Users Online

· Guests Online: 95

· Members Online: 0

· Total Members: 188
· Newest Member: meenachowdary055

Forum Threads

Newest Threads
No Threads created
Hottest Threads
No Threads created

Latest Articles

DEMO - CISSP - Security Engineering

DEMO - CISSP - Security Engineering
IT Management
Categories Most Recent Top Rated Popular Courses
 
Uploader Date Added Views Rating
Superadmin 25.05.18 375 No Rating
Description
Deep dive into the Security Engineering domain of the Certified Information Systems Security Professional (CISSP&#65533Wink certification, including Secure Design Principles and Processes, Fundamental Concepts of Security Models, Security Evaluation Models, Security Capabilities of Information Systems, Vulnerabilities in Security Architecture and Technology Components, Cryptography, and Site and Facility Secure Design


Introduction 2m 17s
CISSP- Security Engineering 0m 48s
What's Security Engineering and What's Next? 1m 29s


Secure Design Principles and Processes 43m 11s
Introduction to Secure Design Principles and Processes 1m 24s
Software/System Design Lifecycle 1m 57s
Requirements Phase 1m 6s
Design Phase 1m 49s
Implementation Phase 0m 50s
Integration and Testing Phase 1m 27s
Transition to Operations Phase 1m 19s
NIST Security Engineering Principles 1m 41s
Security Foundation Principles 3m 35s
Risk Based Principles 5m 58s
Ease of Use Principles 3m 41s
Increase Resilience Principles 7m 40s
Reduce Vulnerabilities Principles 5m 12s
Design with Network in Mind Principles 4m 27s
Summary and Whats Next 1m 0s

Fundamental Concepts of Security Models 19m 21s
Introduction to Fundamental Concepts of Security Models 1m 10s
Type of Security Models 0m 50s
Information Flow Security Model 1m 2s
Matrix-based Security Model 1m 15s
Multi-level Lattice Security Model 0m 42s
Non-interference Security Model 1m 13s
State Machine Security Model 1m 26s
Common Security Model Examples 0m 30s
Bell-LaPadula Confidentiality Security Model 3m 24s
Biba Integrity Security Model 2m 1s
Brewer-Nash (The Chinese Wall) Security Model 0m 32s
Clark Wilson Security Model 0m 38s
Graham-Denning Security Model 0m 41s
Security Architecture Frameworks 0m 45s
The Open Group Architecture Framework (TOGAF) 0m 57s
Zachman Framework 0m 39s
Sherwood Applied Business Security Architecture (SABSA) 0m 40s
Summary and Whats Next 0m 47s

Security Evaluation Models 22m 24s
Introduction to Security Evaluation Models 1m 9s
Certification and Accreditation 1m 4s
Product Evaluation Models 0m 43s
Trusted Computer System Evaluation Criteria (TCSEC) 4m 41s
Information Technology Security Evaluation Criteria (ITSEC) 3m 42s
The Common Criteria 1m 58s
Security Implementation Guidelines 1m 13s
ISO/IEC 27001 and 27002 Security Standards2m 59s
Control Objects for Information and Related Technology (COBIT)1m 49s
Payment Card Industry Data Security Standard (PCI-DSS)2m 15s
Summary and Whats Next0m 46s

Security Capabilities of Information Systems 8m 49s
Introduction to Security Capabilities of Information Systems1m 0s
Access Control Mechanisms0m 49s
Secure Memory Management1m 31s
State and Layering0m 51s
Cryptographic Protections1m 14s
Host Firewalls and Intrusion Prevention0m 36s
Auditing and Monitoring Controls0m 57s
Virtualization1m 7s
Summary and Whats Next0m 41s

Vulnerabilities in Security Architecture and Technology Components 13m 52s
Introduction to Vulnerabilities in Security Architecture and Technology Components1m 30s
Completely Secure Any System1m 9s
Vulnerability Types3m 2s
The CIA Triad0m 45s
Security Architecture Vulnerabilities2m 43s
Technology Component Vulnerabilities3m 43s
Summary and Whats Next0m 58s

Cryptography 28m 14s
Introduction to Cryptography1m 0s
Cryptography Is Typically Bypassed, Not Penetrated1m 6s
Basic Concept of Cryptography4m 46s
Cryptography Isnt New!2m 25s
The CIA Triad1m 12s
Key Length1m 1s
Cipher Types0m 58s
Forms of Cryptography1m 12s
Symmetric Cryptography1m 6s
Data Encryption Standard (DES)2m 36s
Double DES (2DES)0m 28s
Triple DES (3DES)0m 34s
Advanced Encryption Standard (Rijndael)0m 50s
Asymmetric Cryptography2m 41s
Hashing Functions1m 8s
Hashing Attacks1m 8s
Methods of Cryptanalytic Attacks1m 27s
Cryptographic Lifecycle0m 52s
Cryptography Law0m 51s
Summary and Whats Next0m 44s

Site and Facility Secure Design 11m 34s
Introduction to Site and Facility Secure Design1m 0s
Physical Security Control Design1m 37s
Crime Prevention Through Environmental Design1m 12s
Physical Security Requirements and Resources1m 57s
Key Facility Protection Points0m 20s
Facility Access1m 30s
Support Equipment Rooms0m 58s
Server and Technology Component Rooms0m 42s
Restricted Work Areas1m 23s
Summary and Whats Next

Ratings

Rating is available to Members only.

Please login or register to vote.

No Ratings have been Posted.

Comments

No Comments have been Posted.

Post Comment

Please Login to Post a Comment.
Render time: 0.90 seconds
10,854,119 unique visits