ITPT141/0 - Overview.mp4 |
145 MB |
ITPT141/1.11 - Confidentiality, Integrity, Availability (CIA).mp4 |
568 MB |
ITPT141/1.12 - Confidentiality, Integrity, Availability (CIA) Pt2.mp4 |
368.3 MB |
ITPT141/1.21 - Evaluate, Apply Security Governance Principles.mp4 |
394.5 MB |
ITPT141/1.22 - Evaluate, Apply Security Goverance Principles Pt2.mp4 |
1.1 GB |
ITPT141/1.31 - Determine Compliance Requirements.mp4 |
432.8 MB |
ITPT141/1.32 - Determine Compliance Requirements Part 2.mp4 |
871.4 MB |
ITPT141/1.33 - Determine Compliance Requirements Part 3.mp4 |
395.9 MB |
ITPT141/1.41 - Understand Legal and Regulatory Issues.mp4 |
505 MB |
ITPT141/1.42 - Understand Legal and Regulatory Issues Part 2.mp4 |
491 MB |
ITPT141/1.51 - Understand, adhere to and promote ethics.mp4 |
128.8 MB |
ITPT141/1.61 - Policy, Standards, Procedures and Guidelines.mp4 |
222.9 MB |
ITPT141/1.71 - Understand Business Continuity Requirements.mp4 |
809.5 MB |
ITPT141/1.72 - Understand Business Continuity Requirements Part 2.mp4 |
743.1 MB |
ITPT141/1.73 - Understand Business Continuity Requirements Part 3.mp4 |
600.9 MB |
ITPT141/1.81 - Personnel, Security Policies and Procedures.mp4 |
653.6 MB |
ITPT141/1.911 - Understand_Apply Risk Management Concepts.mp4 |
563.6 MB |
ITPT141/1.912 - Understand_Apply Risk Management Concepts Part 2.mp4 |
573.8 MB |
ITPT141/1.913 - Understand_Apply Risk Management Concepts Part 3.mp4 |
426 MB |
ITPT141/1.914 - Understand_Apply Risk Management Concepts Part 4.mp4 |
449.8 MB |
ITPT141/1.915 - Understand_Apply Risk Management Concepts Part 5.mp4 |
453.4 MB |
ITPT141/1.921 - Understanding_Apply Threat Modeling Concepts.mp4 |
635.1 MB |
ITPT141/1.931 - Apply Risk Management to the Supply Chain.mp4 |
474 MB |
ITPT141/1.941 - Security Awareness_Education and Training.mp4 |
207 MB |
ITPT141/1.951 - Security and Risk Management - Key Points.mp4 |
325.7 MB |
ITPT141/1.961 - CIA Deep Dive.mp4 |
806 MB |
ITPT141/1.971 - Organizational Roles and Responsibilities.mp4 |
361.5 MB |
ITPT141/1.981 - Risk Terminology and Concepts.mp4 |
484.3 MB |
ITPT141/2.11 - Identify and Classify Information and Assets.mp4 |
497.6 MB |
ITPT141/2.21 - Determine and Maintain Information_Asset Ownership.mp4 |
326.1 MB |
ITPT141/2.31 - Protect Privacy.mp4 |
697.4 MB |
ITPT141/2.32 - Protect Privacy Part 2.mp4 |
748.9 MB |
ITPT141/2.41 - Ensure Appropriate Asset Retention.mp4 |
314.1 MB |
ITPT141/2.51 - Determine Data Security Controls.mp4 |
582.8 MB |
ITPT141/2.52 - Determine Data Security Controls Part 2.mp4 |
583.1 MB |
ITPT141/2.53 - Determine Data Security Controls Part 3.mp4 |
556.6 MB |
ITPT141/2.61 - Establish Asset Handling Requirements.mp4 |
603.2 MB |
ITPT141/2.71 - Asset Security - Key Points.mp4 |
176.1 MB |
ITPT141/3.11 - Implement and Manage Engineering Processes.mp4 |
742.8 MB |
