UD72/01 Introduction/001 Introduction.mp4 |
20.8 MB |
UD72/02 Security and Risk Management/002 Security and Risk Management.mp4.part |
1.2 MB |
UD72/02 Security and Risk Management/003 Importance of Information Security and Risk Management.mp4 |
10.7 MB |
UD72/02 Security and Risk Management/004 Information Security.mp4 |
12.4 MB |
UD72/02 Security and Risk Management/005 IT Security and Organizational Goals Mission and Objectives.mp4 |
16.7 MB |
UD72/02 Security and Risk Management/006 Organizational Processes.mp4 |
54.3 MB |
UD72/02 Security and Risk Management/007 Security Policies.mp4 |
28.3 MB |
UD72/02 Security and Risk Management/008 Policy Chart.mp4 |
17.8 MB |
UD72/02 Security and Risk Management/009 Compliance.mp4 |
27 MB |
UD72/02 Security and Risk Management/010 Computer Crimes.mp4 |
34.8 MB |
UD72/02 Security and Risk Management/011 Major Legal Systems.mp4 |
23.9 MB |
UD72/02 Security and Risk Management/012 Introduction to Intellectual Property (IP) Law.mp4 |
32.2 MB |
UD72/02 Security and Risk Management/013 Import or Export Controls and Trans-Border Data Flow.mp4 |
16.3 MB |
UD72/02 Security and Risk Management/014 U.S. Privacy Laws.mp4 |
34.3 MB |
UD72/02 Security and Risk Management/015 General Data Protection Regulation (GDPR).mp4 |
33.9 MB |
UD72/02 Security and Risk Management/016 Security.mp4 |
17.4 MB |
UD72/02 Security and Risk Management/017 Risk Analysis.mp4 |
27.1 MB |
UD72/02 Security and Risk Management/018 Risk Analysis Types.mp4 |
31.5 MB |
UD72/02 Security and Risk Management/019 Countermeasure SelectionProblem.mp4 |
50.9 MB |
UD72/02 Security and Risk Management/020 Importance of Business Continuity Planning.mp4 |
32.8 MB |
UD72/02 Security and Risk Management/021 Business Impact Analysis.mp4 |
12.8 MB |
UD72/02 Security and Risk Management/022 Maximum Tolerable Downtime (MTD).mp4 |
12.7 MB |
UD72/02 Security and Risk Management/023 Failure and Recovery Metrics.mp4 |
35.4 MB |
UD72/02 Security and Risk Management/024 Importance of Managing Personnel Security.mp4 |
4.6 MB |
UD72/02 Security and Risk Management/025 Vendor Contractors and Consultant Controls.mp4 |
12.7 MB |
UD72/02 Security and Risk Management/026 Importance of Security Awareness Training.mp4 |
31.3 MB |
UD72/02 Security and Risk Management/027 Best Practices.mp4 |
36.5 MB |
UD72/02 Security and Risk Management/028 Conclusion.mp4 |
6.3 MB |
UD72/03 Asset Security/029 Asset Security.mp4 |
8 MB |
UD72/03 Asset Security/030 Information Classification.mp4 |
27.5 MB |
UD72/03 Asset Security/031 Data Lifecycle.mp4 |
30.6 MB |
UD72/03 Asset Security/032 Data Management.mp4 |
24.4 MB |
UD72/03 Asset Security/033 Data Custodians.mp4 |
11.3 MB |
UD72/03 Asset Security/034 Data Quality.mp4 |
5.3 MB |
UD72/03 Asset Security/035 Data Documentation.mp4 |
15.8 MB |
UD72/03 Asset Security/036 Data Access Sharing and Dissemination.mp4 |
16.1 MB |
UD72/03 Asset Security/037 Media Resource Protection.mp4 |
21.9 MB |
UD72/03 Asset Security/038 Data Remanence.mp4 |
20.5 MB |
UD72/03 Asset Security/039 Software Licensing.mp4 |
25.1 MB |
UD72/03 Asset Security/040 Data Security Controls.mp4 |
