
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/003. 29.2 IP Networking.en.srt 19.04 KB
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/003. 29.2 IP Networking.mp4 46.41 MB
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/004. 29.3 Non-IP Networking.en.srt 11.23 KB
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/004. 29.3 Non-IP Networking.mp4 26.6 MB
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/005. 29.4 Secure Communications Protocols.en.srt 14.63 KB
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/005. 29.4 Secure Communications Protocols.mp4 37.34 MB
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/006. 29.5 Secure Network Protocols.en.srt 14.68 KB
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/006. 29.5 Secure Network Protocols.mp4 34.16 MB
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/007. 29.6 Micro-segmentation.en.srt 15.32 KB
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/007. 29.6 Micro-segmentation.mp4 39.02 MB
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/008. 29.7 Wireless Architecture.en.srt 19.18 KB
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/008. 29.7 Wireless Architecture.mp4 49.87 MB
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/009. Lesson 29 Assessment.en.srt 17.91 KB
    Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/009. Lesson 29 Assessment.mp4 39.09 MB
    Module 4 Communication and Network Security/Lesson 30 Secure Network Components/001. Learning objectives.en.srt 772 B
    Module 4 Communication and Network Security/Lesson 30 Secure Network Components/001. Learning objectives.mp4 3.62 MB
    Module 4 Communication and Network Security/Lesson 30 Secure Network Components/002. 30.1 Wired Transmission.en.srt 15.43 KB
    Module 4 Communication and Network Security/Lesson 30 Secure Network Components/002. 30.1 Wired Transmission.mp4 36.26 MB
    Module 4 Communication and Network Security/Lesson 30 Secure Network Components/003. 30.2 Wireless (Wi-Fi) Transmission.en.srt 15.68 KB
    Module 4 Communication and Network Security/Lesson 30 Secure Network Components/003. 30.2 Wireless (Wi-Fi) Transmission.mp4 40.16 MB
    Module 4 Communication and Network Security/Lesson 30 Secure Network Components/004. 30.3 Security Zones and Firewalls.en.srt 25.07 KB
    Introduction/001. CISSP Introduction.en.srt 10.53 KB
    Module 4 Communication and Network Security/Lesson 30 Secure Network Components/005. 30.4 Network Access Control.en.srt 19.73 KB
    Module 4 Communication and Network Security/Lesson 30 Secure Network Components/005. 30.4 Network Access Control.mp4 45.07 MB
    Module 4 Communication and Network Security/Lesson 30 Secure Network Components/006. 30.5 Endpoint Security.en.srt 13.45 KB
    Module 4 Communication and Network Security/Lesson 30 Secure Network Components/006. 30.5 Endpoint Security.mp4 31.6 MB
    Module 4 Communication and Network Security/Lesson 30 Secure Network Components/007. Lesson 30 Assessment.en.srt 24.95 KB
    Module 4 Communication and Network Security/Lesson 30 Secure Network Components/007. Lesson 30 Assessment.mp4 51.61 MB
    Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/001. Learning objectives.en.srt 834 B
    Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/001. Learning objectives.mp4 3.78 MB
    Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/002. 31.1 Voice-over-IP (VoIP).en.srt 14.86 KB
    Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/002. 31.1 Voice-over-IP (VoIP).mp4 34.52 MB
    Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/003. 31.2 Multimedia Collaboration.en.srt 16.85 KB
    Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/003. 31.2 Multimedia Collaboration.mp4 39.81 MB
    Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/004. 31.3 Remote Access.en.srt 15.67 KB
    Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/004. 31.3 Remote Access.mp4 38.59 MB
    Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/005. 31.4 Virtual Private Cloud.en.srt 13.49 KB
    Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/005. 31.4 Virtual Private Cloud.mp4 30.5 MB
    Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/006. Lesson 31 Assessment.en.srt 17.48 KB
    Module 4 Communication and Network Security/Lesson 31 Implement Secure Communication Channels According to Design/006. Lesson 31 Assessment.mp4 34.81 MB
    Module 5 Identity and Access Management (IAM)/001. Module introduction.en.srt 1.51 KB
    Module 5 Identity and Access Management (IAM)/001. Module introduction.mp4 6.34 MB
    Module 5 Identity and Access Management (IAM)/Lesson 32 Control Physical and Logical Access to Assets/001. Learning objectives.en.srt 479 B
    Module 5 Identity and Access Management (IAM)/Lesson 32 Control Physical and Logical Access to Assets/001. Learning objectives.mp4 2.17 MB
    Module 5 Identity and Access Management (IAM)/Lesson 32 Control Physical and Logical Access to Assets/002. 32.1 Access Control Fundamentals.en.srt 13.54 KB
    Module 5 Identity and Access Management (IAM)/Lesson 32 Control Physical and Logical Access to Assets/002. 32.1 Access Control Fundamentals.mp4 32.45 MB
    Module 5 Identity and Access Management (IAM)/Lesson 33 Manage Identification and Authentication of People, Devices, and Services/001. Learning objectives.en.srt 535 B
    Module 5 Identity and Access Management (IAM)/Lesson 33 Manage Identification and Authentication of People, Devices, and Services/001. Learning objectives.mp4 2.92 MB
    Module 5 Identity and Access Management (IAM)/Lesson 33 Manage Identification and Authentication of People, Devices, and Services/002. 33.1 Identity Management (IdM).en.srt 14.83 KB
    Module 5 Identity and Access Management (IAM)/Lesson 33 Manage Identification and Authentication of People, Devices, and Services/002. 33.1 Identity Management (IdM).mp4 36.57 MB
    Module 5 Identity and Access Management (IAM)/Lesson 33 Manage Identification and Authentication of People, Devices, and Services/003. 33.2 Authentication Factors.en.srt 18.14 KB
    Module 5 Identity and Access Management (IAM)/Lesson 33 Manage Identification and Authentication of People, Devices, and Services/003. 33.2 Authentication Factors.mp4 40.49 MB
    Module 5 Identity and Access Management (IAM)/Lesson 33 Manage Identification and Authentication of People, Devices, and Services/004. 33.3 Biometric Authentication.en.srt 13.27 KB
    Module 5 Identity and Access Management (IAM)/Lesson 33 Manage Identification and Authentication of People, Devices, and Services/004. 33.3 Biometric Authentication.mp4 32.37 MB
    Module 5 Identity and Access Management (IAM)/Lesson 34 Federated Identity with a Third-party Service/001. Learning objectives.en.srt 415 B
    Module 5 Identity and Access Management (IAM)/Lesson 34 Federated Identity with a Third-party Service/001. Learning objectives.mp4 1.94 MB
    Module 5 Identity and Access Management (IAM)/Lesson 34 Federated Identity with a Third-party Service/002. 34.1 Federated Identity Management.en.srt 15.42 KB
    Module 5 Identity and Access Management (IAM)/Lesson 34 Federated Identity with a Third-party Service/002. 34.1 Federated Identity Management.mp4 34.27 MB
    Module 5 Identity and Access Management (IAM)/Lesson 35 Implement and Manage Authorization Mechanisms/001. Learning objectives.en.srt 540 B
    Module 5 Identity and Access Management (IAM)/Lesson 35 Implement and Manage Authorization Mechanisms/001. Learning objectives.mp4 2.37 MB
    Module 5 Identity and Access Management (IAM)/Lesson 35 Implement and Manage Authorization Mechanisms/002. 35.1 Authorization and Access Controls.en.srt 17.52 KB
    Module 5 Identity and Access Management (IAM)/Lesson 35 Implement and Manage Authorization Mechanisms/002. 35.1 Authorization and Access Controls.mp4 42.13 MB
    Module 5 Identity and Access Management (IAM)/Lesson 35 Implement and Manage Authorization Mechanisms/003. Lesson 32-35 Assessment.en.srt 23.22 KB