ITPT141/3.21 - Fundamental Concepts of Systems and Security.mp4 |
656.3 MB |
ITPT141/3.22 - Fundamental Concepts of Systems and Security Pt.2.mp4 |
473.2 MB |
ITPT141/3.23 - Fundamental Concepts of Systems and Security Pt.3.mp4 |
526.9 MB |
ITPT141/3.24 - Fundamental Concepts of Systems and Security Pt.4.mp4 |
456.1 MB |
ITPT141/3.25 - Fundamental Concepts of Systems and Security Pt.5.mp4 |
467.8 MB |
ITPT141/3.31 - Controls Based on Security Requirements.mp4 |
365.3 MB |
ITPT141/3.32 - Controls Based on Security Requirements Part 2.mp4 |
293.9 MB |
ITPT141/3.41 - Vulnerabilities of Security Architecture.mp4 |
760 MB |
ITPT141/3.42 - Vulnerabilities of Security Architecture Part 2.mp4 |
560.2 MB |
ITPT141/3.43 - Vulnerabilities of Security Architecture Part 3.mp4 |
627.7 MB |
ITPT141/3.44 - Vulnerabilities of Security Architectures Part 4.mp4 |
434.1 MB |
ITPT141/3.51 - Vulnerabilities in Web-Based Systems.mp4 |
406.4 MB |
ITPT141/3.52 - Vulnerabilities in Web-Based Systems Part 2.mp4 |
379 MB |
ITPT141/3.61 - Vulnerabilities in Mobile Systems.mp4 |
307.7 MB |
ITPT141/3.71 - Vulnerabilities in Embedded Devices.mp4 |
258 MB |
ITPT141/3.81 - Apply Cryptography.mp4 |
442.7 MB |
ITPT141/3.82 - Apply Cryptography Part 2.mp4 |
566.2 MB |
ITPT141/3.83 - Apply Cryptography Part 3.mp4 |
507.3 MB |
ITPT141/3.84 - Apply Cryptography Part 4.mp4 |
380.8 MB |
ITPT141/3.85 - Apply Cryptography Part 5.mp4 |
455.4 MB |
ITPT141/3.86 - Apply Cryptography Part 6.mp4 |
429.3 MB |
ITPT141/3.87 - Apply Cryptography Part 7.mp4 |
290.5 MB |
ITPT141/3.88 - Apply Cryptography Part 8.mp4 |
541.7 MB |
ITPT141/3.891 - Apply Cryptography Part 9.mp4 |
457.4 MB |
ITPT141/3.892 - Apply Cryptography Part 10.mp4 |
478.8 MB |
ITPT141/3.893 - Apply Cryptography Part 11.mp4 |
523.4 MB |
ITPT141/3.894 - Apply Cryptography Part 12.mp4 |
513.4 MB |
ITPT141/3.895 - Apply Cryptography Part 13.mp4 |
527 MB |
ITPT141/3.91 - Site_Facility Design and Security.mp4 |
667.9 MB |
ITPT141/3.912 - Site_Facility Design and Security Part 2.mp4 |
664.1 MB |
ITPT141/3.913 - Site_Facility Design and Security Part 3.mp4 |
474.7 MB |
ITPT141/3.914 - Site_Facility Design and Security Part 4.mp4 |
518.1 MB |
ITPT141/3.921 - Security Architecture and Engineering - Key Points.mp4 |
250.8 MB |
ITPT141/4.11 - Secure Design Principles in Networks.mp4 |
651.5 MB |
ITPT141/4.12 - Secure Design Principles in Networks Part 2.mp4 |
787.9 MB |
ITPT141/4.13 - Secure Design Principles in Networks Part 3.mp4 |
859.5 MB |
ITPT141/4.14 - Secure Design Principles in Networks Part 4.mp4 |
648 MB |
ITPT141/4.15 - Secure Design Principles in Networks Part 5.mp4 |
776.8 MB |
ITPT141/4.16 - Secure Design Principles in Networks Part 6.mp4 |
403.4 MB |
ITPT141/4.17 - Secure Design Principles in Networks Part 7.mp4 |
576.5 MB |
ITPT141/4.18 - Secure Design Principles in Networks Part 8.mp4 |
