Chapter 1 : Information Security Overview
Topic : The Importance of Information Protection
Content : explanation
24 MB ,10:56 MIN , THEORY
Chapter 1 : Information Security Overview
Topic : The Evolution of Information Security
Content : explanation
24 MB ,11:26 MIN , THEORY
Chapter 1 : Justifying Security Investment
Topic : Justifying Security Investment
Content : explanation
21 MB ,9:41 MIN , THEORY
Chapter 1 : Information Security Overview
Topic : Security Methodology
Content : explanation
22 MB ,10:2 MIN , THEORY
Chapter 1 : Information Security Overview
Topic : How to Build a Security Program
Content : explanation
12 MB ,5:41 MIN , THEORY
Chapter 1 : Information Security Overview
Topic : The Impossible Job, The Weakest Link
Content : explanation
27 MB ,13:36 MIN , THEORY
Chapter 1 : Information Security Overview
Topic : Strategy and Tactics
Content : explanation
6 MB ,2:57 MIN , THEORY
Chapter 1 : Information Security Overview
Topic : Business Processes vs. Technical Controls
Content : explanation
8 MB ,4:30 MIN , THEORY
Chapter 2 : Risk Analysis
Topic : Types of Attacks
Content : explanation
201 MB ,1:39:59 MIN , THEORY
Chapter 3 : Secure Design Principles
Topic : The CIA Triad and Other Models
Content : explanation
21 MB ,10:5 MIN , THEORY
Chapter 3 : Secure Design Principles
Topic : Defense Models
Content : explanation
10 MB ,4:34 MIN , THEORY
Chapter 3 : Secure Design Principles
Topic : Zones of Trust
Content : explanation
26 MB ,12:40 MIN , THEORY
Chapter 3 : Secure Design Principles
Topic : Best Practices for Network Defense
Content : explanation
147 MB ,1:4:5 MIN , THEORY
Chapter 1 : Authentication and Authorization
Topic : Authentication
Content : explanation
208 MB ,1:31:54 MIN , THEORY
Chapter 1 : Authentication and Authorization
Topic : Authorization
Content : explanation
58 MB ,26:37 MIN , THEORY
Chapter 2 : Encryption
Topic : A Brief History of Encryption
Content : explanation
26 MB ,12:20 MIN , THEORY
Chapter 2 : Encryption
Topic : Symmetric-Key Cryptography
Content : explanation
31 MB ,13:19 MIN , THEORY
Chapter 2 : Encryption
Topic : Public Key Cryptography
Content : explanation
18 MB ,8:24 MIN , THEORY
Chapter 2 : Encryption
Topic : Public Key Infrastructure
Content : explanation
42 MB ,20:6 MIN , THEORY
Chapter 3 : Storage Security
Topic : Storage Security Evolution, Modern Storage Security
Content : explanation
133 MB ,1:0:5 MIN , THEORY
Chapter 3 : Storage Security
Topic : Risk Remediation
Content : explanation
109 MB ,52:27 MIN , THEORY
Chapter 4 : Database Security
Topic : General Database Security Concepts, Understanding Database Security Layers
Content : explanation
56 MB ,22:24 MIN , THEORY
Chapter 4 : Database Security
Topic : Understanding Database Level Security
Content : explanation
27 MB ,12:0 MIN , THEORY
Chapter 4 : Database Security
Topic : Using Application Security
Content : explanation
21 MB ,10:5 MIN , THEORY
Chapter 4 : Database Security
Topic : Database Backup and Recovery
Content : explanation
21 MB ,9:21 MIN , THEORY
Chapter 4 : Database Security
Topic : Keeping Your Servers Up to Date, Database Auditing and Monitoring
Content : explanation
14 MB ,6:38 MIN , THEORY
Chapter 1 : Secure Network Design
Topic : Introduction to Secure Network Design
Content : explanation
23 MB ,9:35 MIN , THEORY
Chapter 1 : Secure Network Design
Topic : Performance
Content : explanation
19 MB ,9:14 MIN , THEORY
Chapter 1 : Secure Network Design
Topic : Availability
Content : explanation
14 MB ,6:22 MIN , THEORY
Chapter 2 : Network Device Security
Topic : Switch and Router Basics
Content : explanation
56 MB ,26:47 MIN , THEORY
Chapter 2 : Network Device Security
Topic : Network Hardening
Content : explanation
76 MB ,32:43 MIN , THEORY
Chapter 3 : Firewalls
Topic : Overview, The Evolution of Firewalls
Content : explanation
35 MB ,14:41 MIN , THEORY
Chapter 3 : Firewalls