    Module 5 Identity and Access Management (IAM)/Lesson 35 Implement and Manage Authorization Mechanisms/003. Lesson 32-35 Assessment.mp4 46.88 MB
    Module 5 Identity and Access Management (IAM)/Lesson 36 Manage the Identity and Access Provisioning Lifecycle/001. Learning objectives.en.srt 498 B
    Module 5 Identity and Access Management (IAM)/Lesson 36 Manage the Identity and Access Provisioning Lifecycle/001. Learning objectives.mp4 2.32 MB
    Module 5 Identity and Access Management (IAM)/Lesson 36 Manage the Identity and Access Provisioning Lifecycle/002. 36.1 Identity and Access Management.en.srt 17.12 KB
    Module 5 Identity and Access Management (IAM)/Lesson 36 Manage the Identity and Access Provisioning Lifecycle/002. 36.1 Identity and Access Management.mp4 37.87 MB
    Module 5 Identity and Access Management (IAM)/Lesson 36 Manage the Identity and Access Provisioning Lifecycle/003. 36.2 Privileged Accounts.en.srt 15.67 KB
    Module 5 Identity and Access Management (IAM)/Lesson 36 Manage the Identity and Access Provisioning Lifecycle/003. 36.2 Privileged Accounts.mp4 40.13 MB
    Module 5 Identity and Access Management (IAM)/Lesson 37 Implement Authentication Systems/001. Learning objectives.en.srt 665 B
    Module 5 Identity and Access Management (IAM)/Lesson 37 Implement Authentication Systems/001. Learning objectives.mp4 2.85 MB
    Module 5 Identity and Access Management (IAM)/Lesson 37 Implement Authentication Systems/002. 37.1 Authentication Protocols.en.srt 20.98 KB
    Module 5 Identity and Access Management (IAM)/Lesson 37 Implement Authentication Systems/002. 37.1 Authentication Protocols.mp4 45.7 MB
    Module 5 Identity and Access Management (IAM)/Lesson 37 Implement Authentication Systems/003. 37.2 FIDO and WebAuthn.en.srt 11.58 KB
    Module 5 Identity and Access Management (IAM)/Lesson 37 Implement Authentication Systems/003. 37.2 FIDO and WebAuthn.mp4 24.99 MB
    Module 5 Identity and Access Management (IAM)/Lesson 37 Implement Authentication Systems/004. Lesson 36-37 Assessment.en.srt 18.19 KB
    Module 5 Identity and Access Management (IAM)/Lesson 37 Implement Authentication Systems/004. Lesson 36-37 Assessment.mp4 34.52 MB
    Module 6 Security Assessment and Testing/001. Module introduction.en.srt 1.52 KB
    Module 6 Security Assessment and Testing/001. Module introduction.mp4 5.9 MB
    Module 6 Security Assessment and Testing/Lesson 38 Design and Validate Assessment, Test, and Audit Strategies/001. Learning objectives.en.srt 468 B
    Module 6 Security Assessment and Testing/Lesson 38 Design and Validate Assessment, Test, and Audit Strategies/001. Learning objectives.mp4 2.2 MB
    Module 6 Security Assessment and Testing/Lesson 38 Design and Validate Assessment, Test, and Audit Strategies/002. 38.1 Security Assessment Overview.en.srt 13.56 KB
    Module 6 Security Assessment and Testing/Lesson 38 Design and Validate Assessment, Test, and Audit Strategies/002. 38.1 Security Assessment Overview.mp4 32.65 MB
    Module 6 Security Assessment and Testing/Lesson 38 Design and Validate Assessment, Test, and Audit Strategies/003. 38.2 Planning Engagements.en.srt 18.53 KB
    Module 6 Security Assessment and Testing/Lesson 38 Design and Validate Assessment, Test, and Audit Strategies/003. 38.2 Planning Engagements.mp4 39.24 MB
    Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/001. Learning objectives.en.srt 634 B
    Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/001. Learning objectives.mp4 2.79 MB
    Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/002. 39.1 Infrastructure Testing.en.srt 17.05 KB
    Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/002. 39.1 Infrastructure Testing.mp4 40.99 MB
    Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/003. 39.2 Penetration Testing.en.srt 17.08 KB
    Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/003. 39.2 Penetration Testing.mp4 39.52 MB
    Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/004. 39.3 Code Assessment.en.srt 14.18 KB
    Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/004. 39.3 Code Assessment.mp4 36.66 MB
    Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/005. Lesson 38-39 Assessment.en.srt 21.61 KB
    Module 6 Security Assessment and Testing/Lesson 39 Conduct Security Controls Testing/005. Lesson 38-39 Assessment.mp4 40.37 MB
    Module 6 Security Assessment and Testing/Lesson 40 Collect Security Process Data/001. Learning objectives.en.srt 530 B
    Module 6 Security Assessment and Testing/Lesson 40 Collect Security Process Data/001. Learning objectives.mp4 2.27 MB
    Module 6 Security Assessment and Testing/Lesson 40 Collect Security Process Data/002. 40.1 Management Metrics.en.srt 15.26 KB
    Module 6 Security Assessment and Testing/Lesson 40 Collect Security Process Data/002. 40.1 Management Metrics.mp4 33.42 MB
    Module 6 Security Assessment and Testing/Lesson 40 Collect Security Process Data/003. 40.2 SETA Measures and Metrics.en.srt 16.26 KB
    Module 6 Security Assessment and Testing/Lesson 40 Collect Security Process Data/003. 40.2 SETA Measures and Metrics.mp4 33.09 MB
    Module 6 Security Assessment and Testing/Lesson 40 Collect Security Process Data/004. 40.3 Continuous Monitoring.en.srt 14.15 KB
    Module 6 Security Assessment and Testing/Lesson 40 Collect Security Process Data/004. 40.3 Continuous Monitoring.mp4 34.3 MB
    Module 6 Security Assessment and Testing/Lesson 41 Analyze Test Output and Generate Report/001. Learning objectives.en.srt 392 B
    Module 6 Security Assessment and Testing/Lesson 41 Analyze Test Output and Generate Report/001. Learning objectives.mp4 1.91 MB
    Module 6 Security Assessment and Testing/Lesson 41 Analyze Test Output and Generate Report/002. 41.1 Reporting and Response.en.srt 19.26 KB
    Module 6 Security Assessment and Testing/Lesson 41 Analyze Test Output and Generate Report/002. 41.1 Reporting and Response.mp4 43.22 MB
    Module 6 Security Assessment and Testing/Lesson 42 Conduct or Facilitate Security Audits/001. Learning objectives.en.srt 551 B
    Module 6 Security Assessment and Testing/Lesson 42 Conduct or Facilitate Security Audits/001. Learning objectives.mp4 2.36 MB
    Module 6 Security Assessment and Testing/Lesson 42 Conduct or Facilitate Security Audits/002. 42.1 Security Audits.en.srt 21.01 KB
    Module 6 Security Assessment and Testing/Lesson 42 Conduct or Facilitate Security Audits/002. 42.1 Security Audits.mp4 46.86 MB
    Module 6 Security Assessment and Testing/Lesson 42 Conduct or Facilitate Security Audits/003. Lesson 40-42 Assessment.en.srt 23.04 KB
    Module 6 Security Assessment and Testing/Lesson 42 Conduct or Facilitate Security Audits/003. Lesson 40-42 Assessment.mp4 49.93 MB
    Module 7 Security Operations/001. Module introduction.en.srt 2.13 KB
    Module 7 Security Operations/001. Module introduction.mp4 8.99 MB
    Module 7 Security Operations/Lesson 43 Understand and Comply with Investigations/001. Learning objectives.en.srt 429 B
    Module 7 Security Operations/Lesson 43 Understand and Comply with Investigations/001. Learning objectives.mp4 2.01 MB
    Module 7 Security Operations/Lesson 43 Understand and Comply with Investigations/002. 43.1 Evidence Handling.en.srt 23.66 KB
    Module 7 Security Operations/Lesson 43 Understand and Comply with Investigations/002. 43.1 Evidence Handling.mp4 51.49 MB
    Module 7 Security Operations/Lesson 43 Understand and Comply with Investigations/003. 43.2 Digital Forensics.en.srt 19.49 KB
    Module 7 Security Operations/Lesson 43 Understand and Comply with Investigations/003. 43.2 Digital Forensics.mp4 47.17 MB
    Module 7 Security Operations/Lesson 44 Conduct Logging and Monitoring Activities/001. Learning objectives.en.srt 475 B
    Module 7 Security Operations/Lesson 44 Conduct Logging and Monitoring Activities/001. Learning objectives.mp4 2.16 MB
    Module 7 Security Operations/Lesson 44 Conduct Logging and Monitoring Activities/002. 44.1 Logging and Analysis.en.srt 19.2 KB
    Module 7 Security Operations/Lesson 44 Conduct Logging and Monitoring Activities/002. 44.1 Logging and Analysis.mp4 44.12 MB
