Archived
files |
Pearson CISSP, Second Edition\01.Introduction\0101.CISSP Introduction.mp4
[825d898031a0a270]
|
53,302,163 |
6D0FC78F |
Pearson CISSP, Second Edition\02. Domain 1 Security and Risk Management\0201.Module introduction.mp4
[ca753a785efbfb30]
|
10,265,492 |
8C7A96EA |
Pearson CISSP, Second Edition\03. Understand and Apply Concepts of Confidentiality, Integrity and Availability\0301.Learning objectives.mp4
[f919e16c6f83aab7]
|
2,635,552 |
D10422AD |
Pearson CISSP, Second Edition\03. Understand and Apply Concepts of Confidentiality, Integrity and Availability\0302.Information Security Fundamentals.mp4
[7045403c7a7096da]
|
116,107,713 |
C70AD0F0 |
Pearson CISSP, Second Edition\04. Evaluate and Apply Security Governance Principles\0401.Learning objectives.mp4
[f94d26de6464f147]
|
2,978,226 |
8A4CBE29 |
Pearson CISSP, Second Edition\04. Evaluate and Apply Security Governance Principles\0402.Frameworks, Benchmarks, and Guidelines.mp4
[9225917c48cec4d3]
|
125,786,402 |
05693102 |
Pearson CISSP, Second Edition\04. Evaluate and Apply Security Governance Principles\0403.Leadership Roles and Responsibilities.mp4
[b3e7caa6f2a4e2d2]
|
194,863,044 |
0FF33BE5 |
Pearson CISSP, Second Edition\05. Determine Compliance Requirements\0501.Learning objectives.mp4
[fe2cb91435bba3bc]
|
2,917,565 |
03EDFBE9 |
Pearson CISSP, Second Edition\05. Determine Compliance Requirements\0502.Regulatory and Contractual Obligations.mp4
[49d25a60265b6e23]
|
104,240,228 |
2452E1D8 |
Pearson CISSP, Second Edition\05. Determine Compliance Requirements\0503.Privacy and Data Protection.mp4
[7257627556141c88]
|
88,358,266 |
01563601 |
Pearson CISSP, Second Edition\06. Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context\0601.Learning objectives.mp4
[8ad13a4903fda4d8]
|
4,792,917 |
528F0689 |
Pearson CISSP, Second Edition\06. Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context\0602.Cybercrime and Data Breaches.mp4
[475d05ddc9d256ec]
|
103,291,257 |
53FF6A2B |
Pearson CISSP, Second Edition\06. Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context\0603.Licensing and Intellectual Property Law.mp4
[4aac279111d3c63e]
|
86,535,546 |
196C6BDF |
Pearson CISSP, Second Edition\06. Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context\0604.Lesson 1-4 Assessment.mp4
[fd2f149d1bae04bd]
|
68,656,766 |
9156E174 |
Pearson CISSP, Second Edition\07. Understand, Adhere to and Promote Professional Ethics\0701.Learning objectives.mp4
[d2afdb7093681c08]
|
2,734,344 |
4EB2B180 |
Pearson CISSP, Second Edition\07. Understand, Adhere to and Promote Professional Ethics\0702.Organizational and Professional Ethics.mp4
[352e2c9e3b837cdf]
|
48,151,911 |
E797E2D8 |
Pearson CISSP, Second Edition\08. Develop, Document and Implement Security Policy, Standards, Procedures and Guidelines\0801.Learning objectives.mp4
[5065f5b99722c49b]
|
3,088,061 |
E887EEC7 |
Pearson CISSP, Second Edition\08. Develop, Document and Implement Security Policy, Standards, Procedures and Guidelines\0802.Information Security Policy.mp4
[651ec10891e7d14e]
|
95,749,252 |
95ADDBC2 |
Pearson CISSP, Second Edition\09. Identify, Analyze, and Prioritize Business Continuity (BC) Requirements\0901.Learning objectives.mp4
[1efe73eeb04d6554]
|
3,293,242 |
22367284 |
Pearson CISSP, Second Edition\09. Identify, Analyze, and Prioritize Business Continuity (BC) Requirements\0902.Business Continuity Planning.mp4
[64c52d597021ba7d]
|
63,102,015 |
7A33DE05 |
Pearson CISSP, Second Edition\09. Identify, Analyze, and Prioritize Business Continuity (BC) Requirements\0903.Business Impact Analysis.mp4
[8f6f0920dff5ba78]
|
94,723,278 |
CDF12ED5 |
Pearson CISSP, Second Edition\10. Contribute to and Enforce Personnel Security Policies and Procedures\1001.Learning objectives.mp4
[2bfb7a05c8b7cecb]
|
3,165,924 |
5E29A58B |
Pearson CISSP, Second Edition\10. Contribute to and Enforce Personnel Security Policies and Procedures\1002.Personnel Policies and Agreements.mp4
[8eea60abd5498e97]
|
144,661,581 |
23BBCC36 |
Pearson CISSP, Second Edition\10. Contribute to and Enforce Personnel Security Policies and Procedures\1003.Lesson 5-8 Assessment.mp4
[5f78a0aca4814b70]
|
66,894,630 |
70ADCAF9 |
Pearson CISSP, Second Edition\11. Understand and Apply Risk Management Concepts\1101.Learning objectives.mp4
[c25ef81c22ede0fb]
|
3,531,959 |
1F03E913 |
Pearson CISSP, Second Edition\11. Understand and Apply Risk Management Concepts\1102.Risk Management Concepts.mp4
[431f5a6e10788f73]
|
130,665,562 |
4752F9CE |
Pearson CISSP, Second Edition\11. Understand and Apply Risk Management Concepts\1103.Risk Assessment.mp4
[51206e99151d384]
|
127,314,544 |
C1EE2CB9 |
Pearson CISSP, Second Edition\11. Understand and Apply Risk Management Concepts\1104.Countermeasure Selection.mp4
[1bd94531faf1975f]
|
121,825,082 |
E1F5C257 |
Pearson CISSP, Second Edition\12. Understand and Apply Threat Modeling Concepts and Methodologies\1201.Learning objectives.mp4
