03-07-2025, 05:18 AM
![[Image: 541636287_oip.jpg]](https://img100.pixhost.to/images/791/541636287_oip.jpg)
3.8 GB | 00:18:01 | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English
Files Included :
1 CIA Concepts (18.81 MB)
10 DR, BC, and BIA (20.96 MB)
11 Security Awareness Training (22.72 MB)
12 Intellectual Property and Licensing (39.03 MB)
13 Policy Life Cycle (28.17 MB)
14 Threat Modeling (37.33 MB)
15 Supply Chain Risk Management (45.82 MB)
2 Cyber Crime Terms and Vocabulary (23.39 MB)
3 27000 Series Framework (32.54 MB)
4 Due Care and Due Diligence (18.25 MB)
5 Inside Threats and Ethics (20.1 MB)
6 Policies Start with Senior Management (18.84 MB)
7 Defining Risk (15.58 MB)
8 Control Types (16.75 MB)
9 Compliance Requirements (26.88 MB)
1 Software Development Security (13.7 MB)
2 Software Development Life Cycle (SDLC) (12.96 MB)
3 Change Management (17.65 MB)
4 Software Capability Maturity Model (CMMI) (15.1 MB)
5 Programming Concepts (14.91 MB)
6 Programming Methodology (21.06 MB)
7 Common Software Vulnerabilities (26.08 MB)
8 Web Software Vulnerabilities (22.95 MB)
1 Identity and Access Management (IAM) (102.35 MB)
2 Security Assessment and Testing (40.1 MB)
3 Security Operations (105.73 MB)
4 Managing Threats (66.63 MB)
5 Development Methodologies and Maturity Models (47.27 MB)
6 Securing Development Environments (90.54 MB)
7 Software Security (35.51 MB)
1 Classifying Assets and Information (89.69 MB)
2 Stewards and Custodians of Assets and Information (43.2 MB)
3 Protecting Privacy (37.23 MB)
4 Data Retention (35 MB)
5 Determining Security Controls (31.41 MB)
6 Data State and Resources for Security Control Frameworks (18.64 MB)
7 Information and Asset Handling Policies (56.79 MB)
1 Types of Investigations (31.89 MB)
2 Evidence and the Investigation Process (36.31 MB)
3 Types of Computer Crimes (35.4 MB)
4 ISC2 Code of Ethics (41.27 MB)
5 Asset Management (45.39 MB)
6 Data Roles (28.11 MB)
7 Managing the Data Lifecycle (78.73 MB)
1 Designing with Security in Mind (41.88 MB)
10 Symmetric Encryption Concepts (23.54 MB)
11 Symmetric Keys and Algorithms (15.22 MB)
12 Asymmetric Encryption Concepts (20.45 MB)
13 Asymmetric Encryption Concepts (34.35 MB)
14 Hashing for Integrity (18.97 MB)
15 Asymmetrical Encryption with Email (22.89 MB)
16 PKI and Revoking Certificates (15.47 MB)
17 Power Considerations (20.29 MB)
2 Security Model Fundamentals (52.92 MB)
3 System Security Requirements (48.92 MB)
4 Hardware and Firmware Security Capabilities (45.18 MB)
5 Assessing Vulnerabilities (46.25 MB)
6 Vulnerabilities in Web-Based Systems (35.99 MB)
7 Vulnerabilities in Mobile Systems (23.68 MB)
8 Vulnerabilities in Embedded Devices (45.57 MB)
9 Facility Design and Controls (38.33 MB)
1 OSI and IP Models (34.19 MB)
2 IP Networking (50.48 MB)
3 Wi-Fi Security Considerations (58.83 MB)
4 Network Component Security (49.05 MB)
5 Virtualized Network Security Considerations (26.24 MB)
6 Securing Communications Channels (53.85 MB)
1 Secure Design Principals (63.29 MB)
2 Assess and Mitigate Vulnerabilities (88.52 MB)
3 Cryptanalytic Attacks (87.41 MB)
4 Resiliency Technologies (58.98 MB)
5 Communications and Network Security (86.12 MB)
1 Identity Management (IdM) (47.59 MB)
2 AAA as Part of Our Controls (26.8 MB)
