Curriculum For This Course
Video tutorials list
-
Data Considerations (Domain 4)
Video Name Time 1. Data Considerations (OBJ 4.3) 1:00 2. Data Security (OBJ. 4.3) 4:00 3. Data Classification (OBJ. 4.3) 3:00 4. Data Types (OBJ. 4.3) 5:00 5. Data Retention (OBJ. 4.3) 7:00 6. Data Destruction (OBJ. 4.3) 3:00 7. Data Ownership (OBJ. 4.3) 6:00 8. Data Sovereignty (OBJ. 4.3) 3:00 -
Risk Management (Domain 4)
Video Name Time 1. Risk Management (OBJ 4.1) 2:00 2. Risk Strategies (OBJ. 4.1) 5:00 3. Risk Management Lifecycle (OBJ. 4.1) 12:00 4. Risk Types (OBJ. 4.1) 3:00 5. Risk Handling (OBJ. 4.1) 9:00 6. Risk Tracking (OBJ. 4.1) 5:00 7. Risk Assessment (OBJ. 4.1) 18:00 8. When Risk Management Fails (OBJ. 4.1) 4:00 -
Policies and Frameworks (Domain 4)
Video Name Time 1. Policies and Frameworks (OBJ. 4.1 & 4.3) 1:00 2. Policies (OBJ. 4.1) 12:00 3. Frameworks (OBJ. 4.1) 5:00 4. Regulations (OBJ. 4.3) 8:00 5. Standards (OBJ. 4.3) 6:00 6. Contracts and Agreements (OBJ. 4.3) 9:00 7. Legal Considerations (OBJ. 4.3) 7:00 8. Integrating Industries (OBJ. 4.3) 3:00 -
Business Continuity (Domain 4)
Video Name Time 1. Business Continuity (OBJ 4.4) 1:00 2. Business Continuity Plan (OBJ 4.4) 14:00 3. Business Impact Analysis (OBJ 4.4) 14:00 4. Privacy Impact Assessment (OBJ 4.4) 4:00 5. Incident Response Plan (OBJ 4.4) 11:00 6. Testing Plans (OBJ 4.4) 7:00 -
Risk Strategies (Domain 4)
Video Name Time 1. Risk Strategies (OBJ 4.1) 2:00 2. Asset Value (OBJ 4.1) 4:00 3. Access Control (OBJ 4.1) 6:00 4. Aggregating Risk (OBJ 4.1) 3:00 5. Scenario Planning (OBJ 4.1) 8:00 6. Security Controls (OBJ 4.1) 9:00 7. Security Solutions (OBJ 4.1) 9:00 8. Cost of a Data Breach (OBJ 4.1) 6:00 -
Vendor Risk (Domain 4)
Video Name Time 1. Vendor Risk (OBJ 4.2) 4:00 2. Business Models (OBJ 4.2) 11:00 3. Influences (OBJ 4.2) 7:00 4. Organizational Changes (OBJ 4.2) 6:00 5. Shared Responsibility Model (OBJ 4.2) 5:00 6. Viability and Support (OBJ 4.2) 11:00 7. Dependencies (OBJ 4.2) 5:00 8. Considerations (OBJ 4.2) 11:00 9. Supply Chain (OBJ 4.2) 6:00 -
Securing Networks (Domain 1)
Video Name Time 1. Securing Networks (OBJ 1.1) 7:00 2. Switches (OBJ 1.1) 7:00 3. Routers (OBJ 1.1) 8:00 4. Wireless and Mesh (OBJ 1.1) 3:00 5. Firewalls (OBJ 1.1) 12:00 6. Configuring Firewalls (OBJ 1.1) 7:00 7. Proxies (OBJ 1.1) 7:00 8. Gateways (OBJ 1.1) 5:00 9. IDS and IPS (OBJ 1.1) 6:00 10. Network Access Control (NAC) (OBJ 1.1) 3:00 11. Remote Access (OBJ 1.1) 9:00 12. Unified Communications (OBJ 1.1) 19:00 13. Cloud vs On-premise (OBJ 1.1) 5:00 14. DNSSEC (OBJ 1.1) 4:00 15. Load Balancer (OBJ 1.1) 7:00 -
Securing Architectures (Domain 1)
Video Name Time 1. Securing Architectures (OBJ 1.1) 1:00 2. Traffic Mirroring (OBJ 1.1) 4:00 3. Network Sensors (OBJ 1.1) 12:00 4. Host Sensors (OBJ 1.1) 6:00 5. Layer 2 Segmentation (OBJ 1.1) 5:00 6. Network Segmentation (OBJ 1.1) 13:00 7. Implement Network Segmentation (OBJ 1.1) 10:00 8. Server Segmentation (OBJ 1.1) 11:00 9. Zero Trust (OBJ 1.1) 7:00 10. Merging Networks (OBJ 1.1) 6:00 11. Software-Defined Networking (SDN) (OBJ 1.1) 5:00 -