[8ea7093a634ffadf]
|
2,644,797 |
F46330E4 |
Pearson CISSP, Second Edition\12. Understand and Apply Threat Modeling Concepts and Methodologies\1202.Threat Modeling.mp4
[63ef5fc9ce25b4b8]
|
88,392,172 |
815230BE |
Pearson CISSP, Second Edition\12. Understand and Apply Threat Modeling Concepts and Methodologies\1203.Attack Vectors.mp4
[754b5d4f7bf38d43]
|
118,621,992 |
81F07CA6 |
Pearson CISSP, Second Edition\13. Apply Risk Management Concepts to the Supply Chain\1301.Learning objectives.mp4
[388b4dc81fe525be]
|
2,333,878 |
D7B77048 |
Pearson CISSP, Second Edition\13. Apply Risk Management Concepts to the Supply Chain\1302.Supply Chain Risk Management.mp4
[c23f4f9c7366fcda]
|
83,132,028 |
A21DF310 |
Pearson CISSP, Second Edition\14. Establish and Maintain a Security Awareness, Education, and Training Program\1401.Learning objectives.mp4
[6e3f639406057bfb]
|
4,493,533 |
9CFAA730 |
Pearson CISSP, Second Edition\14. Establish and Maintain a Security Awareness, Education, and Training Program\1402.SETA Principles and Practices.mp4
[5491fcd2dbb17eec]
|
101,444,390 |
9EFF461A |
Pearson CISSP, Second Edition\14. Establish and Maintain a Security Awareness, Education, and Training Program\1403.Social Engineering Training.mp4
[57a6f9acca4fca28]
|
93,182,837 |
138E7173 |
Pearson CISSP, Second Edition\14. Establish and Maintain a Security Awareness, Education, and Training Program\1404.Lesson 9-12 Assessment.mp4
[162d68df06b6e826]
|
72,918,801 |
16982018 |
Pearson CISSP, Second Edition\15. Domain 2 Asset Security\1501.Module introduction.mp4
[4292801dea4d482c]
|
7,038,269 |
22B2F828 |
Pearson CISSP, Second Edition\16. Identify and Classify Information and Assets\1601.Learning objectives.mp4
[48ad1a9a9e7c98b]
|
2,249,050 |
7EF0395A |
Pearson CISSP, Second Edition\16. Identify and Classify Information and Assets\1602.Classification Frameworks.mp4
[5a808b05e14854dd]
|
110,320,197 |
7692AC43 |
Pearson CISSP, Second Edition\17. Determine and Maintain Information and Asset Ownership\1701.Learning objectives.mp4
[1fde8e97ea9097cb]
|
2,298,255 |
7EF4B6F7 |
Pearson CISSP, Second Edition\17. Determine and Maintain Information and Asset Ownership\1702.Asset Ownership and Management.mp4
[2e15c428379ae302]
|
110,574,041 |
3BA99D3D |
Pearson CISSP, Second Edition\18. Protect Privacy\1801.Learning objectives.mp4
[75cac5e8f9735aae]
|
1,996,374 |
C54E7C79 |
Pearson CISSP, Second Edition\18. Protect Privacy\1802.Privacy Principles.mp4
[ec3ea100b77a3b98]
|
119,268,465 |
BCD13CFE |
Pearson CISSP, Second Edition\19. Ensure Appropriate Asset Retention\1901.Learning objectives.mp4
[dc213495aec8f4ee]
|
2,384,925 |
E67E0230 |
Pearson CISSP, Second Edition\19. Ensure Appropriate Asset Retention\1902.Data Retention and Destruction.mp4
[327e1a91a76f0f07]
|
142,848,187 |
4EBA275B |
Pearson CISSP, Second Edition\20. Determine Data Security Controls\2001.Learning objectives.mp4
[4e9d69467de7a149]
|
2,434,141 |
4CDC5181 |
Pearson CISSP, Second Edition\20. Determine Data Security Controls\2002.Data Security Standards and Selection.mp4
[61858d4648b21d5]
|
76,318,601 |
261A527D |
Pearson CISSP, Second Edition\21. Establish Information and Asset Handling Requirements\2101.Learning objectives.mp4
[4eeb64f2daeaed6]
|
3,919,261 |
33CACC0F |
Pearson CISSP, Second Edition\21. Establish Information and Asset Handling Requirements\2102.Labeling and Handling Standards.mp4
[7d0d94d9af737f30]
|
97,703,600 |
8EE94270 |
Pearson CISSP, Second Edition\21. Establish Information and Asset Handling Requirements\2103.Lesson 13-18 Assessment.mp4
[3e8f8d3bb8664b5c]
|
61,126,332 |
398643AC |
Pearson CISSP, Second Edition\22. Domain 3 Security Architecture and Engineering\2201.Module introduction.mp4
[8e2fd9ef3541e037]
|
11,353,225 |
7B726EB1 |
Pearson CISSP, Second Edition\23. Implement and Manage Engineering Processes Using Secure Design Principles\2301.Learning objectives.mp4
[9793efef96c64565]
|
2,429,527 |
8E5AAE74 |
Pearson CISSP, Second Edition\23. Implement and Manage Engineering Processes Using Secure Design Principles\2302.Security Design Principles.mp4
[a48a28a04ef4fac4]
|
77,251,230 |
65DE2147 |
Pearson CISSP, Second Edition\24. Understand the Fundamental Concepts of Security Models\2401.Learning objectives.mp4
[1bc3deb40da0c9c8]
|
2,331,398 |
0D3E1518 |
Pearson CISSP, Second Edition\24. Understand the Fundamental Concepts of Security Models\2402.Information Security Models.mp4
[3b76c4f37b730cfc]
|
105,031,791 |
3EBE8772 |
Pearson CISSP, Second Edition\25. Select Controls Based Upon Systems Security Requirements\2501.Learning objectives.mp4
[6550f497a8fa08ee]
|
2,303,147 |
7DF2A86C |
Pearson CISSP, Second Edition\25. Select Controls Based Upon Systems Security Requirements\2502.Security Evaluation Models.mp4
[fe9865bc8e7db7c9]
|
80,523,879 |
2B56262C |
Pearson CISSP, Second Edition\26. Understand Security Capabilities of Information Systems\2601.Learning objectives.mp4