Topic : Core Firewall Functions
Content : explanation
30 MB ,12:55 MIN , THEORY
Chapter 3 : Firewalls
Topic : Additional Firewall Capabilities, Firewall Design
Content : explanation
11 MB ,5:28 MIN , THEORY
Chapter 4 : Wireless Network Security
Topic : Radio Frequency Security Basics
Content : explanation
86 MB ,37:32 MIN , THEORY
Chapter 4 : Wireless Network Security
Topic : DataLink Layer Wireless Security Features, Flaws, and Threats
Content : explanation
54 MB ,24:11 MIN , THEORY
Chapter 4 : Wireless Network Security
Topic : Wireless Vulnerabilities and Mitigations
Content : explanation
23 MB ,10:16 MIN , THEORY
Chapter 4 : Wireless Network Security
Topic : Wireless Network Hardening Practices and Recommendations
Content : explanation
37 MB ,16:44 MIN , THEORY
Chapter 4 : Wireless Network Security
Topic : Wireless Intrusion Detection and Prevention, Wireless Network Positioning and Secure Gateways
Content : explanation
33 MB ,15:52 MIN , THEORY
Chapter 1 : Intrusion Detection and Prevention Systems
Topic : IDS Concepts
Content : explanation
112 MB ,54:5 MIN , THEORY
Chapter 1 : Intrusion Detection and Prevention Systems
Topic : IDS Types and Detection Models
Content : explanation
72 MB ,33:27 MIN , THEORY
Chapter 1 : Intrusion Detection and Prevention Systems
Topic : IDS Features
Content : explanation
32 MB ,15:41 MIN , THEORY
Chapter 1 : Intrusion Detection and Prevention Systems
Topic : IDS Deployment Considerations
Content : explanation
26 MB ,13:34 MIN , THEORY
Chapter 1 : Intrusion Detection and Prevention Systems
Topic : Security Information and Event Management (SIEM)
Content : explanation
31 MB ,13:46 MIN , THEORY
Chapter 2 : Voice over IP (VoIP) and PBX Security
Topic : Background, VoIP Components
Content : explanation
172 MB ,1:19:42 MIN , THEORY
Chapter 2 : Voice over IP (VoIP) and PBX Security
Topic : VoIP Vulnerabilities and Countermeasures
Content : explanation
88 MB ,39:40 MIN , THEORY
Chapter 2 : Voice over IP (VoIP) and PBX Security
Topic : PBX
Content : explanation
19 MB ,9:39 MIN , THEORY
Chapter 2 : Voice over IP (VoIP) and PBX Security
Topic : TEM: Telecom Expense Management
Content : explanation
3 MB ,1:34 MIN , THEORY
Chapter 3 : Operating System Security Models
Topic : Operating System Models
Content : explanation
53 MB ,24:13 MIN , THEORY
Chapter 3 : Operating System Security Models
Topic : Classic Security Models
Content : explanation
28 MB ,13:48 MIN , THEORY
Chapter 3 : Operating System Security Models
Topic : Reference Monitor
Content : explanation
5 MB ,2:35 MIN , THEORY
Chapter 3 : Operating System Security Models
Topic : Trustworthy Computing
Content : explanation
15 MB ,7:19 MIN , THEORY
Chapter 3 : Operating System Security Models
Topic : International Standards for Operating System Security
Content : explanation
16 MB ,6:44 MIN , THEORY
Chapter 1 : Virtual Machines and Cloud Computing
Topic : Virtual Machines
Content : explanation
121 MB ,49:9 MIN , THEORY
Chapter 1 : Virtual Machines and Cloud Computing
Topic : Cloud Computing
Content : explanation
130 MB ,1:0:23 MIN , THEORY
Chapter 2 : Secure Application Design
Topic : Secure Development Lifecycle
Content : explanation
21 MB ,9:49 MIN , THEORY
Chapter 2 : Secure Application Design
Topic : Application Security Practices
Content : explanation
31 MB ,13:44 MIN , THEORY
Chapter 2 : Secure Application Design
Topic : Web Application Security
Content : explanation
69 MB ,33:18 MIN , THEORY
Chapter 2 : Secure Application Design
Topic : Client Application Security, Remote Administration Security
Content : explanation
21 MB ,10:4 MIN , THEORY
Chapter 3 : Physical Security
Topic : Classification of Assets, Physical Vulnerability Assessment, Choosing Site Location for Security, Securing Assets: Locks and Entry Controls, Physical Intrusion Detection
Content : explanation
29 MB ,12:57 MIN , THEORY