Infrastructure Design (Domain 1)
Video Name Time 1. Infrastructure Design (OBJ 1.2) 1:00 2. Scalability (OBJ 1.2) 6:00 3. Resiliency Issues (OBJ 1.2) 13:00 4. Automation (OBJ 1.2) 6:00 5. Performance Design (OBJ 1.2) 6:00 6. Virtualization (OBJ 1.2) 8:00 7. Securing VMs (OBJ 1.2) 5:00 8. Containerization (OBJ 1.2) 6:00 -
Cloud and Virtualization (Domain 1)
Video Name Time 1. Cloud and Virtualization (OBJ 1.6) 1:00 2. Cloud Deployment Models (OBJ 1.6) 5:00 3. Cloud Service Models (OBJ 1.6) 5:00 4. Deployment Considerations (OBJ 1.6) 5:00 5. Provider Limitations (OBJ 1.6) 3:00 6. Extending Controls (OBJ 1.6) 5:00 7. Provision and Deprovision (OBJ 1.6) 3:00 8. Storage Models (OBJ 1.6) 5:00 9. Virtualization (OBJ 1.6) 8:00 -
Software Applications (Domain 1)
Video Name Time 1. Software Applications (OBJ 1.3) 3:00 2. Systems Development Life Cycle (OBJ 1.3) 7:00 3. Software Development Life Cycle (OBJ 1.3) 6:00 4. Development Approaches (OBJ 1.3) 11:00 5. Software Assurance (OBJ 1.3) 9:00 6. Baselins and Templates (OBJ 1.3) 7:00 7. Best Practices (OBJ 1.3) 6:00 8. Integrating Applications (OBJ 1.3) 5:00 -
Data Security (Domain 1)
Video Name Time 1. Data Security (OBJ 1.4) 4:00 2. Data Life Cycle (OBJ 1.4) 10:00 3. Data Classification (OBJ 1.4) 7:00 4. Labeling and Tagging (OBJ 1.4) 8:00 5. Deidentification (OBJ 1.4) 11:00 6. Data Encryption (OBJ 1.4) 8:00 7. Data Loss Prevention (DLP) (OBJ 1.4) 10:00 8. DLP Detection (OBJ 1.4) 7:00 9. Data Loss Detection (OBJ 1.4) 12:00 10. Auditing Files (OBJ 1.4) 4:00 -
Authentication and Authorization (Domain 1)
Video Name Time 1. Authentication and Authorization (OBJ 1.5) 2:00 2. Access Control (OBJ 1.5) 5:00 3. Credential Management (OBJ 1.5) 4:00 4. Password Policies (OBJ 1.5) 8:00 5. Implementing Password Policies (OBJ 1.5) 5:00 6. Cracking Weak Passwords (OBJ 1.5) 3:00 7. Multifactor Authentication (OBJ 1.5) 8:00 8. Authentication Protocols (OBJ 1.5) 10:00 9. Federation (OBJ 1.5) 7:00 10. Root of Trust (OBJ 1.5) 4:00 11. Attestation (OBJ 1.5) 2:00 12. Identity Proofing (OBJ 1.5) 4:00 -
Cryptography (Domain 1)
Video Name Time 1. Cryptography (OBJ 1.7) 2:00 2. Privacy and Confidentiality (OBJ 1.7) 7:00 3. Integrity and Non-repudiation (OBJ 1.7) 7:00 4. Compliance and Policy (OBJ 1.7) 4:00 5. Data States (OBJ 1.7) 7:00 6. Cryptographic Use Cases (OBJ 1.7) 6:00 7. PKI Use Cases (OBJ 1.7) 9:00 -
Emerging Technology (Domain 1)
Video Name Time 1. Emerging Technology (OBJ 1.8) 4:00 2. Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1.8) 9:00 3. Deep Learning (OBJ 1.8) 9:00 4. Big Data (OBJ 1.8) 5:00 5. Blockchain & Distributed Consensus (OBJ 1.8) 6:00 6. Passwordless Authentication (OBJ 1.8) 5:00 7. Homomorphic Encryption (OBJ 1.8) 4:00 8. Virtual/Augmented Reality (OBJ 1.8) 5:00 9. 3D Printing (OBJ 1.8) 3:00 10. Quantum Computing (OBJ 1.8) 6:00 -
Enterprise Mobility (Domain 3)
