Curriculum For This Course
Video tutorials list
-
Preparing for (ISC) Certification Course
Video Name Time 1. Course Introduction 2:00 2. (ISC)? Exam Overview 2:00 3. Virtual Machine 4:00 4. Lab Setup 5:00 -
Access Controls: Part 1
Video Name Time 1. Section Objectives 1:00 2. AAA and Authentication Factors 2:00 3. Trust Relations and Architecture 2:00 4. Subject-Based versus Object-Based 2:00 5. MAC versus DAC 2:00 6. Role–Based and Attribute–Based 2:00 7. Management Lifecycle 3:00 -
Access Controls: Part 2
Video Name Time 1. Section Objectives 1:00 2. IEEE 802.1X and Mac Security 3:00 3. RADIUS and TACACS+ 2:00 4. NAC and RAT 2:00 5. IPSec and SSL/TLS VPN 2:00 -
Security Operations and Administration
Video Name Time 1. Section Objective 1:00 2. Asset Management and Change Management 3:00 3. Configuration Management and Impact Management 3:00 4. Security Training and Physical Security Operations 3:00 5. AUP Policy Enforcement 4:00 -
Security Policy and Terminologies
Video Name Time 1. Section Objectives 1:00 2. Threat, Risk, and Vulnerability 17:00 3. Compromise Indicators 3:00 4. Security Triad 2:00 5. Written Security Policy 3:00 6. Countermeasure and Mitigation 3:00 -
Risk Identification, Monitoring, and Analysis: Part 1
Video Name Time 1. Section Objectives 1:00 2. Risk Management and Assessment 7:00 3. Qualitative Risk Management 2:00 4. Quantitative Risk Management 2:00 5. Risk Visibility 2:00 6. Reporting 3:00 7. Auditing 3:00 -
Risk Identification, Monitoring, and Analysis: Part 2
Video Name Time 1. Section Objectives 1:00 2. Regular Monitoring Importance 4:00 3. Syslog 2:00 4. SNMP and NetFlow 2:00 5. Security Analytics, Metrices, and Trends 2:00 6. Visualization 2:00 7. Data Analysis 2:00 8. Communicating Findings 3:00 -
Incident Response and Recovery
Video Name Time 1. Section Objectives 1:00 2. Incident Handling Lifecycle 3:00 3. Forensics Investigations 5:00 4. BCP and DRP 2:00 5. Emergency Response 1:00 6. Restoration 2:00 7. Testing and Drills 3:00 -
Overview of Cryptography
Video Name Time 1. Section Objectives 1:00 2. Cryptography Basics 5:00 3. Cipher and Types 6:00 4. Identify Algorithm 4:00 5. Encryption and Types 7:00 6. Hashing 6:00 -
Beyond the Basics of Cryptography
Video Name Time 1. Section Objectives 1:00 2. Key Management 5:00 3. Digital Signatures 2:00 4. PKI and Components 3:00 5. Expiration and Suspension 2:00 6. Cryptography Attacks 7:00 7. Mitigation 3:00 -
Networks and Communications Security: Protocols and Services
Video Name Time 1. Section Objectives 1:00 2. OSI and TCP/IP Model 1:00 3. Physical and Logical Topologies 3:00 4. Layer 2-4 2:00 5. Layer 5-7 3:00 -
Networks and Communications Security: Security Devices
Video Name Time 1. Section Objectives 1:00 2. Routers 2:00 3. Switches 2:00 4. Firewall 6:00 5. Proxies 6:00 6. IDS and IPS 4:00 7. VPNs 7:00 -
Networks and Communications Security: Device Protection
Video Name Time 1. Section Objectives 1:00 2. Device Hardening 9:00 3. Security Controls and Types 2:00 4. Segmentation and Zoning 2:00 5. Device Protection Best Practices 3:00 -
System and Application Security: Identify Malware Threats
Video Name Time 1. Section Objectives 1:00 2. Virus, Worm, and Trojan 10:00 3. Ransomwares and Crypters 3:00 4. Spyware, Backdoor, and Logic Bombs 4:00 5. Identify Malicious Systems 7:00 6. Attack Tools and Kits 5:00 7. Malware Attack Countermeasure 6:00 -
System and Application Security: Secure Practices
Video Name Time 1. Section Objectives 1:00 2. Application Security Basics 16:00 3. Data Storage Security 13:00 4. Third Party Outsourcing 2:00 5. Virtualization Security 1:00 6. Cloud Computing Security 2:00 7. Big Data Security 2:00 8. Legal Concerns 2:00
Add Comment