[785e0611cde6279b]
|
3,615,682 |
B7841109 |
Pearson CISSP, Second Edition\26. Understand Security Capabilities of Information Systems\2602.Information Systems Security Capabilities.mp4
[b09e7a60aaaace6f]
|
74,023,111 |
ACE9EDE2 |
Pearson CISSP, Second Edition\26. Understand Security Capabilities of Information Systems\2603.Lesson 19-22 Assessment.mp4
[19d4ae7f78027bdf]
|
63,211,131 |
A2D61705 |
Pearson CISSP, Second Edition\27. Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements\2701.Learning objectives.mp4
[5b3cad1a03776238]
|
3,551,350 |
826C7815 |
Pearson CISSP, Second Edition\27. Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements\2702.Traditional Computing Environments.mp4
[409d2d65ca2f8d92]
|
67,796,181 |
2107DEAD |
Pearson CISSP, Second Edition\27. Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements\2703.Cloud Computing.mp4
[f213bfb642174d1d]
|
121,100,304 |
7A7A148D |
Pearson CISSP, Second Edition\28. Assess and Mitigate Vulnerabilities in Web-based Systems\2801.Learning objectives.mp4
[beb9a675d8194f43]
|
2,184,461 |
F65BCFA0 |
Pearson CISSP, Second Edition\28. Assess and Mitigate Vulnerabilities in Web-based Systems\2802.Web Vulnerabilities.mp4
[a4b7cb6b5ad63710]
|
101,396,003 |
0999C8B8 |
Pearson CISSP, Second Edition\29. Assess and Mitigate Vulnerabilities in Mobile Systems\2901.Learning objectives.mp4
[cb350bdb776de8c1]
|
2,338,206 |
CCE2C43F |
Pearson CISSP, Second Edition\29. Assess and Mitigate Vulnerabilities in Mobile Systems\2902.Mobile Systems Vulnerabilities.mp4
[26fd37abf7b251f0]
|
87,585,224 |
B3BDF37B |
Pearson CISSP, Second Edition\30. Assess and Mitigate Vulnerabilities in Embedded Systems\3001.Learning objectives.mp4
[6dfd7d158876e378]
|
3,285,525 |
071FFBCA |
Pearson CISSP, Second Edition\30. Assess and Mitigate Vulnerabilities in Embedded Systems\3002.Embedded Systems Vulnerabilities.mp4
[3eb137888265e214]
|
80,740,294 |
48775C00 |
Pearson CISSP, Second Edition\30. Assess and Mitigate Vulnerabilities in Embedded Systems\3003.Lesson 23-26 Assessment.mp4
[7f5891faa389eaa2]
|
65,432,736 |
F9825006 |
Pearson CISSP, Second Edition\31. Apply Cryptography\3101.Learning objectives.mp4
[e54bc2ee38bcf16d]
|
5,635,687 |
45DE7717 |
Pearson CISSP, Second Edition\31. Apply Cryptography\3102.Cryptographic Fundamentals.mp4
[a98769db25801694]
|
103,867,295 |
33A464F6 |
Pearson CISSP, Second Edition\31. Apply Cryptography\3103.Symmetric Encryption.mp4
[a4e1424cbb458183]
|
99,628,453 |
EC6EDE18 |
Pearson CISSP, Second Edition\31. Apply Cryptography\3104.Asymmetric Encryption.mp4
[5bdf892e5f31262a]
|
106,798,130 |
3DDBC073 |
Pearson CISSP, Second Edition\31. Apply Cryptography\3105.Hashing and Digital Signatures.mp4
[383e8f7e5248a2d6]
|
108,636,991 |
0C5316E5 |
Pearson CISSP, Second Edition\31. Apply Cryptography\3106.PKI and Digital Certificates.mp4
[1065c561f28dc929]
|
122,571,440 |
C4CB4DFE |
Pearson CISSP, Second Edition\31. Apply Cryptography\3107.Cryptographic Attacks and Vulnerabilities.mp4
[551da0760fb1967b]
|
88,595,404 |
CFC59F3B |
Pearson CISSP, Second Edition\32. Apply Security Principles to Site and Facility Design\3201.Learning objectives.mp4
[de23db68dc644841]
|
2,261,617 |
3D28595E |
Pearson CISSP, Second Edition\32. Apply Security Principles to Site and Facility Design\3202.Physical Security Principles.mp4
[ac7a6db75030ebb6]
|
77,438,842 |
C8E5FCE7 |
Pearson CISSP, Second Edition\33. Implement Site and Facility Security Controls\3301.Learning objectives.mp4
[7ea67b3d90ad344f]
|
4,398,416 |
0C712CD7 |
Pearson CISSP, Second Edition\33. Implement Site and Facility Security Controls\3302.Site and Facility Security Controls.mp4
[df58a7cf500d9d24]
|
113,071,002 |
15D6257B |
Pearson CISSP, Second Edition\33. Implement Site and Facility Security Controls\3303.Environmental Issues and Controls.mp4
[ac212eec8e184250]
|
92,268,251 |
26924589 |
Pearson CISSP, Second Edition\33. Implement Site and Facility Security Controls\3304.Lesson 27-29 Assessment.mp4
[788a93df653e827e]
|
66,268,889 |
41EF0BA8 |
Pearson CISSP, Second Edition\34. Domain 4 Communication and Network Security\3401.Module introduction.mp4
[fd74e8df0a61a8e]
|
7,967,384 |
D2F72C28 |
Pearson CISSP, Second Edition\35. Implement Secure Design Principles in Network Architectures\3501.Learning objectives.mp4
[5ad937fbdc64b112]
|
3,595,030 |
A3C316CF |
Pearson CISSP, Second Edition\35. Implement Secure Design Principles in Network Architectures\3502.Network Models and IP Convergence.mp4
[c6fbbd2b64d8fb95]
|
118,274,859 |
70B8396E |
Pearson CISSP, Second Edition\35. Implement Secure Design Principles in Network Architectures\3503.Non-IP Multilayer Protocols.mp4
[80e34a62994ab60e]
|
43,725,824 |
8DE46866 |
Pearson CISSP, Second Edition\35. Implement Secure Design Principles in Network Architectures\3504.Wireless Networks.mp4
[7e7fd23a4ec4806f]
|
123,698,509 |
5554EB45 |