3 Centralized Authentication with RADIUS (24.22 MB)
4 Using LDAP with Directory Services (18.33 MB)
5 Multi-Factor Authentication Categories (10.67 MB)
6 Biometric Acceptance and Rejection Rates (16.17 MB)
7 Options for Biometric Authentication (19.46 MB)
8 DAC, MAC, and RBAC (22.49 MB)
9 IAM Provisioning Lifecycle (42.8 MB)
1 Testing, Auditing, and Assessment Overview (43.18 MB)
2 Penetration Testing (38.73 MB)
3 Vulnerability Scans and Assessments (20.62 MB)
4 Reviewing and Testing Code (31.23 MB)
5 Security-Related Data Collection (39.72 MB)
6 Continuous Monitoring (31.2 MB)
1 Supporting Investigations (18.89 MB)
10 Incident Response Overview (32.55 MB)
11 Phases of Incident Handling (8.3 MB)
12 Improving Security with Configuration Management (32.43 MB)
13 Patch Management (34.06 MB)
14 Change Management (59.62 MB)
15 Comparing IDS and IPS (21.25 MB)
16 IDS and IPS Detection Methods (26.06 MB)
17 Network vs Host-Based IDS and IPS (29.19 MB)
18 IDS and IPS Alarms (20.66 MB)
19 Traditional and Next-Generation Firewalls (22.93 MB)
2 Types of Evidence (19.96 MB)
20 Categorizing Vulnerabilities with CVSS (17.38 MB)
21 Calculating Vulnerability Scores (21.51 MB)
22 Honeypots (23.97 MB)
23 Fault Tolerance for Availability (16.73 MB)
24 DR and Alternate Sites (17.71 MB)
25 HW and SW Planning for DR (11.56 MB)
26 Directing and Communicating DR (20.91 MB)
27 Personnel Safety and Security (30.48 MB)
3 Chain of Custody (16.94 MB)
4 Forensics Process (16.76 MB)
5 Separation of Duties (19.38 MB)
6 Media Management (21.37 MB)
7 Backups (27.13 MB)
8 Logging with Separation of Duties (26.28 MB)
9 RAID Concepts (8.49 MB)]
Screenshot
![[Image: YOsmVAhr_o.jpg]](https://images2.imgbox.com/b9/09/YOsmVAhr_o.jpg)
1 CIA Concepts (18.81 MB)
10 DR, BC, and BIA (20.96 MB)
11 Security Awareness Training (22.72 MB)
12 Intellectual Property and Licensing (39.03 MB)
13 Policy Life Cycle (28.17 MB)
14 Threat Modeling (37.33 MB)
15 Supply Chain Risk Management (45.82 MB)
2 Cyber Crime Terms and Vocabulary (23.39 MB)
3 27000 Series Framework (32.54 MB)
4 Due Care and Due Diligence (18.25 MB)
5 Inside Threats and Ethics (20.1 MB)
6 Policies Start with Senior Management (18.84 MB)
7 Defining Risk (15.58 MB)
8 Control Types (16.75 MB)
9 Compliance Requirements (26.88 MB)
1 Software Development Security (13.7 MB)
2 Software Development Life Cycle (SDLC) (12.96 MB)
3 Change Management (17.65 MB)
4 Software Capability Maturity Model (CMMI) (15.1 MB)
5 Programming Concepts (14.91 MB)
6 Programming Methodology (21.06 MB)
7 Common Software Vulnerabilities (26.08 MB)
8 Web Software Vulnerabilities (22.95 MB)
1 Identity and Access Management (IAM) (102.35 MB)
2 Security Assessment and Testing (40.1 MB)
3 Security Operations (105.73 MB)
4 Managing Threats (66.63 MB)
5 Development Methodologies and Maturity Models (47.27 MB)
6 Securing Development Environments (90.54 MB)
7 Software Security (35.51 MB)
1 Classifying Assets and Information (89.69 MB)
2 Stewards and Custodians of Assets and Information (43.2 MB)
3 Protecting Privacy (37.23 MB)
4 Data Retention (35 MB)
5 Determining Security Controls (31.41 MB)
6 Data State and Resources for Security Control Frameworks (18.64 MB)
7 Information and Asset Handling Policies (56.79 MB)
1 Types of Investigations (31.89 MB)