Video Name Time 1. Enterprise Mobility 3:00 2. Enterprise Mobility Management (EMM) (OBJ. 3.1) 10:00 3. WPA3 (OBJ. 3.1) 7:00 4. Connectivity Options (OBJ. 3.1) 9:00 5. Security Configurations (OBJ. 3.1) 8:00 6. DNS Protection (OBJ. 3.1) 3:00 7. Deployment Options (OBJ. 3.1) 5:00 8. Reconnaissance Concerns (OBJ. 3.1) 8:00 9. Mobile Security (OBJ. 3.1) 8:00 -
Endpoint Security Controls (Domain 3)
Video Name Time 1. Endpoint Security Controls 2:00 2. Device Hardening (OBJ. 3.2) 9:00 3. Unnecessary Services (OBJ. 3.2) 6:00 4. Patching (OBJ. 3.2) 5:00 5. Security Settings (OBJ. 3.2) 6:00 6. Mandatory Access Controls (MAC) (OBJ. 3.2) 7:00 7. Secure Boot (OBJ. 3.2) 6:00 8. Hardware Encryption (OBJ. 3.2) 5:00 9. Endpoint Protections (OBJ. 3.2) 10:00 10. Logging and Monitoring (OBJ. 3.2) 6:00 11. Configuring SIEM Agents (OBJ. 3.2) 19:00 12. Resiliency (OBJ. 3.2) 6:00 -
Cloud Technologies (Domain 3)
Video Name Time 1. Cloud Technologies 3:00 2. Business Continuity/Disaster Recovery (BC/DR) (OBJ. 3.4) 8:00 3. Cloud Encryption (OBJ. 3.4) 5:00 4. Serverless Computing (OBJ. 3.4) 9:00 5. Software-Defined Networking (SDN) (OBJ. 3.4) 5:00 6. Log Collection and Analysis (OBJ. 3.4) 4:00 7. Cloud Access Security Broker (CASB) (OBJ. 3.4) 6:00 8. Cloud Misconfigurations (OBJ. 3.4) 11:00 -
Operational Technologies (Domain 3)
Video Name Time 1. Operational Technologies 2:00 2. Embedded Systems (OBJ. 3.3) 10:00 3. ICS and SCADA (OBJ. 3.3) 9:00 4. ICS Protocols (OBJ. 3.3) 11:00 5. Industries and Sectors (OBJ. 3.3) 5:00 -
Hashing and Symmetric Algorithms (Domain 3)
Video Name Time 1. Hashing and Symmetric Algorithms 1:00 2. Hashing (OBJ. 3.6) 7:00 3. Calculating Hash Digests (OBJ. 3.6) 3:00 4. Message Authentication (OBJ. 3.6) 4:00 5. Symmetric Algorithms (OBJ. 3.6) 6:00 6. Stream Ciphers (OBJ. 3.6) 5:00 7. Block Ciphers (OBJ. 3.6) 10:00 -
Asymmetric Algorithms (Domain 3)
Video Name Time 1. Asymmetric Algorithms 2:00 2. Using Asymmetric Algortihms 9:00 3. SSL/TLS and Cipher Suites (OBJ. 3.6) 8:00 4. S/MIME and SSH (OBJ. 3.6) 7:00 5. EAP (OBJ. 3.6) 6:00 6. IPSec (OBJ. 3.6) 15:00 7. Elliptic Curve Cryptography (ECC) (OBJ. 3.6) 4:00 8. Forward Secrecy (OBJ. 3.6) 4:00 9. Authenticated Encryption with Associated Data (AEAD) (OBJ. 3.6) 2:00 10. Key Stretching (OBJ. 3.6) 5:00 -
Public Key Infrastructure (Domain 3)
Video Name Time 1. Public Key Infrastructure 3:00 2. PKI Components (OBJ. 3.5) 10:00 3. Digital Certificates (OBJ. 3.5) 8:00 4. Using Digital Certificates (OBJ. 3.5) 6:00 5. Exploring Server Certificates (OBJ. 3.5) 4:00 6. Trust Models (OBJ. 3.5) 4:00 7. Certificate Management (OBJ. 3.5) 3:00 8. Certificate Validity (CRL and OCSP) (OBJ. 3.5) 4:00 9. Protecting Web Traffic (OBJ. 3.5) 4:00 10. Troubleshooting Certificates (OBJ. 3.7) 5:00 11. Troubleshooting Keys (OBJ. 3.7) 4:00 -
Threat and Vulnerability Management