Pearson CISSP, Second Edition\36. Secure Network Components\3601.Learning objectives.mp4
[aa553d42da7ad4f6]
|
3,002,594 |
5B2DFFFB |
Pearson CISSP, Second Edition\36. Secure Network Components\3602.Transmission and Connectivity.mp4
[94abeb8917e051a5]
|
150,856,586 |
33CFA876 |
Pearson CISSP, Second Edition\36. Secure Network Components\3603.Network Access Control Devices.mp4
[add1c286ea292468]
|
117,600,275 |
2F9DE62B |
Pearson CISSP, Second Edition\36. Secure Network Components\3604.Endpoint Security.mp4
[4c24091fba2dc47b]
|
76,076,341 |
CF8464DD |
Pearson CISSP, Second Edition\37. Implement Secure Communication Channels According to Design\3701.Learning objectives.mp4
[27ef84bc9fad8186]
|
6,640,857 |
CB031F51 |
Pearson CISSP, Second Edition\37. Implement Secure Communication Channels According to Design\3702.Voice and Multimedia.mp4
[5ddac2ebe6ac8186]
|
108,101,758 |
21CCCE21 |
Pearson CISSP, Second Edition\37. Implement Secure Communication Channels According to Design\3703.Remote Access.mp4
[e0d33b27c6ba0f6d]
|
112,575,748 |
6FA5A07C |
Pearson CISSP, Second Edition\37. Implement Secure Communication Channels According to Design\3704.Data Communications.mp4
[fe1409219c17e041]
|
118,303,211 |
3E87EAA6 |
Pearson CISSP, Second Edition\37. Implement Secure Communication Channels According to Design\3705.Virtualization and Software-defined Networks.mp4
[29c2f611c95bade5]
|
101,965,113 |
DB8038FB |
Pearson CISSP, Second Edition\37. Implement Secure Communication Channels According to Design\3706.Lesson 30-32 Assessment.mp4
[a6652c8d84232a63]
|
87,973,645 |
E3B019E4 |
Pearson CISSP, Second Edition\38. Domain 5 Identity and Access Management (IAM)\3801.Module introduction.mp4
[d0f7f069443ef1cf]
|
7,748,297 |
8997BEB2 |
Pearson CISSP, Second Edition\39. Control Physical and Logical Access to Assets\3901.Learning objectives.mp4
[270c6bb0c70d3f9]
|
2,399,352 |
7151F2CA |
Pearson CISSP, Second Edition\39. Control Physical and Logical Access to Assets\3902.Access Control Fundamentals.mp4
[5f9f08d308291066]
|
121,086,012 |
77824351 |
Pearson CISSP, Second Edition\40. Manage Identification and Authentication of People, Devices, and Services\4001.Learning objectives.mp4
[1bc37407b236419a]
|
3,819,809 |
763939AA |
Pearson CISSP, Second Edition\40. Manage Identification and Authentication of People, Devices, and Services\4002.Identification and Authentication.mp4
[eaae29598dd8c0b3]
|
149,416,331 |
CBF188E4 |
Pearson CISSP, Second Edition\40. Manage Identification and Authentication of People, Devices, and Services\4003.Identity and Access Services.mp4
[ae78f409a3dab0eb]
|
125,833,594 |
74E0A8EB |
Pearson CISSP, Second Edition\41. Integrate Identify as a Third-party Service\4101.Learning objectives.mp4
[5ff278bbdfc32590]
|
2,425,202 |
3B0E2F82 |
Pearson CISSP, Second Edition\41. Integrate Identify as a Third-party Service\4102.Identity Management (IdM).mp4
[33d0d63a88e0dbaf]
|
118,669,269 |
1C0E60E3 |
Pearson CISSP, Second Edition\42. Implement and Manage Authorization Mechanisms\4201.Learning objectives.mp4
[498f50b4932f3eaf]
|
2,372,005 |
4A1399D8 |
Pearson CISSP, Second Edition\42. Implement and Manage Authorization Mechanisms\4202.Access Control Models.mp4
[5474f9ca85d05c82]
|
93,801,788 |
BDB8250C |
Pearson CISSP, Second Edition\43. Manage the Identity and Access Provisioning Lifecycle\4301.Learning objectives.mp4
[58f2e1b761681adc]
|
4,050,041 |
02E4C86B |
Pearson CISSP, Second Edition\43. Manage the Identity and Access Provisioning Lifecycle\4302.Identity and Access Management (IAM).mp4
[9e671e8b35dc9d53]
|
98,898,108 |
2BEACD58 |
Pearson CISSP, Second Edition\43. Manage the Identity and Access Provisioning Lifecycle\4303.Lesson 33-37 Assessment.mp4
[515da1e05da05e00]
|
90,593,322 |
9D7A6A3D |
Pearson CISSP, Second Edition\44. Domain 6 Security Assessment and Testing\4401.Module introduction.mp4
[1aae0938741b5599]
|
8,050,099 |
0E3D919A |
Pearson CISSP, Second Edition\45. Design and Validate Assessment, Test, and Audit Strategies\4501.Learning objectives.mp4
[7085636c25d4c891]
|
2,923,840 |
4DC5EB5C |
Pearson CISSP, Second Edition\45. Design and Validate Assessment, Test, and Audit Strategies\4502.Assessment and Testing Overview.mp4
[2c2c7ea2eec632a3]
|
84,380,629 |
520E78E7 |
Pearson CISSP, Second Edition\45. Design and Validate Assessment, Test, and Audit Strategies\4503.Planning Engagements.mp4
[fa7f0fd2eb916e03]
|
106,636,766 |
EA375CB8 |
Pearson CISSP, Second Edition\46. Conduct Security Control Testing\4601.Learning objectives.mp4
[dd1d59f1340be319]
|
2,567,678 |
08A22084 |
Pearson CISSP, Second Edition\46. Conduct Security Control Testing\4602.Infrastructure Assessments.mp4
[b9aa019fd10440e8]
|
149,494,710 |
6F88B981 |
Pearson CISSP, Second Edition\46. Conduct Security Control Testing\4603.Code Testing and Analysis.mp4
[c5ead3715a6ff611]
|
64,828,084 |
CDFDB0B2 |
Pearson CISSP, Second Edition\47. Collect Security Process Data\4701.Learning objectives.mp4