2 Evidence and the Investigation Process (36.31 MB)
3 Types of Computer Crimes (35.4 MB)
4 ISC2 Code of Ethics (41.27 MB)
5 Asset Management (45.39 MB)
6 Data Roles (28.11 MB)
7 Managing the Data Lifecycle (78.73 MB)
1 Designing with Security in Mind (41.88 MB)
10 Symmetric Encryption Concepts (23.54 MB)
11 Symmetric Keys and Algorithms (15.22 MB)
12 Asymmetric Encryption Concepts (20.45 MB)
13 Asymmetric Encryption Concepts (34.35 MB)
14 Hashing for Integrity (18.97 MB)
15 Asymmetrical Encryption with Email (22.89 MB)
16 PKI and Revoking Certificates (15.47 MB)
17 Power Considerations (20.29 MB)
2 Security Model Fundamentals (52.92 MB)
3 System Security Requirements (48.92 MB)
4 Hardware and Firmware Security Capabilities (45.18 MB)
5 Assessing Vulnerabilities (46.25 MB)
6 Vulnerabilities in Web-Based Systems (35.99 MB)
7 Vulnerabilities in Mobile Systems (23.68 MB)
8 Vulnerabilities in Embedded Devices (45.57 MB)
9 Facility Design and Controls (38.33 MB)
1 OSI and IP Models (34.19 MB)
2 IP Networking (50.48 MB)
3 Wi-Fi Security Considerations (58.83 MB)
4 Network Component Security (49.05 MB)
5 Virtualized Network Security Considerations (26.24 MB)
6 Securing Communications Channels (53.85 MB)
1 Secure Design Principals (63.29 MB)
2 Assess and Mitigate Vulnerabilities (88.52 MB)
3 Cryptanalytic Attacks (87.41 MB)
4 Resiliency Technologies (58.98 MB)
5 Communications and Network Security (86.12 MB)
1 Identity Management (IdM) (47.59 MB)
2 AAA as Part of Our Controls (26.8 MB)
3 Centralized Authentication with RADIUS (24.22 MB)
4 Using LDAP with Directory Services (18.33 MB)
5 Multi-Factor Authentication Categories (10.67 MB)
6 Biometric Acceptance and Rejection Rates (16.17 MB)
7 Options for Biometric Authentication (19.46 MB)
8 DAC, MAC, and RBAC (22.49 MB)
9 IAM Provisioning Lifecycle (42.8 MB)
1 Testing, Auditing, and Assessment Overview (43.18 MB)
2 Penetration Testing (38.73 MB)
3 Vulnerability Scans and Assessments (20.62 MB)
4 Reviewing and Testing Code (31.23 MB)
5 Security-Related Data Collection (39.72 MB)
6 Continuous Monitoring (31.2 MB)
1 Supporting Investigations (18.89 MB)
10 Incident Response Overview (32.55 MB)
11 Phases of Incident Handling (8.3 MB)
12 Improving Security with Configuration Management (32.43 MB)
13 Patch Management (34.06 MB)
14 Change Management (59.62 MB)
15 Comparing IDS and IPS (21.25 MB)
16 IDS and IPS Detection Methods (26.06 MB)
17 Network vs Host-Based IDS and IPS (29.19 MB)
18 IDS and IPS Alarms (20.66 MB)
19 Traditional and Next-Generation Firewalls (22.93 MB)
2 Types of Evidence (19.96 MB)
20 Categorizing Vulnerabilities with CVSS (17.38 MB)
21 Calculating Vulnerability Scores (21.51 MB)
22 Honeypots (23.97 MB)
23 Fault Tolerance for Availability (16.73 MB)
24 DR and Alternate Sites (17.71 MB)
25 HW and SW Planning for DR (11.56 MB)
26 Directing and Communicating DR (20.91 MB)
27 Personnel Safety and Security (30.48 MB)
3 Chain of Custody (16.94 MB)
4 Forensics Process (16.76 MB)
5 Separation of Duties (19.38 MB)
6 Media Management (21.37 MB)
7 Backups (27.13 MB)
8 Logging with Separation of Duties (26.28 MB)
9 RAID Concepts (8.49 MB)]
Screenshot
![[Image: YOsmVAhr_o.jpg]](https://images2.imgbox.com/b9/09/YOsmVAhr_o.jpg)
![[Image: signature.png]](https://softwarez.info/images/avsg/signature.png)