-
Security and Risk Management
32 Lessons-
Start8. Introduction to Security and Risk Management
-
Start9. Important Definitions
-
Start10. Important Definitions 2
-
Start11. Governance Requirements
-
Start12. Due Care and Due Diligence
-
Start13. Question
-
Start14. Compliance
-
Start15. Important Document
-
Start16. Ethics
-
Start18. Security Document 2
-
Start19.Security Document Types
-
Start20. Policy Sample
-
Start21. The Relationship Between Security Document Types
-
Start22. Risk Management
-
Start23. Risk Management Part 2
-
Start24. Asset Evaluation
-
Start25. Exam Question
-
Start26. Rsa Archer
-
Start27. ARIS GRC
-
Start28. Business Continuity Plans
-
Start29. Business Continuity Plans - BCP
-
Start30. Business Impact Analysis- BIA
-
Start31. MTD - RTO- RPO
-
Start32. Disaster Recovery Plan -DRP
-
Start33. Alternatives Sites
-
Start34. Exam Quiz
-
Start35. The Need of Personnel Security
-
Start36. Employment Policies
-
Start37. Employment Policies -Part 2
-
Start38. Termination
-
Start39. Security Awareness
-
StartDomain Evaluation 2
-
-
Asset Security
12 Lessons-
Start40. Introduction to Asset Security
-
Start41. Asset Management
-
Start42. Information Asset List
-
Start43. Classification
-
Start44. Labeling
-
Start45. DLP
-
Start46. DLP - Data Classification
-
Start47. Klassify - Data Labeling 2
-
Start48. Privacy
-
Start49. Retention
-
Start50. Data Security Control
-
StartDomain Evaluation 2
-
-
Security Architecture and Engineering
26 Lessons-
Start51. Introduction to Security Architecture and Engineering
-
Start52. Security Engineering Lifecycle
-
Start53. NISP SP 14-27
-
Start54. Trusted Computing Base
-
Start54.1 TCB Vulnerability
-
Start55. Security Models
-
Start56. TCSEC
-
Start57. ITSEC
-
Start58. Security Architecture Questions
-
Start59. Enterprise Security Architecture
-
Start60. Virtualization
-
Start61. Fault Tolerance
-
Start62. Server Fault Tolerance Techniques
-
Start63. New Technology
-
Start64. Spoofing Number
-
Start65. Spoofing Email
-
Start66. Cryptography
-
Start67. Alternative Ciphers
-
Start68. Symmetric Encryption
-
Start69. Asymmetric Encryption
-
Start70. Hash
-
Start71. Physical Security
-
Start72. Physical Access barriers
-
Start73. Power Issue
-
Start74. Fire
-
StartDomain Evaluation 2
-
-
Communications and Network Security
12 Lessons-
Start75. The OSI Model
-
Start76. TCP-IP Model
-
Start77. Network Architecture Components
-
Start78. Firewall
-
Start79. Network Types and Topolgies
-
Start80. Remote Access Technology
-
Start81. Wireless Network
-
Start82. Network Attacks
-
Start83. Remote Access Security Mechanisms
-
Start84. RAID
-
Start85. Backup
-
Start86. Network Questions
-
-
Identity and Access Management
10 Lessons-
Start87. Access Control
-
Start88. Authorization
-
Start89. Authentication
-
Start90. Single Sign on SSO
-
Start91. Central Administration (RADUIS)
-
Start92. Access Control Attack
-
Start93. Instrusion Detection System (IDS)
-
Start94. Access Control Inportant exam area
-
Start95. Access Control Questions
-
StartDomain Evaluation 2
-
-
Cloud Security
12 Lessons-
Start96. Introduction to Cloud Security
-
Start97. NIST 800-145
-
Start98. IaaS vs PaaS vs SaaS
-
Start99. SaaS
-
Start100. PaaS
-
Start101. IaaS
-
Start102. Storage Architecture
-
Start103. Data Life Cycle Security
-
Start104. Hypervisor
-
Start105. Virtualization Security
-
Start106. Perimeter Security
-
StartDomain Evaluation 2
-
-
Security Assessment and Testing
20 Lessons-
Start107. Introduction Security Assessment and Testing
-
Start108. Test Output
-
Start109. Vulnerability asessment - Part 1
-
Start110. Vulnerability asessment -Part 2
-
Start112. Nessus VA
-
Start113. Nessus VA- Part 2
-
Start114. Nessus VA Report
-
Start115. OWASP ZAP - VA
-
Start116. Nexpose VA
-
Start117. Penetration testing
-
Start118. Reconnaissance Demo -Maltego 2
-
Start119. Scanning Demo -Zenmap
-
Start120. Exploitation Demo -MetaSploit 2
-
Start121. Event Log Review 2
-
Start122. NIST 800-92
-
Start123. SIEM Solution
-
Start124. SIEM Solution Demo - Qradar
-
Start125. Code Review
-
Start126. Security KPI's
-
StartDomain Evaluation 2
-
-
Software Development Security
9 Lessons