[c69d2b665f7d2949]
|
2,874,269 |
413596EC |
Pearson CISSP, Second Edition\47. Collect Security Process Data\4702.Activity and Error Reporting.mp4
[e845754491f7613d]
|
73,473,869 |
0008C919 |
Pearson CISSP, Second Edition\47. Collect Security Process Data\4703.Information Security Continuous Monitoring.mp4
[21fe1fd5051338b9]
|
83,470,280 |
493FECD1 |
Pearson CISSP, Second Edition\48. Analyze Test Output and Generate Report\4801.Learning objectives.mp4
[6a7ea1c2ad2b17d9]
|
2,636,484 |
3CFE74BD |
Pearson CISSP, Second Edition\48. Analyze Test Output and Generate Report\4802.Metrics, KPIs, and Business Intelligence.mp4
[4acba028d3073572]
|
47,640,362 |
F06F9794 |
Pearson CISSP, Second Edition\49. Conduct or Facilitate Security Audits\4901.Learning objectives.mp4
[b31746c54e3c456b]
|
3,818,873 |
EC8978C7 |
Pearson CISSP, Second Edition\49. Conduct or Facilitate Security Audits\4902.Managing Third-party Audits and Examinations.mp4
[cc3323e8241a15f1]
|
108,902,520 |
1710D380 |
Pearson CISSP, Second Edition\49. Conduct or Facilitate Security Audits\4903.Lesson 38-42 Assessment.mp4
[7dce3779f92ab661]
|
89,917,900 |
94C186A8 |
Pearson CISSP, Second Edition\50. Domain 7 Security Operations\5001.Module introduction.mp4
[2f5256742c321633]
|
11,391,995 |
63CEAECE |
Pearson CISSP, Second Edition\51. Understand and Support Investigations\5101.Learning objectives.mp4
[f6bbadcc9e375ad9]
|
2,865,668 |
DC71BC7A |
Pearson CISSP, Second Edition\51. Understand and Support Investigations\5102.Evidence Handling.mp4
[94d8334cb38a21ae]
|
79,403,520 |
AECC90D0 |
Pearson CISSP, Second Edition\51. Understand and Support Investigations\5103.Forensic Investigative Techniques.mp4
[a7a5c91e7328cf48]
|
130,281,904 |
2BA98995 |
Pearson CISSP, Second Edition\52. Understand Requirements for Investigation Types\5201.Learning objectives.mp4
[290397954017a7ca]
|
2,632,429 |
29A895B0 |
Pearson CISSP, Second Edition\52. Understand Requirements for Investigation Types\5202.Investigation Objectives and Requirements.mp4
[75b6f9edfb7ec2c2]
|
62,286,404 |
BA7F7552 |
Pearson CISSP, Second Edition\53. Conduct Logging and Monitoring Activities\5301.Learning objectives.mp4
[ad54ac84150f14c]
|
3,108,146 |
4A22FDCD |
Pearson CISSP, Second Edition\53. Conduct Logging and Monitoring Activities\5302.Logging and Analysis.mp4
[e30cbfce33d93fb1]
|
114,002,862 |
66C2E9D5 |
Pearson CISSP, Second Edition\53. Conduct Logging and Monitoring Activities\5303.Lesson 43-45 Assessment.mp4
[8f8f0394c9f76096]
|
94,475,314 |
1F331615 |
Pearson CISSP, Second Edition\54. Securely Provisioning Resources\5401.Learning objectives.mp4
[723f403c7dc9fe07]
|
2,133,597 |
B4208F06 |
Pearson CISSP, Second Edition\54. Securely Provisioning Resources\5402.Configuration Management.mp4
[c988dfe7327f09c9]
|
43,951,968 |
9B71C948 |
Pearson CISSP, Second Edition\55. Understand and Apply Foundational Security Operations Concepts\5501.Learning objectives.mp4
[b2b7d6aa5c163c15]
|
2,439,202 |
E0FAC19B |
Pearson CISSP, Second Edition\55. Understand and Apply Foundational Security Operations Concepts\5502.Security Operations.mp4
[d90c7556a5ba35d2]
|
111,585,918 |
F172518F |
Pearson CISSP, Second Edition\56. Apply Resource Protection Techniques\5601.Learning objectives.mp4
[da51f982c88200a]
|
2,892,436 |
3250DF53 |
Pearson CISSP, Second Edition\56. Apply Resource Protection Techniques\5602.Media Management.mp4
[9cfe062ff42ea0ba]
|
116,116,105 |
BEFBBFC0 |
Pearson CISSP, Second Edition\56. Apply Resource Protection Techniques\5603.Mobile Device Management.mp4
[e5174533c72bfecd]
|
120,601,307 |
EBAD445B |
Pearson CISSP, Second Edition\57. Conduct Incident Management\5701.Learning objectives.mp4
[ed096aff17f9de2f]
|
3,297,054 |
2837A228 |
Pearson CISSP, Second Edition\57. Conduct Incident Management\5702.Incident Management Planning.mp4
[258422ed94cef48b]
|
113,309,028 |
D7792C11 |
Pearson CISSP, Second Edition\57. Conduct Incident Management\5703.Incident Response.mp4
[470b1e9548484eb9]
|
97,544,713 |
CD05BA12 |
Pearson CISSP, Second Edition\57. Conduct Incident Management\5704.Lesson 46-49 Assessment.mp4
[33fa2d3a6d7220a9]
|
120,716,353 |
1402C6C1 |
Pearson CISSP, Second Edition\58. Operate and Maintain Detective and Preventative Measures\5801.Learning objectives.mp4
[cd3a356e180697c8]
|
4,549,254 |
520B47DA |
Pearson CISSP, Second Edition\58. Operate and Maintain Detective and Preventative Measures\5802.Detective and Preventative Solutions.mp4
[73db2b4bd89c25c8]
|
76,658,153 |
74B2AB0C |
Pearson CISSP, Second Edition\58. Operate and Maintain Detective and Preventative Measures\5803.Firewalls and Filters.mp4
[998857e26e16298f]
|
121,803,828 |
A2BD52C7 |
Pearson CISSP, Second Edition\58. Operate and Maintain Detective and Preventative Measures\5804.IDSIPS.mp4
[47e4e3538a780bff]
|
83,976,145 |
1C75CD5B |