15.9 MB |
UD72/03 Asset Security/041 Scoping and Tailoring.mp4 |
12.1 MB |
UD72/03 Asset Security/042 Standards Selection.mp4 |
24.5 MB |
UD72/03 Asset Security/043 Conclusion.mp4 |
7.5 MB |
UD72/04 Security Architecture and Engineering/044 Security Engineering.mp4 |
10.2 MB |
UD72/04 Security Architecture and Engineering/045 Architecture Framework.mp4 |
129.3 MB |
UD72/04 Security Architecture and Engineering/046 Security Standards.mp4 |
21.8 MB |
UD72/04 Security Architecture and Engineering/047 Security Models.mp4 |
79.3 MB |
UD72/04 Security Architecture and Engineering/048 Evaluation Criteria.mp4 |
40.5 MB |
UD72/04 Security Architecture and Engineering/049 Security Standard.mp4 |
39.6 MB |
UD72/04 Security Architecture and Engineering/050 System Security Architecture.mp4 |
9.2 MB |
UD72/04 Security Architecture and Engineering/051 System Components.mp4 |
42.5 MB |
UD72/04 Security Architecture and Engineering/052 Distributed Systems.mp4 |
30.9 MB |
UD72/04 Security Architecture and Engineering/053 Security Threats and Countermeasures.mp4 |
29 MB |
UD72/04 Security Architecture and Engineering/054 Internet of Things (IoT).mp4 |
22.9 MB |
UD72/04 Security Architecture and Engineering/055 Industrial Control System (ICS).mp4 |
36.1 MB |
UD72/04 Security Architecture and Engineering/056 Best Practices.mp4 |
25.4 MB |
UD72/04 Security Architecture and Engineering/057 Cryptography.mp4 |
74.3 MB |
UD72/04 Security Architecture and Engineering/058 Symmetric Cryptography.mp4 |
40.2 MB |
UD72/04 Security Architecture and Engineering/059 Data Encryption Standard (DES).mp4 |
63 MB |
UD72/04 Security Architecture and Engineering/060 Advanced Encryption Standard (AES).mp4 |
55.1 MB |
UD72/04 Security Architecture and Engineering/061 Asymmetric Cryptography.mp4 |
46.4 MB |
UD72/04 Security Architecture and Engineering/062 Symmetric vs. Asymmetric Cryptography.mp4 |
12.9 MB |
UD72/04 Security Architecture and Engineering/063 Public Key Infrastructure.mp4 |
38.7 MB |
UD72/04 Security Architecture and Engineering/064 Hash function.mp4 |
68.7 MB |
UD72/04 Security Architecture and Engineering/065 Physical and Environmental Security.mp4 |
30.8 MB |
UD72/04 Security Architecture and Engineering/066 Design Criteria.mp4 |
69.9 MB |
UD72/04 Security Architecture and Engineering/067 Operational Areas.mp4 |
10.3 MB |
UD72/04 Security Architecture and Engineering/068 Environmental Controls.mp4 |
54 MB |
UD72/04 Security Architecture and Engineering/069 Conclusion.mp4 |
2.5 MB |
UD72/05 Communications and Network Security/070 Communications and Network Security.mp4 |
8.8 MB |
UD72/05 Communications and Network Security/071 Open Systems Interconnection.mp4 |
10.6 MB |
UD72/05 Communications and Network Security/072 OSI Layers.mp4 |
45.1 MB |
UD72/05 Communications and Network Security/073 Protocol Models.mp4 |
44.6 MB |
UD72/05 Communications and Network Security/074 IP Addressing.mp4 |
16.8 MB |
UD72/05 Communications and Network Security/075 Domain Routing.mp4 |
18.1 MB |
UD72/05 Communications and Network Security/076 Types of Network Protocols.mp4 |
23 MB |