667.1 MB |
ITPT141/4.19 - Secure Design Principles in Networks Part 9.mp4 |
493.6 MB |
ITPT141/4.192 - Secure Design Principles in Networks Part 10.mp4 |
664.3 MB |
ITPT141/4.193 - Secure Design Principles in Networks Part 11.mp4 |
408.2 MB |
ITPT141/4.194 - Secure Design Principles in Networks Part 12.mp4 |
497.4 MB |
ITPT141/4.21 - Secure Network Components.mp4 |
687.9 MB |
ITPT141/4.22 - Secure Network Components Part 2.mp4 |
754.4 MB |
ITPT141/4.23 - Secure Network Components Part 3.mp4 |
639.9 MB |
ITPT141/4.24 - Secure Network Components Part 4.mp4 |
604.9 MB |
ITPT141/4.25 - Secure Network Components Part 5.mp4 |
452.6 MB |
ITPT141/4.31 - Implement Secure Communication Channels.mp4 |
495.3 MB |
ITPT141/4.32 - Implement Secure Communication Channels Part 2.mp4 |
423 MB |
ITPT141/4.33 - Implement Secure Communication Channels Part 3.mp4 |
533.9 MB |
ITPT141/4.34 - Implement Secure Communication Channels Part 4.mp4 |
480.3 MB |
ITPT141/4.35 - Implement Secure Communication Channels Part 5.mp4 |
392.2 MB |
ITPT141/4.36 - Implement Secure Communication Channels Part 6.mp4 |
369.7 MB |
ITPT141/4.41 - Communication and Network Security - Key Points.mp4 |
186.8 MB |
ITPT141/5.11 - Control Physical and Logical Access to Assets.mp4 |
454.3 MB |
ITPT141/5.12 - Control Physical and Logical Access to Assets Pt 2.mp4 |
534.6 MB |
ITPT141/5.21 - Manage Identification and Authentication.mp4 |
522.1 MB |
ITPT141/5.22 - Manage Identification and Authentication Part 2.mp4 |
670.4 MB |
ITPT141/5.23 - Manage Identification and Authentication Part 3.mp4 |
225.5 MB |
ITPT141/5.31 - Integrate Identity as a Third-Party Service.mp4 |
717.6 MB |
ITPT141/5.41 - Implement_Manage Authorization Mechanisms.mp4 |
502.1 MB |
ITPT141/5.42 - Implement_Manage Authorization Mechanisms Pt.2.mp4 |
568.4 MB |
ITPT141/5.51 - Manage Identity and Access Provisioning Lifecycle.mp4 |
390.5 MB |
ITPT141/5.61 - Access Control Attacks.mp4 |
510.7 MB |
ITPT141/5.62 - Access Control Attacks Part 2.mp4 |
300.2 MB |
ITPT141/5.71 - Identity and Access Management - Key Points.mp4 |
301.8 MB |
ITPT141/6.11 - Assessment, Test and Audit.mp4 |
423.1 MB |
ITPT141/6.12 - Assessment, Test and Audit Part 2.mp4 |
616.2 MB |
ITPT141/6.21 - Conduct Security Control Testing.mp4 |
647.5 MB |
ITPT141/6.22 - Conduct Security Control Testing Part 2.mp4 |
571.4 MB |
ITPT141/6.23 - Conduct Security Control Testing Part 3.mp4 |
486.4 MB |
ITPT141/6.31 - Collect Security Process Data.mp4 |
467.9 MB |
ITPT141/6.41 - Security Assessment and Testing - Key Points.mp4 |
127.2 MB |
ITPT141/7.11 - Understand and Support Investigations.mp4 |
521.5 MB |
ITPT141/7.21 - Conduct Logging and Monitoring Activities.mp4 |
291.5 MB |
ITPT141/7.31 - Provisioning and Protecting Resources.mp4 |
596.9 MB |
ITPT141/7.32 - Provisioning and Protecting Resources Part 2.mp4 |