    Module 7 Security Operations/Lesson 44 Conduct Logging and Monitoring Activities/003. 44.2 Detection and Response Tools.en.srt 19.92 KB
    Module 7 Security Operations/Lesson 44 Conduct Logging and Monitoring Activities/003. 44.2 Detection and Response Tools.mp4 45.69 MB
    Module 7 Security Operations/Lesson 45 Perform Configuration Management/001. Learning objectives.en.srt 466 B
    Module 7 Security Operations/Lesson 45 Perform Configuration Management/001. Learning objectives.mp4 2.03 MB
    Module 7 Security Operations/Lesson 45 Perform Configuration Management/002. 45.1 Configuration Management.en.srt 12.93 KB
    Module 7 Security Operations/Lesson 45 Perform Configuration Management/002. 45.1 Configuration Management.mp4 27.28 MB
    Module 7 Security Operations/Lesson 45 Perform Configuration Management/003. 45.2 Automated Provisioning.en.srt 10.83 KB
    Module 7 Security Operations/Lesson 45 Perform Configuration Management/003. 45.2 Automated Provisioning.mp4 25.64 MB
    Module 7 Security Operations/Lesson 46 Apply Foundational Security Operations Concepts/001. Learning objectives.en.srt 396 B
    Module 7 Security Operations/Lesson 46 Apply Foundational Security Operations Concepts/001. Learning objectives.mp4 1.83 MB
    Module 7 Security Operations/Lesson 46 Apply Foundational Security Operations Concepts/002. 46.1 Security Operations.en.srt 16.42 KB
    Module 7 Security Operations/Lesson 46 Apply Foundational Security Operations Concepts/002. 46.1 Security Operations.mp4 38.94 MB
    Module 7 Security Operations/Lesson 47 Apply Resource Protection/001. Learning objectives.en.srt 590 B
    Module 7 Security Operations/Lesson 47 Apply Resource Protection/001. Learning objectives.mp4 2.55 MB
    Module 7 Security Operations/Lesson 47 Apply Resource Protection/002. 47.1 Media Management and Protection.en.srt 17.35 KB
    Module 7 Security Operations/Lesson 47 Apply Resource Protection/002. 47.1 Media Management and Protection.mp4 40.9 MB
    Module 7 Security Operations/Lesson 47 Apply Resource Protection/003. 47.2 Mobile Device Management.en.srt 17.74 KB
    Module 7 Security Operations/Lesson 47 Apply Resource Protection/003. 47.2 Mobile Device Management.mp4 42.9 MB
    Module 7 Security Operations/Lesson 47 Apply Resource Protection/004. Lesson 43-47 Assessment.en.srt 20.3 KB
    Module 7 Security Operations/Lesson 47 Apply Resource Protection/004. Lesson 43-47 Assessment.mp4 40.59 MB
    Module 7 Security Operations/Lesson 48 Conduct Incident Management/001. Learning objectives.en.srt 478 B
    Module 7 Security Operations/Lesson 48 Conduct Incident Management/001. Learning objectives.mp4 2.01 MB
    Module 7 Security Operations/Lesson 48 Conduct Incident Management/002. 48.1 Incident Management Planning.en.srt 17.31 KB
    Module 7 Security Operations/Lesson 48 Conduct Incident Management/002. 48.1 Incident Management Planning.mp4 39.69 MB
    Module 7 Security Operations/Lesson 48 Conduct Incident Management/003. 48.2 Incident Response and Handling.en.srt 18.79 KB
    Module 7 Security Operations/Lesson 48 Conduct Incident Management/003. 48.2 Incident Response and Handling.mp4 43.85 MB
    Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/001. Learning objectives.en.srt 562 B
    Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/001. Learning objectives.mp4 3.14 MB
    Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/002. 49.1 Detective and Preventative Controls.en.srt 11.94 KB
    Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/002. 49.1 Detective and Preventative Controls.mp4 27.32 MB
    Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/003. 49.2 Anti-Malware Tools and Techniques.en.srt 18.57 KB
    Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/003. 49.2 Anti-Malware Tools and Techniques.mp4 46.7 MB
    Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/004. 49.3 Adversarial Artificial Intelligence.en.srt 13.04 KB
    Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/004. 49.3 Adversarial Artificial Intelligence.mp4 32.44 MB
    Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/005. 49.4 Deception and Disruption.en.srt 14.01 KB
    Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/005. 49.4 Deception and Disruption.mp4 30.9 MB
    Module 7 Security Operations/Lesson 50 Implement and Support Patch and Vulnerability Management/001. Learning objectives.en.srt 424 B
    Module 7 Security Operations/Lesson 50 Implement and Support Patch and Vulnerability Management/001. Learning objectives.mp4 1.94 MB
    Module 7 Security Operations/Lesson 50 Implement and Support Patch and Vulnerability Management/002. 50.1 Vulnerability and Patch Management.en.srt 21.3 KB
    Module 7 Security Operations/Lesson 50 Implement and Support Patch and Vulnerability Management/002. 50.1 Vulnerability and Patch Management.mp4 44.28 MB
    Module 7 Security Operations/Lesson 51 Understand and Participate in Change Management Process/001. Learning objectives.en.srt 523 B
    Module 7 Security Operations/Lesson 51 Understand and Participate in Change Management Process/001. Learning objectives.mp4 2.23 MB
    Module 7 Security Operations/Lesson 51 Understand and Participate in Change Management Process/002. 51.1 Change Management.en.srt 14.1 KB
    Module 7 Security Operations/Lesson 51 Understand and Participate in Change Management Process/002. 51.1 Change Management.mp4 30.56 MB
    Module 7 Security Operations/Lesson 51 Understand and Participate in Change Management Process/003. Lesson 48-51 Assessment.en.srt 24.17 KB
    Module 7 Security Operations/Lesson 51 Understand and Participate in Change Management Process/003. Lesson 48-51 Assessment.mp4 48.11 MB
    Module 7 Security Operations/Lesson 52 Implement Recovery Strategies/001. Learning objectives.en.srt 450 B
    Module 7 Security Operations/Lesson 52 Implement Recovery Strategies/001. Learning objectives.mp4 1.94 MB
    Module 7 Security Operations/Lesson 52 Implement Recovery Strategies/002. 52.1 Backup and Recovery.en.srt 18.23 KB
    Module 7 Security Operations/Lesson 52 Implement Recovery Strategies/002. 52.1 Backup and Recovery.mp4 39.67 MB
    Module 7 Security Operations/Lesson 52 Implement Recovery Strategies/003. 52.2 Resiliency.en.srt 23.58 KB
    Module 7 Security Operations/Lesson 52 Implement Recovery Strategies/003. 52.2 Resiliency.mp4 49.56 MB
    Module 7 Security Operations/Lesson 53 Implement Disaster Recovery Processes/001. Learning objectives.en.srt 365 B
    Module 7 Security Operations/Lesson 53 Implement Disaster Recovery Processes/001. Learning objectives.mp4 1.76 MB
    Module 7 Security Operations/Lesson 53 Implement Disaster Recovery Processes/002. 53.1 Disaster Response and Recovery.en.srt 17.73 KB
    Module 7 Security Operations/Lesson 53 Implement Disaster Recovery Processes/002. 53.1 Disaster Response and Recovery.mp4 39.61 MB
    Module 7 Security Operations/Lesson 54 Test Disaster Recovery Plans/001. Learning objectives.en.srt 368 B
    Module 7 Security Operations/Lesson 54 Test Disaster Recovery Plans/001. Learning objectives.mp4 1.77 MB
    Module 7 Security Operations/Lesson 54 Test Disaster Recovery Plans/002. 54.1 DRP Training and Testing.en.srt 19.76 KB
    Module 7 Security Operations/Lesson 54 Test Disaster Recovery Plans/002. 54.1 DRP Training and Testing.mp4 45.03 MB
    Module 7 Security Operations/Lesson 55 Participate in Business Continuity (BC) Planning and Exercises/001. Learning objectives.en.srt 419 B
    Module 7 Security Operations/Lesson 55 Participate in Business Continuity (BC) Planning and Exercises/001. Learning objectives.mp4 2.03 MB
    Module 7 Security Operations/Lesson 55 Participate in Business Continuity (BC) Planning and Exercises/002. 55.1 Business Continuity Integration.en.srt 16.05 KB
    Module 7 Security Operations/Lesson 55 Participate in Business Continuity (BC) Planning and Exercises/002. 55.1 Business Continuity Integration.mp4 40.38 MB
    Module 7 Security Operations/Lesson 56 Implement and Manage Physical Security/001. Learning objectives.en.srt 406 B