UD72/05 Communications and Network Security/077 LAN Network Technologies.mp4 |
21.5 MB |
UD72/05 Communications and Network Security/078 Network Topologies.mp4 |
34 MB |
UD72/05 Communications and Network Security/079 List of Networking Devices.mp4 |
36.4 MB |
UD72/05 Communications and Network Security/080 Networks.mp4 |
36.2 MB |
UD72/05 Communications and Network Security/081 WAN Technologies.mp4 |
42.5 MB |
UD72/05 Communications and Network Security/082 Remote Access Technolgy.mp4 |
34.5 MB |
UD72/05 Communications and Network Security/083 IPsec Security Protocols.mp4 |
29.7 MB |
UD72/05 Communications and Network Security/084 Remote Access Security Methods.mp4 |
12.8 MB |
UD72/05 Communications and Network Security/085 Bluetooth.mp4 |
52.3 MB |
UD72/05 Communications and Network Security/086 Network Attacks.mp4 |
57.4 MB |
UD72/05 Communications and Network Security/087 Conclusion.mp4 |
1.8 MB |
UD72/06 Identity and Access Management (IAM)/088 Identity and Access Management.mp4 |
23.5 MB |
UD72/06 Identity and Access Management (IAM)/089 User Identification.mp4 |
31.5 MB |
UD72/06 Identity and Access Management (IAM)/090 Cards and Smart Cards.mp4 |
43.9 MB |
UD72/06 Identity and Access Management (IAM)/091 Kerberos.mp4 |
35 MB |
UD72/06 Identity and Access Management (IAM)/092 Access Control.mp4 |
28.7 MB |
UD72/06 Identity and Access Management (IAM)/093 Attribute-Based Access Control (ABAC).mp4 |
10.6 MB |
UD72/06 Identity and Access Management (IAM)/094 Access Control Concepts.mp4 |
34.3 MB |
UD72/06 Identity and Access Management (IAM)/095 Credential Management Systems.mp4 |
2.8 MB |
UD72/06 Identity and Access Management (IAM)/096 Identity Management.mp4 |
50.5 MB |
UD72/06 Identity and Access Management (IAM)/097 Unauthorized Disclosure of Information.mp4 |
35.2 MB |
UD72/06 Identity and Access Management (IAM)/098 Threats to Access Control.mp4 |
26.2 MB |
UD72/06 Identity and Access Management (IAM)/099 Conclusion.mp4 |
3.4 MB |
UD72/07 Security Assessment and Testing/100 Security Assessment and Testing.mp4 |
2.3 MB |
UD72/07 Security Assessment and Testing/101 Assessment and Test Strategies.mp4 |
8.5 MB |
UD72/07 Security Assessment and Testing/102 Log Management.mp4 |
19.4 MB |
UD72/07 Security Assessment and Testing/103 Synthetic Transactions.mp4 |
4.6 MB |
UD72/07 Security Assessment and Testing/104 Testing Techniques.mp4 |
22.4 MB |
UD72/07 Security Assessment and Testing/105 Information Security Continuous Monitoring.mp4 |
80.2 MB |
UD72/07 Security Assessment and Testing/106 Service Organization Controls.mp4 |
18.4 MB |
UD72/07 Security Assessment and Testing/107 Audit Preparation.mp4 |
10.8 MB |
UD72/07 Security Assessment and Testing/108 Conclusion.mp4 |
5.7 MB |
UD72/08 Security Operations/109 Security Operations.mp4 |
727 KB |
UD72/08 Security Operations/110 Investigations.mp4 |
22.5 MB |
UD72/08 Security Operations/111 Forensic Investigation Guidelines.mp4 |
5.6 MB |
UD72/08 Security Operations/112 Incident Response.mp4 |
17.6 MB |
UD72/08 Security Operations/113 Evidence.mp4 |
22.8 MB |
UD72/08 Security Operations/114 Computer Forensics Procedure.mp4 |