Video Name Time 1. Threat and Vulnerability Management 2:00 2. Threat Intelligence (OBJ. 2.1) 6:00 3. Threat Hunting (OBJ. 2.1) 7:00 4. Intelligence Collection (OBJ. 2.1) 11:00 5. Threat Actors (OBJ. 2.1) 9:00 6. Threat Management Frameworks (OBJ. 2.1) 13:00 7. Vulnerability Management Activities (OBJ. 2.3) 12:00 8. Security Content Automation Protocol (SCAP) (OBJ. 2.3) 7:00 -
Vulnerability Assessments (Domain 2)
Video Name Time 1. Vulnerability Assessments 2:00 2. Penetration Test (OBJ. 2.4) 5:00 3. PenTest Steps (OBJ. 2.4) 7:00 4. PenTest Requirements (OBJ. 2.4) 11:00 5. Code Analysis (OBJ. 2.4) 8:00 6. Protocol Analysis (OBJ. 2.4) 8:00 7. TCPDump (OBJ. 2.4) 8:00 8. Wireshark (OBJ. 2.4) 10:00 9. Nmap (OBJ. 2.4) 11:00 10. Analysis Utilities (OBJ. 2.4) 5:00 11. Vulnerability Scanning (OBJ. 2.4) 9:00 12. Analyzing Scan Outputs (OBJ. 2.4) 14:00 -
Risk Reduction (Domain 2)
Video Name Time 1. Risk Reduction 2:00 2. Deceptive Technologies (OBJ. 2.6) 5:00 3. Security Data Analytics (OBJ. 2.6) 8:00 4. Preventative Controls (OBJ. 2.6) 5:00 5. Application Controls (OBJ. 2.6) 10:00 6. Security Automation (OBJ. 2.6) 11:00 7. Physical Security (OBJ. 2.6) 7:00 8. Lock Picking (OBJ. 2.6) 2:00 -
Analyzing Vulnerabilities (Domain 2)
Video Name Time 1. Analyzing Vulnerabilities 1:00 2. Race Conditions (OBJ. 2.5) 5:00 3. Buffer Overflows (OBJ. 2.5) 12:00 4. Buffer Overflow Attack (OBJ. 2.6) 6:00 5. Authentication and References (OBJ. 2.5) 6:00 6. Ciphers and Certificates (OBJ. 2.5) 11:00 7. Improper Headers (OBJ. 2.5) 6:00 8. Software Composition (OBJ. 2.5) 10:00 9. Vulnerable Web Applications (OBJ. 2.5) 12:00 -
Attacking Vulnerabilities (Domain 2)
Video Name Time 1. Attacking Vulnerabilities 1:00 2. Directory Traversals (OBJ. 2.5) 10:00 3. Cross-Site Scripting (XSS) (OBJ. 2.5) 9:00 4. Cross-Site Request Forgery (CSRF) (OBJ. 2.5) 7:00 5. SQL Injections (OBJ. 2.5) 7:00 6. XML Injections (OBJ. 2.5) 6:00 7. Other Injection Attacks (OBJ. 2.5) 4:00 8. Authentication Bypass (OBJ. 2.5) 7:00 9. Web Application Vulnerabilities (OBJ. 2.5) 9:00 10. VM Attacks (OBJ. 2.5) 5:00 11. Network Attacks (OBJ. 2.5) 11:00 12. Analyzing Web Applications (OBJ. 2.5) 16:00 13. Social Engineering (OBJ. 2.5) 7:00 14. Phishing Campaigns (OBJ. 2.5) 5:00 -
Indicators of Compromise (Domain 2)
Video Name Time 1. Indicators of Compromise 2:00 2. Types of IoCs (OBJ. 2.2) 4:00 3. PCAP Files (OBJ. 2.2) 4:00 4. Conduct Packet Analysis (OBJ. 2.2) 6:00 5. NetFlow (OBJ. 2.2) 7:00 6. Logs (OBJ. 2.2) 7:00 7. IoC Notifications (OBJ. 2.2) 8:00 8. Response to IoCs (OBJ. 2.2) 5:00 9. Security Appliances (OBJ. 2.2) 16:00 -
Incident Response (Domain 2)
Video Name Time 1. Incident Response 1:00 2. Triage (OBJ. 2.7) 8:00 3. Communication Plan (OBJ. 2.7) 10:00 4. Stakeholder Management (OBJ. 2.7) 7:00 5. Incident Response Process (OBJ. 2.7) 10:00 6. Playbooks (OBJ. 2.7) 8:00 -
Digital Forensics (Domain 2)
Video Name Time 1. Digital Forensics 1:00 2. Forensic Process (OBJ. 2.8) 5:00 3. Chain of Custody (OBJ. 2.8) 7:00 4. Order of Volatility (OBJ. 2.8) 7:00 5. Forensic Analysis (OBJ. 2.8) 7:00 6. Steganography 4:00
Add Comment