Pearson CISSP, Second Edition\58. Operate and Maintain Detective and Preventative Measures\5805.Anti-Malware Techniques.mp4
[613a1e84e24c7f43]
|
59,937,603 |
961BB5EB |
Pearson CISSP, Second Edition\59. Implement and Support Patch and Vulnerability Management\5901.Learning objectives.mp4
[e8f09352b8fe7fea]
|
3,869,186 |
B5B04DC0 |
Pearson CISSP, Second Edition\59. Implement and Support Patch and Vulnerability Management\5902.Vulnerability Management.mp4
[31ce746be501c492]
|
106,214,578 |
476A9BD6 |
Pearson CISSP, Second Edition\59. Implement and Support Patch and Vulnerability Management\5903.Patch Management.mp4
[b877d27e35419532]
|
72,341,920 |
51B76181 |
Pearson CISSP, Second Edition\59. Implement and Support Patch and Vulnerability Management\5904.Threat Intelligence and Information Sharing.mp4
[33cf2ca17046c18b]
|
75,325,478 |
989D0D76 |
Pearson CISSP, Second Edition\60. Understand and Participate in Change Management Processes\6001.Learning objectives.mp4
[e2458d1c175b79de]
|
2,349,274 |
A882B759 |
Pearson CISSP, Second Edition\60. Understand and Participate in Change Management Processes\6002.Change Management.mp4
[59e9ce9760f67ed5]
|
68,904,333 |
FEE75F24 |
Pearson CISSP, Second Edition\61. Implement Recovery Strategies\6101.Learning objectives.mp4
[36e3f318abc9aed4]
|
4,590,779 |
9436DA15 |
Pearson CISSP, Second Edition\61. Implement Recovery Strategies\6102.Site Recovery Strategies.mp4
[b98f8c744d0496e]
|
83,089,475 |
87CF32D8 |
Pearson CISSP, Second Edition\61. Implement Recovery Strategies\6103.Data Backup and Restoration.mp4
[df29dc8a5ee53f69]
|
113,862,128 |
FCF5D16E |
Pearson CISSP, Second Edition\61. Implement Recovery Strategies\6104.Resiliency and Fault Tolerance.mp4
[a7247a992644d757]
|
98,535,496 |
6BC4378B |
Pearson CISSP, Second Edition\61. Implement Recovery Strategies\6105.Lesson 50-53 Assessment.mp4
[5b1562420779a904]
|
154,726,399 |
96CE15B1 |
Pearson CISSP, Second Edition\62. Implement Disaster Recovery (DR) Processes\6201.Learning objectives.mp4
[1574972883bc8fc7]
|
2,500,574 |
165BC180 |
Pearson CISSP, Second Edition\62. Implement Disaster Recovery (DR) Processes\6202.DR Planning and Response.mp4
[bca2a318cb4cda0e]
|
109,310,015 |
2983C3BE |
Pearson CISSP, Second Edition\63. Test Disaster Recovery Plans (DRP)\6301.Learning objectives.mp4
[a9f45bb0a828d792]
|
2,443,970 |
B65F1C39 |
Pearson CISSP, Second Edition\63. Test Disaster Recovery Plans (DRP)\6302.DRP Training and Testing.mp4
[e829816d3f96ea74]
|
65,499,912 |
B9271624 |
Pearson CISSP, Second Edition\64. Participate in Business Continuity (BC) Planning and Exercises\6401.Learning objectives.mp4
[4c44224060eecbea]
|
2,770,791 |
B3A9DD86 |
Pearson CISSP, Second Edition\64. Participate in Business Continuity (BC) Planning and Exercises\6402.BCP Relationship.mp4
[ca02d3cf071785e1]
|
87,450,094 |
C65CCE53 |
Pearson CISSP, Second Edition\65. Implement and Manage Physical Security\6501.Learning objectives.mp4
[a3a215f15b4db6bd]
|
2,632,971 |
0237D45C |
Pearson CISSP, Second Edition\65. Implement and Manage Physical Security\6502.Perimeter and Internal Security Controls.mp4
[d5d18f0de0f72874]
|
121,863,466 |
AE9AE2F4 |
Pearson CISSP, Second Edition\66. Address Personnel Safety and Security Concerns\6601.Learning objectives.mp4
[e45b81541c65ca63]
|
3,931,728 |
5390080C |
Pearson CISSP, Second Edition\66. Address Personnel Safety and Security Concerns\6602.Personnel and Workplace Safety.mp4
[47fddec0a999c952]
|
52,185,632 |
29BEF2A3 |
Pearson CISSP, Second Edition\66. Address Personnel Safety and Security Concerns\6603.Lesson 54-58 Assessment.mp4
[17fa40451ebf0556]
|
142,089,996 |
1DDEB52B |
Pearson CISSP, Second Edition\67. Domain 8 Software Development Security\6701.Module introduction.mp4
[b17b78142ad78e80]
|
7,689,924 |
C59A439F |
Pearson CISSP, Second Edition\68. Understand and Integrate Security in the Software Development Life Cycle (SDLC)\6801.Learning objectives.mp4
[f6291aa500e3dbe8]
|
3,296,754 |
FA2CBC56 |
Pearson CISSP, Second Edition\68. Understand and Integrate Security in the Software Development Life Cycle (SDLC)\6802.Software Development Life Cycle.mp4
[fe94b54492f6fc8d]
|
124,302,596 |
267642BF |
Pearson CISSP, Second Edition\68. Understand and Integrate Security in the Software Development Life Cycle (SDLC)\6803.Secure DevOps.mp4
[f9efb579b30ba277]
|
80,326,538 |
1426E62C |
Pearson CISSP, Second Edition\69. Identify and Apply Security Controls in Development Environments\6901.Learning objectives.mp4
[10f7d53c67b46de7]
|
2,573,533 |
5F3D3F5E |
Pearson CISSP, Second Edition\69. Identify and Apply Security Controls in Development Environments\6902.Staging and Deployment Strategies.mp4
[20ab0cb88d1af6c8]
|
97,791,238 |
21757E2E |
Pearson CISSP, Second Edition\70. Assess the Effectiveness of Software Security\7001.Learning objectives.mp4
[c3e7642defe9ce6]
|
2,632,382 |
BA282461 |
Pearson CISSP, Second Edition\70. Assess the Effectiveness of Software Security\7002.Assessing the Effectiveness of Software Security.mp4
