Этот материал находится в платной подписке. Оформи премиум подписку и смотри или слушай Certified Information Systems Security Professional (CISSP), а также все другие курсы, прямо сейчас!
Премиум
  • Урок 1. 00:08:45
    Course Introduction
  • Урок 2. 00:01:44
    About the Training Architect
  • Урок 3. 00:03:16
    Course Prerequisites
  • Урок 4. 00:04:33
    How to Get Help
  • Урок 5. 00:17:15
    CIA Triad: Confidentiality
  • Урок 6. 00:06:10
    CIA Triad: Integrity
  • Урок 7. 00:07:00
    CIA Triad: Availability
  • Урок 8. 00:03:24
    Identification, Authentication, Authorization, Auditing, and Accounting
  • Урок 9. 00:09:13
    Threat Modeling
  • Урок 10. 00:08:12
    Security Policies
  • Урок 11. 00:09:00
    Risk Management: Part 1
  • Урок 12. 00:08:54
    Risk Management: Part 2
  • Урок 13. 00:06:41
    Risk Management: Part 3
  • Урок 14. 00:14:19
    Laws, Standards and Regulations
  • Урок 15. 00:04:15
    Professional Ethics
  • Урок 16. 00:08:45
    Classifying Data and Assets
  • Урок 17. 00:07:24
    Data Ownership
  • Урок 18. 00:07:23
    Storing and Deposing of data
  • Урок 19. 00:05:14
    Introduction
  • Урок 20. 00:03:19
    Asymmetric and Symmetric Encryption
  • Урок 21. 00:03:26
    Ciphers
  • Урок 22. 00:07:01
    Public Key Infrastructure (PKI)
  • Урок 23. 00:11:46
    Hashing Algorithms
  • Урок 24. 00:09:06
    Cryptographic Attacks
  • Урок 25. 00:12:24
    Security Design Principles
  • Урок 26. 00:05:00
    Security Models
  • Урок 27. 00:11:13
    System Security Requirements
  • Урок 28. 00:10:46
    Physical Security: Part 1
  • Урок 29. 00:08:06
    Physical Security: Part 2
  • Урок 30. 00:01:24
    Threats vs. Attacks
  • Урок 31. 00:05:39
    Motives
  • Урок 32. 00:12:09
    Attack Vectors
  • Урок 33. 00:08:46
    Threat Classification
  • Урок 34. 00:03:39
    Attack Classification
  • Урок 35. 00:07:10
    OSI vs. TCP/IP
  • Урок 36. 00:07:50
    TCP/IP
  • Урок 37. 00:13:53
    Wireless Access Point
  • Урок 38. 00:05:16
    Wireless Network Attacks
  • Урок 39. 00:16:27
    Firewalls
  • Урок 40. 00:07:03
    Network Hardware
  • Урок 41. 00:04:24
    Network Topologies
  • Урок 42. 00:12:02
    Network Security Mechanisms
  • Урок 43. 00:11:18
    Email Security
  • Урок 44. 00:08:01
    VPN and Virtualization
  • Урок 45. 00:02:32
    Network Address Translation (NAT)
  • Урок 46. 00:04:50
    Wide-Area Networks (WANs)
  • Урок 47. 00:12:23
    Network Attack Mitigation
  • Урок 48. 00:07:45
    Identification and Authentication: Part 1
  • Урок 49. 00:03:18
    Identification and Authentication: Part 2
  • Урок 50. 00:08:09
    Identification and Authentication: Part 3
  • Урок 51. 00:04:54
    Access Control
  • Урок 52. 00:06:43
    Security Assessments and Audits
  • Урок 53. 00:17:33
    Penetration Testing
  • Урок 54. 00:12:27
    Vulnerability Assessments
  • Урок 55. 00:08:14
    Software Testing
  • Урок 56. 00:19:36
    Security Operations
  • Урок 57. 00:03:13
    Responding to Incidents
  • Урок 58. 00:05:41
    Log - Monitor - Audit
  • Урок 59. 00:06:49
    The Software Development Lifecycle (SDLC)
  • Урок 60. 00:19:39
    Data and Information Storage
  • Урок 61. 00:09:44
    Malicious Code: Part 1
  • Урок 62. 00:06:28
    Malicious Code: Part 2
  • Урок 63. 00:13:37
    How to Prepare for the Exam
  • Урок 64. 00:02:23
    What's Next After Certification?