Users Online
· Guests Online: 95
· Members Online: 0
· Total Members: 188
· Newest Member: meenachowdary055
· Members Online: 0
· Total Members: 188
· Newest Member: meenachowdary055
Forum Threads
Newest Threads
No Threads created
Hottest Threads
No Threads created
Latest Articles
DEMO - CISSP - Security Engineering
DEMO - CISSP - Security Engineering IT Management |
Categories | Most Recent | Top Rated | Popular Courses |
Uploader | Date Added | Views | Rating | |
Superadmin | 25.05.18 | 375 | No Rating | |
Description | ||||
Deep dive into the Security Engineering domain of the Certified Information Systems Security Professional (CISSP� certification, including Secure Design Principles and Processes, Fundamental Concepts of Security Models, Security Evaluation Models, Security Capabilities of Information Systems, Vulnerabilities in Security Architecture and Technology Components, Cryptography, and Site and Facility Secure Design Introduction 2m 17s CISSP- Security Engineering 0m 48s What's Security Engineering and What's Next? 1m 29s Secure Design Principles and Processes 43m 11s Introduction to Secure Design Principles and Processes 1m 24s Software/System Design Lifecycle 1m 57s Requirements Phase 1m 6s Design Phase 1m 49s Implementation Phase 0m 50s Integration and Testing Phase 1m 27s Transition to Operations Phase 1m 19s NIST Security Engineering Principles 1m 41s Security Foundation Principles 3m 35s Risk Based Principles 5m 58s Ease of Use Principles 3m 41s Increase Resilience Principles 7m 40s Reduce Vulnerabilities Principles 5m 12s Design with Network in Mind Principles 4m 27s Summary and Whats Next 1m 0s Fundamental Concepts of Security Models 19m 21s Introduction to Fundamental Concepts of Security Models 1m 10s Type of Security Models 0m 50s Information Flow Security Model 1m 2s Matrix-based Security Model 1m 15s Multi-level Lattice Security Model 0m 42s Non-interference Security Model 1m 13s State Machine Security Model 1m 26s Common Security Model Examples 0m 30s Bell-LaPadula Confidentiality Security Model 3m 24s Biba Integrity Security Model 2m 1s Brewer-Nash (The Chinese Wall) Security Model 0m 32s Clark Wilson Security Model 0m 38s Graham-Denning Security Model 0m 41s Security Architecture Frameworks 0m 45s The Open Group Architecture Framework (TOGAF) 0m 57s Zachman Framework 0m 39s Sherwood Applied Business Security Architecture (SABSA) 0m 40s Summary and Whats Next 0m 47s Security Evaluation Models 22m 24s Introduction to Security Evaluation Models 1m 9s Certification and Accreditation 1m 4s Product Evaluation Models 0m 43s Trusted Computer System Evaluation Criteria (TCSEC) 4m 41s Information Technology Security Evaluation Criteria (ITSEC) 3m 42s The Common Criteria 1m 58s Security Implementation Guidelines 1m 13s ISO/IEC 27001 and 27002 Security Standards2m 59s Control Objects for Information and Related Technology (COBIT)1m 49s Payment Card Industry Data Security Standard (PCI-DSS)2m 15s Summary and Whats Next0m 46s Security Capabilities of Information Systems 8m 49s Introduction to Security Capabilities of Information Systems1m 0s Access Control Mechanisms0m 49s Secure Memory Management1m 31s State and Layering0m 51s Cryptographic Protections1m 14s Host Firewalls and Intrusion Prevention0m 36s Auditing and Monitoring Controls0m 57s Virtualization1m 7s Summary and Whats Next0m 41s Vulnerabilities in Security Architecture and Technology Components 13m 52s Introduction to Vulnerabilities in Security Architecture and Technology Components1m 30s Completely Secure Any System1m 9s Vulnerability Types3m 2s The CIA Triad0m 45s Security Architecture Vulnerabilities2m 43s Technology Component Vulnerabilities3m 43s Summary and Whats Next0m 58s Cryptography 28m 14s Introduction to Cryptography1m 0s Cryptography Is Typically Bypassed, Not Penetrated1m 6s Basic Concept of Cryptography4m 46s Cryptography Isnt New!2m 25s The CIA Triad1m 12s Key Length1m 1s Cipher Types0m 58s Forms of Cryptography1m 12s Symmetric Cryptography1m 6s Data Encryption Standard (DES)2m 36s Double DES (2DES)0m 28s Triple DES (3DES)0m 34s Advanced Encryption Standard (Rijndael)0m 50s Asymmetric Cryptography2m 41s Hashing Functions1m 8s Hashing Attacks1m 8s Methods of Cryptanalytic Attacks1m 27s Cryptographic Lifecycle0m 52s Cryptography Law0m 51s Summary and Whats Next0m 44s Site and Facility Secure Design 11m 34s Introduction to Site and Facility Secure Design1m 0s Physical Security Control Design1m 37s Crime Prevention Through Environmental Design1m 12s Physical Security Requirements and Resources1m 57s Key Facility Protection Points0m 20s Facility Access1m 30s Support Equipment Rooms0m 58s Server and Technology Component Rooms0m 42s Restricted Work Areas1m 23s Summary and Whats Next |
Ratings
Comments
No Comments have been Posted.
Post Comment
Please Login to Post a Comment.