[4e63946438862a4e]
|
98,517,032 |
B729DF2F |
Pearson CISSP, Second Edition\71. Assess Security Impact of Acquired Software\7101.Learning objectives.mp4
[52434bb3261abd8a]
|
2,591,001 |
8AA20B06 |
Pearson CISSP, Second Edition\71. Assess Security Impact of Acquired Software\7102.Software Procurement and Acquisition.mp4
[e1d8e6900e9a6248]
|
117,588,746 |
DC2127CC |
Pearson CISSP, Second Edition\72. Define and Apply Secure Coding Guidelines and Standards\7201.Learning objectives.mp4
[6d30c043da2d9b8]
|
4,728,132 |
36AD0E6B |
Pearson CISSP, Second Edition\72. Define and Apply Secure Coding Guidelines and Standards\7202.Source Code Weaknesses.mp4
[85d48d66a45d43ef]
|
104,869,761 |
78CC9B34 |
Pearson CISSP, Second Edition\72. Define and Apply Secure Coding Guidelines and Standards\7203.Secure Coding Techniques.mp4
[97ac926d451db9a8]
|
91,474,171 |
4F6DC5A3 |
Pearson CISSP, Second Edition\72. Define and Apply Secure Coding Guidelines and Standards\7204.Lesson 59-63 Assessment.mp4
[ccbc2dafe5b25c4d]
|
112,407,228 |
A086F343 |
Pearson CISSP, Second Edition\73. Becoming a CISSP\7301.Module introduction.mp4
[7e08a59752ee9984]
|
4,688,787 |
D6111B10 |
Pearson CISSP, Second Edition\74. Acing Your Exam\7401.Learning objectives.mp4
[53b14ef7b11e37eb]
|
2,440,800 |
80ABE3FC |
Pearson CISSP, Second Edition\74. Acing Your Exam\7402.Understanding the Exam Structure.mp4
[c2b853f4501c1bbc]
|
13,333,199 |
EA076392 |
Pearson CISSP, Second Edition\74. Acing Your Exam\7403.Test Taking Strategies.mp4
[cc838d025a2f4381]
|
28,487,847 |
5B36C704 |
Pearson CISSP, Second Edition\74. Acing Your Exam\7404.Preparing for Test Day.mp4
[ef482f9b24dcb8c2]
|
14,769,419 |
609A55E8 |
Pearson CISSP, Second Edition\75. Certification Process\7501.Learning objectives.mp4
[1b223b6f7b9457b6]
|
2,783,012 |
A6FB6A77 |
Pearson CISSP, Second Edition\75. Certification Process\7502.What to Expect at the Testing Center.mp4
[4ec424e51d4d8be6]
|
24,358,339 |
B14FB692 |
Pearson CISSP, Second Edition\75. Certification Process\7503.Attaining and Maintaining Your CISSP Certification.mp4
[cebfd58e03866f1e]
|
11,126,605 |
FEACBBDC |
Pearson CISSP, Second Edition\76.Summary\7601.CISSP Summary.mp4
[7ad9c59774920356]
|
6,666,604 |
C8292F84 |
Pearson CISSP, Second Edition\01.Introduction |
0 |
00000000 |
Pearson CISSP, Second Edition\02. Domain 1 Security and Risk Management |
0 |
00000000 |
Pearson CISSP, Second Edition\03. Understand and Apply Concepts of Confidentiality, Integrity and Availability |
0 |
00000000 |
Pearson CISSP, Second Edition\04. Evaluate and Apply Security Governance Principles |
0 |
00000000 |
Pearson CISSP, Second Edition\05. Determine Compliance Requirements |
0 |
00000000 |
Pearson CISSP, Second Edition\06. Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context |
0 |
00000000 |
Pearson CISSP, Second Edition\07. Understand, Adhere to and Promote Professional Ethics |
0 |
00000000 |
Pearson CISSP, Second Edition\08. Develop, Document and Implement Security Policy, Standards, Procedures and Guidelines |
0 |
00000000 |
Pearson CISSP, Second Edition\09. Identify, Analyze, and Prioritize Business Continuity (BC) Requirements |
0 |
00000000 |
Pearson CISSP, Second Edition\10. Contribute to and Enforce Personnel Security Policies and Procedures |
0 |
00000000 |
Pearson CISSP, Second Edition\11. Understand and Apply Risk Management Concepts |
0 |
00000000 |
Pearson CISSP, Second Edition\12. Understand and Apply Threat Modeling Concepts and Methodologies |
0 |
00000000 |
Pearson CISSP, Second Edition\13. Apply Risk Management Concepts to the Supply Chain |
0 |
00000000 |
Pearson CISSP, Second Edition\14. Establish and Maintain a Security Awareness, Education, and Training Program |
0 |
00000000 |
Pearson CISSP, Second Edition\15. Domain 2 Asset Security |
0 |
00000000 |
Pearson CISSP, Second Edition\16. Identify and Classify Information and Assets |
0 |
00000000 |
Pearson CISSP, Second Edition\17. Determine and Maintain Information and Asset Ownership |
0 |
00000000 |
Pearson CISSP, Second Edition\18. Protect Privacy |
0 |
00000000 |
Pearson CISSP, Second Edition\19. Ensure Appropriate Asset Retention |
0 |
00000000 |
Pearson CISSP, Second Edition\20. Determine Data Security Controls |
0 |
00000000 |
Pearson CISSP, Second Edition\21. Establish Information and Asset Handling Requirements |
0 |
00000000 |
Pearson CISSP, Second Edition\22. Domain 3 Security Architecture and Engineering |
0 |
00000000 |
Pearson CISSP, Second Edition\23. Implement and Manage Engineering Processes Using Secure Design Principles |
0 |
00000000 |
Pearson CISSP, Second Edition\24. Understand the Fundamental Concepts of Security Models |
0 |
00000000 |
Pearson CISSP, Second Edition\25. Select Controls Based Upon Systems Security Requirements |
0 |
00000000 |
Pearson CISSP, Second Edition\26. Understand Security Capabilities of Information Systems |