301 MB |
ITPT141/7.41 - Apply Foundational Security Operation Concepts.mp4 |
235 MB |
ITPT141/7.51 - Conduct Incident Management.mp4 |
328.4 MB |
ITPT141/7.61 - Detective and Preventative Measures.mp4 |
537.4 MB |
ITPT141/7.62 - Detective and Preventative Measures Part 2.mp4 |
772.1 MB |
ITPT141/7.71 - Patch and Vulnerability Management.mp4 |
230.3 MB |
ITPT141/7.81 - Understand Change Management.mp4 |
355.9 MB |
ITPT141/7.91 - Implement Recovery Strategies.mp4 |
519 MB |
ITPT141/7.912 - Implement Recovery Strategies Part 2.mp4 |
385.4 MB |
ITPT141/7.913 - Implement Recovery Strategies Part 3.mp4 |
508.2 MB |
ITPT141/7.914 - Implement Recovery Strategies Part 4.mp4 |
323.6 MB |
ITPT141/7.915 - Implement Recovery Strategies Part 5.mp4 |
507.4 MB |
ITPT141/7.921 - Implement and Test BCDR.mp4 |
713.7 MB |
ITPT141/7.922 - Implement and Test BCDR Part 2.mp4 |
654 MB |
ITPT141/7.923 - Implement and Test BCDR Part 3.mp4 |
193.6 MB |
ITPT141/7.931 - Implement and Manage Physical Security.mp4 |
724.2 MB |
ITPT141/7.932 - Implement and Manage Physical Security Part 2.mp4 |
638.8 MB |
ITPT141/7.94 - Personnel Safety and Security Concerns.mp4 |
235 MB |
ITPT141/7.95 - Security Operations - Key Points.mp4 |
317.4 MB |
ITPT141/8.11 - Security in the SDLC.mp4 |
893 MB |
ITPT141/8.12 - Security in the SDLC Part 2.mp4 |
436.8 MB |
ITPT141/8.13 - Security in the SDLC Part 3.mp4 |
639.1 MB |
ITPT141/8.14 - Security in the SDLC Part 4.mp4 |
671.7 MB |
ITPT141/8.15 - Security in the SDLC Part 5.mp4 |
539.4 MB |
ITPT141/8.16 - Security in the SDLC Part 6.mp4 |
148.4 MB |
ITPT141/8.21 - Security Controls in Dev Environments.mp4 |
467.8 MB |
ITPT141/8.22 - Security Controls in Dev Environments Part 2.mp4 |
734.2 MB |
ITPT141/8.23 - Security Controls in Dev Environments Part 3.mp4 |
821.9 MB |
ITPT141/8.24 - Security Controls in Dev Environments Part 4.mp4 |
613.6 MB |
ITPT141/8.25 - Security Controls in Dev Environments Part 5.mp4 |
563.2 MB |
ITPT141/8.26 - Security Controls in Dev Environments Part 6.mp4 |
515.5 MB |
ITPT141/8.27 - Security Controls in Dev Environments Part 7.mp4 |
565.4 MB |
ITPT141/8.28 - Security Controls in Dev Environments Part 8.mp4 |
635 MB |
ITPT141/8.29 - Security Controls in Dev Environments Part 9.mp4 |
385.9 MB |
ITPT141/8.31 - Assess Effectiveness of Software Security.mp4 |
554.4 MB |
ITPT141/8.41 - Assess Security Impact of Acquired Software.mp4 |
218.7 MB |
ITPT141/8.51 - Secure Coding Guidelines and Standards.mp4 |
462.7 MB |
ITPT141/8.61 - Databases and Data Warehouses.mp4 |
567.8 MB |
ITPT141/8.62 - Databases and Data Warehouses Part 2.mp4 |
426.7 MB |
ITPT141/8.71 - Types of Storage.mp4 |
193.5 MB |
ITPT141/8.81 - Knowledge-based Systems.mp4 |
263.3 MB |
ITPT141/8.91 - Software Development Security - Key Points.mp4 |
191.8 MB |