    Module 7 Security Operations/Lesson 56 Implement and Manage Physical Security/001. Learning objectives.mp4 1.92 MB
    Module 7 Security Operations/Lesson 56 Implement and Manage Physical Security/002. 56.1 Perimeter and Internal Security Controls.en.srt 20.26 KB
    Module 7 Security Operations/Lesson 56 Implement and Manage Physical Security/002. 56.1 Perimeter and Internal Security Controls.mp4 48.83 MB
    Module 7 Security Operations/Lesson 57 Address Personnel Safety and Security Concerns/001. Learning objectives.en.srt 569 B
    Module 7 Security Operations/Lesson 57 Address Personnel Safety and Security Concerns/001. Learning objectives.mp4 2.59 MB
    Module 7 Security Operations/Lesson 57 Address Personnel Safety and Security Concerns/002. 57.1 Workplace Safety.en.srt 16.64 KB
    Module 7 Security Operations/Lesson 57 Address Personnel Safety and Security Concerns/002. 57.1 Workplace Safety.mp4 39.66 MB
    Module 7 Security Operations/Lesson 57 Address Personnel Safety and Security Concerns/003. Lesson 52-57 Assessment.en.srt 21.67 KB
    Module 7 Security Operations/Lesson 57 Address Personnel Safety and Security Concerns/003. Lesson 52-57 Assessment.mp4 40.15 MB
    Module 8 Software Development Security/001. Module introduction.en.srt 1.93 KB
    Module 8 Software Development Security/001. Module introduction.mp4 7.42 MB
    Module 8 Software Development Security/Lesson 58 Understand and Integrate Security in the Software Development Lifecycle/001. Learning objectives.en.srt 555 B
    Module 8 Software Development Security/Lesson 58 Understand and Integrate Security in the Software Development Lifecycle/001. Learning objectives.mp4 2.42 MB
    Module 8 Software Development Security/Lesson 58 Understand and Integrate Security in the Software Development Lifecycle/002. 58.1 Software Development Lifecycle.en.srt 18.86 KB
    Module 8 Software Development Security/Lesson 58 Understand and Integrate Security in the Software Development Lifecycle/002. 58.1 Software Development Lifecycle.mp4 45.16 MB
    Module 8 Software Development Security/Lesson 58 Understand and Integrate Security in the Software Development Lifecycle/003. 58.2 Security Collaboration.en.srt 13.42 KB
    Module 8 Software Development Security/Lesson 58 Understand and Integrate Security in the Software Development Lifecycle/003. 58.2 Security Collaboration.mp4 29.83 MB
    Module 8 Software Development Security/Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/001. Learning objectives.en.srt 658 B
    Module 8 Software Development Security/Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/001. Learning objectives.mp4 2.86 MB
    Module 8 Software Development Security/Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/002. 59.1 Code, Languages, Libraries, and Tools.en.srt 15.24 KB
    Module 8 Software Development Security/Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/002. 59.1 Code, Languages, Libraries, and Tools.mp4 36.47 MB
    Module 8 Software Development Security/Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/003. 59.2 Secure Staging.en.srt 25.75 KB
    Module 8 Software Development Security/Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/003. 59.2 Secure Staging.mp4 60.13 MB
    Module 8 Software Development Security/Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/004. Lesson 58-59 Assessment.en.srt 18.06 KB
    Module 8 Software Development Security/Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/004. Lesson 58-59 Assessment.mp4 32.34 MB
    Module 8 Software Development Security/Lesson 60 Assess the Effectiveness of Software Security/001. Learning objectives.en.srt 410 B
    Module 8 Software Development Security/Lesson 60 Assess the Effectiveness of Software Security/001. Learning objectives.mp4 1.81 MB
    Module 8 Software Development Security/Lesson 60 Assess the Effectiveness of Software Security/002. 60.1 Software Security Assessment.en.srt 13.41 KB