1.6 MB |
UD72/08 Security Operations/115 Requirements for Investigation Types.mp4 |
33.1 MB |
UD72/08 Security Operations/116 Data Leakor Loss Prevention DLP.mp4 |
9.5 MB |
UD72/08 Security Operations/117 Introduction to Security Operations.mp4 |
5 MB |
UD72/08 Security Operations/118 Effects of Operations Controls on C.I.A.mp4 |
7.8 MB |
UD72/08 Security Operations/119 Threats to Operations.mp4 |
72.5 MB |
UD72/08 Security Operations/120 Types of Accounts.mp4 |
13.5 MB |
UD72/08 Security Operations/121 Protecting.mp4 |
74.7 MB |
UD72/08 Security Operations/122 Cloud and Virtual Storage.mp4 |
13.3 MB |
UD72/08 Security Operations/123 Incident ManagementDetection Phase.mp4 |
22.3 MB |
UD72/08 Security Operations/124 Monitoring.mp4 |
13.7 MB |
UD72/08 Security Operations/125 Operating and Maintaining Preventive Measures.mp4 |
47.9 MB |
UD72/08 Security Operations/126 Recovery Strategy.mp4 |
37.1 MB |
UD72/08 Security Operations/127 Backup Sites.mp4 |
43.4 MB |
UD72/08 Security Operations/128 Importance of Maintaining Resilient Systems.mp4 |
29.7 MB |
UD72/08 Security Operations/129 Disaster Recovery.mp4 |
10.9 MB |
UD72/08 Security Operations/130 Importance of Testing.mp4 |
17 MB |
UD72/08 Security Operations/131 Disaster Recovery PhasesMaintenance.mp4 |
63 MB |
UD72/08 Security Operations/132 Importance of Lighting.mp4 |
14.6 MB |
UD72/08 Security Operations/133 Access Control.mp4 |
69.8 MB |
UD72/08 Security Operations/134 Building and Inside Security.mp4 |
2.7 MB |
UD72/08 Security Operations/135 Conclusion.mp4 |
3 MB |
UD72/09 Software Development Security/136 Software Development Security.mp4 |
2.6 MB |
UD72/09 Software Development Security/137 Environments.mp4 |
4.4 MB |
UD72/09 Software Development Security/138 Distributed Data Processing and Agents.mp4 |
38.5 MB |
UD72/09 Software Development Security/139 Threats in the Software Environment.mp4 |
42.3 MB |
UD72/09 Software Development Security/140 System Life Cycle and Systems Development.mp4 |
67.7 MB |
UD72/09 Software Development Security/141 Software Development Methods.mp4 |
14.6 MB |
UD72/09 Software Development Security/142 Object-Oriented Programming Terms.mp4 |
9.8 MB |
UD72/09 Software Development Security/143 Object Request Brokers.mp4 |
14.3 MB |
UD72/09 Software Development Security/144 Software Security and Assurance.mp4 |
80.9 MB |
UD72/09 Software Development Security/145 Audit and Assurance Mechanisms.mp4 |
4.7 MB |
UD72/09 Software Development Security/146 Assessing the Effectiveness of Software Security.mp4 |
25.1 MB |
UD72/09 Software Development Security/147 Database.mp4 |
18.7 MB |
UD72/09 Software Development Security/148 Data Warehousing.mp4 |
29.8 MB |
UD72/09 Software Development Security/149 Malwares.mp4 |
26.4 MB |
UD72/09 Software Development Security/150 Importance and Role of Knowledge Management.mp4 |
8.9 MB |
UD72/09 Software Development Security/151 Web Application Environment.mp4 |
25.2 MB |
UD72/09 Software Development Security/152 OWASP Secure Coding Practices.mp4 |
31.5 MB |
UD72/09 Software Development Security/153 Conclusion.mp4 |
5.9 MB |