0 |
00000000 |
Pearson CISSP, Second Edition\27. Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements |
0 |
00000000 |
Pearson CISSP, Second Edition\28. Assess and Mitigate Vulnerabilities in Web-based Systems |
0 |
00000000 |
Pearson CISSP, Second Edition\29. Assess and Mitigate Vulnerabilities in Mobile Systems |
0 |
00000000 |
Pearson CISSP, Second Edition\30. Assess and Mitigate Vulnerabilities in Embedded Systems |
0 |
00000000 |
Pearson CISSP, Second Edition\31. Apply Cryptography |
0 |
00000000 |
Pearson CISSP, Second Edition\32. Apply Security Principles to Site and Facility Design |
0 |
00000000 |
Pearson CISSP, Second Edition\33. Implement Site and Facility Security Controls |
0 |
00000000 |
Pearson CISSP, Second Edition\34. Domain 4 Communication and Network Security |
0 |
00000000 |
Pearson CISSP, Second Edition\35. Implement Secure Design Principles in Network Architectures |
0 |
00000000 |
Pearson CISSP, Second Edition\36. Secure Network Components |
0 |
00000000 |
Pearson CISSP, Second Edition\37. Implement Secure Communication Channels According to Design |
0 |
00000000 |
Pearson CISSP, Second Edition\38. Domain 5 Identity and Access Management (IAM) |
0 |
00000000 |
Pearson CISSP, Second Edition\39. Control Physical and Logical Access to Assets |
0 |
00000000 |
Pearson CISSP, Second Edition\40. Manage Identification and Authentication of People, Devices, and Services |
0 |
00000000 |
Pearson CISSP, Second Edition\41. Integrate Identify as a Third-party Service |
0 |
00000000 |
Pearson CISSP, Second Edition\42. Implement and Manage Authorization Mechanisms |
0 |
00000000 |
Pearson CISSP, Second Edition\43. Manage the Identity and Access Provisioning Lifecycle |
0 |
00000000 |
Pearson CISSP, Second Edition\44. Domain 6 Security Assessment and Testing |
0 |
00000000 |
Pearson CISSP, Second Edition\45. Design and Validate Assessment, Test, and Audit Strategies |
0 |
00000000 |
Pearson CISSP, Second Edition\46. Conduct Security Control Testing |
0 |
00000000 |
Pearson CISSP, Second Edition\47. Collect Security Process Data |
0 |
00000000 |
Pearson CISSP, Second Edition\48. Analyze Test Output and Generate Report |
0 |
00000000 |
Pearson CISSP, Second Edition\49. Conduct or Facilitate Security Audits |
0 |
00000000 |
Pearson CISSP, Second Edition\50. Domain 7 Security Operations |
0 |
00000000 |
Pearson CISSP, Second Edition\51. Understand and Support Investigations |
0 |
00000000 |
Pearson CISSP, Second Edition\52. Understand Requirements for Investigation Types |
0 |
00000000 |
Pearson CISSP, Second Edition\53. Conduct Logging and Monitoring Activities |
0 |
00000000 |
Pearson CISSP, Second Edition\54. Securely Provisioning Resources |
0 |
00000000 |
Pearson CISSP, Second Edition\55. Understand and Apply Foundational Security Operations Concepts |
0 |
00000000 |
Pearson CISSP, Second Edition\56. Apply Resource Protection Techniques |
0 |
00000000 |
Pearson CISSP, Second Edition\57. Conduct Incident Management |
0 |
00000000 |
Pearson CISSP, Second Edition\58. Operate and Maintain Detective and Preventative Measures |
0 |
00000000 |
Pearson CISSP, Second Edition\59. Implement and Support Patch and Vulnerability Management |
0 |
00000000 |
Pearson CISSP, Second Edition\60. Understand and Participate in Change Management Processes |
0 |
00000000 |
Pearson CISSP, Second Edition\61. Implement Recovery Strategies |
0 |
00000000 |
Pearson CISSP, Second Edition\62. Implement Disaster Recovery (DR) Processes |
0 |
00000000 |
Pearson CISSP, Second Edition\63. Test Disaster Recovery Plans (DRP) |
0 |
00000000 |
Pearson CISSP, Second Edition\64. Participate in Business Continuity (BC) Planning and Exercises |
0 |
00000000 |
Pearson CISSP, Second Edition\65. Implement and Manage Physical Security |
0 |
00000000 |
Pearson CISSP, Second Edition\66. Address Personnel Safety and Security Concerns |
0 |
00000000 |
Pearson CISSP, Second Edition\67. Domain 8 Software Development Security |
0 |
00000000 |
Pearson CISSP, Second Edition\68. Understand and Integrate Security in the Software Development Life Cycle (SDLC) |
0 |
00000000 |
Pearson CISSP, Second Edition\69. Identify and Apply Security Controls in Development Environments |
0 |
00000000 |
Pearson CISSP, Second Edition\70. Assess the Effectiveness of Software Security |
0 |
00000000 |
Pearson CISSP, Second Edition\71. Assess Security Impact of Acquired Software |
0 |
00000000 |
Pearson CISSP, Second Edition\72. Define and Apply Secure Coding Guidelines and Standards |
0 |
00000000 |
Pearson CISSP, Second Edition\73. Becoming a CISSP |
0 |
00000000 |
Pearson CISSP, Second Edition\74. Acing Your Exam |
0 |
00000000 |
Pearson CISSP, Second Edition\75. Certification Process |
0 |
00000000 |
Pearson CISSP, Second Edition\76.Summary |
0 |
00000000 |
Pearson CISSP, Second Edition |
0 |
00000000 |
|
Total size: |
11,881,181,446 |
|
|