    Module 8 Software Development Security/Lesson 60 Assess the Effectiveness of Software Security/002. 60.1 Software Security Assessment.mp4 29.73 MB
    Module 8 Software Development Security/Lesson 61 Assess the Security Impact of Acquired Software/001. Learning objectives.en.srt 412 B
    Module 8 Software Development Security/Lesson 61 Assess the Security Impact of Acquired Software/001. Learning objectives.mp4 1.93 MB
    Module 8 Software Development Security/Lesson 61 Assess the Security Impact of Acquired Software/002. 61.1 Software Procurement and Acquisition.en.srt 17.71 KB
    Module 8 Software Development Security/Lesson 61 Assess the Security Impact of Acquired Software/002. 61.1 Software Procurement and Acquisition.mp4 37.13 MB
    Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/001. Learning objectives.en.srt 791 B
    Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/001. Learning objectives.mp4 3.5 MB
    Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/002. 62.1 Source Code Flaws.en.srt 14.25 KB
    Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/002. 62.1 Source Code Flaws.mp4 33.8 MB
    Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/003. 62.2 Input and Output Validation.en.srt 25.37 KB
    Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/003. 62.2 Input and Output Validation.mp4 57.26 MB
    Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/004. 62.3 Secure Coding Practices.en.srt 15.98 KB
    Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/004. 62.3 Secure Coding Practices.mp4 36.15 MB
    Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/005. Lesson 60-62 Assessment.en.srt 20.1 KB
    Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/005. Lesson 60-62 Assessment.mp4 39.8 MB
    Module 9 Attaining and Maintaining Your CISSP/001. Module introduction.en.srt 518 B
    Module 9 Attaining and Maintaining Your CISSP/001. Module introduction.mp4 2.37 MB
    Module 9 Attaining and Maintaining Your CISSP/Lesson 63 Preparing for Your Examination/001. Learning objectives.en.srt 523 B
    Module 9 Attaining and Maintaining Your CISSP/Lesson 63 Preparing for Your Examination/001. Learning objectives.mp4 2.33 MB
    Module 9 Attaining and Maintaining Your CISSP/Lesson 63 Preparing for Your Examination/002. 63.1 Understanding the Exam Structure.en.srt 9.41 KB
    Module 9 Attaining and Maintaining Your CISSP/Lesson 63 Preparing for Your Examination/002. 63.1 Understanding the Exam Structure.mp4 25.86 MB
    Module 9 Attaining and Maintaining Your CISSP/Lesson 63 Preparing for Your Examination/003. 63.2 Test Taking Strategies.en.srt 12.9 KB
    Module 9 Attaining and Maintaining Your CISSP/Lesson 63 Preparing for Your Examination/003. 63.2 Test Taking Strategies.mp4 31.13 MB
    Module 9 Attaining and Maintaining Your CISSP/Lesson 63 Preparing for Your Examination/004. 63.3 Preparing for Test Day.en.srt 11.67 KB
    Module 9 Attaining and Maintaining Your CISSP/Lesson 63 Preparing for Your Examination/004. 63.3 Preparing for Test Day.mp4 28.97 MB
    Module 9 Attaining and Maintaining Your CISSP/Lesson 64 The Certification Process/001. Learning objectives.en.srt 474 B
    Module 9 Attaining and Maintaining Your CISSP/Lesson 64 The Certification Process/001. Learning objectives.mp4 2.2 MB
    Module 9 Attaining and Maintaining Your CISSP/Lesson 64 The Certification Process/002. 64.1 What to Expect at the Testing Center.en.srt 9.27 KB
    Module 9 Attaining and Maintaining Your CISSP/Lesson 64 The Certification Process/002. 64.1 What to Expect at the Testing Center.mp4 23.38 MB
    Module 9 Attaining and Maintaining Your CISSP/Lesson 64 The Certification Process/003. 64.2 Endorsement and Continuing Education.en.srt 7.15 KB
    Module 9 Attaining and Maintaining Your CISSP/Lesson 64 The Certification Process/003. 64.2 Endorsement and Continuing Education.mp4 19.07 MB
    Summary/001. CISSP Summary.en.srt 1.27 KB
    Summary/001. CISSP Summary.mp4 6.66 MB

Download Info

  • Tips

    “CISSP, 3rd Edition” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.