1. Урок 1. 00:08:45
    Course Introduction
  2. Урок 2. 00:01:44
    About the Training Architect
  3. Урок 3. 00:03:16
    Course Prerequisites
  4. Урок 4. 00:04:33
    How to Get Help
  5. Урок 5. 00:17:15
    CIA Triad: Confidentiality
  6. Урок 6. 00:06:10
    CIA Triad: Integrity
  7. Урок 7. 00:07:00
    CIA Triad: Availability
  8. Урок 8. 00:03:24
    Identification, Authentication, Authorization, Auditing, and Accounting
  9. Урок 9. 00:09:13
    Threat Modeling
  10. Урок 10. 00:08:12
    Security Policies
  11. Урок 11. 00:09:00
    Risk Management: Part 1
  12. Урок 12. 00:08:54
    Risk Management: Part 2
  13. Урок 13. 00:06:41
    Risk Management: Part 3
  14. Урок 14. 00:14:19
    Laws, Standards and Regulations
  15. Урок 15. 00:04:15
    Professional Ethics
  16. Урок 16. 00:08:45
    Classifying Data and Assets
  17. Урок 17. 00:07:24
    Data Ownership
  18. Урок 18. 00:07:23
    Storing and Deposing of data
  19. Урок 19. 00:05:14
    Introduction
  20. Урок 20. 00:03:19
    Asymmetric and Symmetric Encryption
  21. Урок 21. 00:03:26
    Ciphers
  22. Урок 22. 00:07:01
    Public Key Infrastructure (PKI)
  23. Урок 23. 00:11:46
    Hashing Algorithms
  24. Урок 24. 00:09:06
    Cryptographic Attacks
  25. Урок 25. 00:12:24
    Security Design Principles
  26. Урок 26. 00:05:00
    Security Models
  27. Урок 27. 00:11:13
    System Security Requirements
  28. Урок 28. 00:10:46
    Physical Security: Part 1
  29. Урок 29. 00:08:06
    Physical Security: Part 2
  30. Урок 30. 00:01:24
    Threats vs. Attacks
  31. Урок 31. 00:05:39
    Motives
  32. Урок 32. 00:12:09
    Attack Vectors
  33. Урок 33. 00:08:46
    Threat Classification
  34. Урок 34. 00:03:39
    Attack Classification
  35. Урок 35. 00:07:10
    OSI vs. TCP/IP
  36. Урок 36. 00:07:50
    TCP/IP
  37. Урок 37. 00:13:53
    Wireless Access Point
  38. Урок 38. 00:05:16
    Wireless Network Attacks
  39. Урок 39. 00:16:27
    Firewalls
  40. Урок 40. 00:07:03
    Network Hardware
  41. Урок 41. 00:04:24
    Network Topologies
  42. Урок 42. 00:12:02
    Network Security Mechanisms
  43. Урок 43. 00:11:18
    Email Security
  44. Урок 44. 00:08:01
    VPN and Virtualization
  45. Урок 45. 00:02:32
    Network Address Translation (NAT)
  46. Урок 46. 00:04:50
    Wide-Area Networks (WANs)
  47. Урок 47. 00:12:23
    Network Attack Mitigation
  48. Урок 48. 00:07:45
    Identification and Authentication: Part 1
  49. Урок 49. 00:03:18
    Identification and Authentication: Part 2
  50. Урок 50. 00:08:09
    Identification and Authentication: Part 3
  51. Урок 51. 00:04:54
    Access Control
  52. Урок 52. 00:06:43
    Security Assessments and Audits
  53. Урок 53. 00:17:33
    Penetration Testing
  54. Урок 54. 00:12:27
    Vulnerability Assessments
  55. Урок 55. 00:08:14
    Software Testing
  56. Урок 56. 00:19:36
    Security Operations
  57. Урок 57. 00:03:13
    Responding to Incidents
  58. Урок 58. 00:05:41
    Log - Monitor - Audit
  59. Урок 59. 00:06:49
    The Software Development Lifecycle (SDLC)
  60. Урок 60. 00:19:39
    Data and Information Storage
  61. Урок 61. 00:09:44
    Malicious Code: Part 1
  62. Урок 62. 00:06:28
    Malicious Code: Part 2
  63. Урок 63. 00:13:37
    How to Prepare for the Exam
  64. Урок 64. 00:02:23
    What's Next After Certification?