介绍:
CISSP MasterClass 是一个动态的、自定进度的认证计划,旨在适应您 。无论您是刚刚开始还是磨砺专业知识,该课程都会智能地关注您的知识差距,帮助您更聪明地学习,而不是更难学习。本课程由行业专家 Rob 和 John 开发,将深入的技术见解与战略学习工具相结合,指导您清晰而自信地掌握 CISSP

目录:
├── Domain 2 - Asset Security
│ ├── 2.3 Provision information and assets securely
│ │ ├── 02. Data Classification Policy vip.bdziyi.com.mp4
│ │ ├── 01. Data Roles vip.bdziyi.com.mp4
│ ├── 2.6 Determine data security controls and compliance requirements
│ │ ├── 02. Information obfuscation vip.bdziyi.com.mp4
│ │ ├── 03. Scoping & Tailoring vip.bdziyi.com.mp4
│ │ ├── 01. Protecting Data at Rest and in Transit .mp4
│ │ ├── 04. Data Protection Methods vip.bdziyi.com.mp4
│ ├── 2.4 Manage data lifecycle
│ │ ├── 03. Data Remanence & Destruction Methods vip.bdziyi.com.mp4
│ │ ├── 01. Data roles & lifecycle vip.bdziyi.com.mp4
│ │ ├── 04. Object Reuse, SSD & Physical Destruction vip.bdziyi.com.mp4
│ │ ├── 02. Manage the Data Life Cycle vip.bdziyi.com.mp4
│ ├── 2.2 Establish information and asset handling requirements
│ │ ├── 01. Handling Requirements vip.bdziyi.com.mp4
│ ├── 2.5 Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS))
│ │ ├── 01. Data Archiving vip.bdziyi.com.mp4
│ ├── 2.1 Identify and classify information and assets
│ │ ├── 02. Classification vs Categorization & Marking vs Labeling vip.bdziyi.com.mp4
│ │ ├── 01. Introduction to Asset (Data) Classification vip.bdziyi.com.mp4
├── Domain 3 - Security Architecture and Engineering
│ ├── 3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
│ │ ├── 15CROS~1_ev.mp4
│ │ ├── 03MORE~1_ev.mp4
│ │ ├── 08CHAR~1_ev.mp4
│ │ ├── 02VULN~1_ev.mp4
│ │ ├── 17. Input Validation_ev.mp4
│ │ ├── 16. SQL_Injection_vip.bdziyi.com.mp4
│ │ ├── 12EDGE~1_ev.mp4
│ │ ├── 11COMP~1_ev.mp4
│ │ ├── 10CLOU~1_ev.mp4
│ │ ├── 01. Vulnerabilities_ev.mp4
│ │ ├── 04REDU~1_ev.mp4
│ │ ├── 09CLOU~1_ev.mp4
│ │ ├── 06INDU~1_ev.mp4
│ │ ├── 13. Sassy vip.bdziyi.com.mp4
│ │ ├── 18CLIE~1_ev.mp4
│ │ ├── 05DIST~1_ev.mp4
│ │ ├── 14CROS~1_ev.mp4
│ │ ├── 07. OT vs ICS vip.bdziyi.com.mp4
│ ├── 3.1 Research, implement and manage engineering processes using secure design principles
│ │ ├── 02. Cyber Kill Chain vip.bdziyi.com.mp4
│ │ ├── 01. Secure design principles vip.bdziyi.com.mp4
│ ├── 3.2 Understand the fundamental concepts of security models
│ │ ├── 05. Evaluation Criteria - Orange Book (TCSEC) & ITSEC. vip.bdziyi.com.mp4
│ │ ├── 02. Enterprise Security Architectures vip.bdziyi.com.mp4
│ │ ├── 03. Lattice Based Security Models - Bell-LaPadula & Biba vip.bdziyi.com.mp4
│ │ ├── 06. Evaluation Criteria - Common Criteria vip.bdziyi.com.mp4
│ │ ├── 04. Information Flow Models & Covert Channels vip.bdziyi.com.mp4
│ │ ├── 01. Models & the Concept of Security vip.bdziyi.com.mp4
│ ├── 3.8 Apply security principles to site and facility design
│ │ ├── 01. Intro to Physical Security vip.bdziyi.com.mp4
│ ├── 3.9 Design site and facility security controls
│ │ ├── 01HOWD~1_ev.mp4
│ │ ├── 09. Ideal Temperature & Humidity Ranges vip.bdziyi.com.mp4
│ │ ├── 07. Power - UPS & Generators and HVAC vip.bdziyi.com.mp4
│ │ ├── 08. Power Degradation vip.bdziyi.com.mp4
│ │ ├── 02. Physical Security Controls vip.bdziyi.com.mp4
│ │ ├── 06. Skimming vip.bdziyi.com.mp4
│ │ ├── 11. Fire Suppression vip.bdziyi.com.mp4
│ │ ├── 05. Walls vip.bdziyi.com.mp4
│ │ ├── 03. Locks vip.bdziyi.com.mp4
│ │ ├── 04. Windows vip.bdziyi.com.mp4
│ │ ├── 10. Fire Detection vip.bdziyi.com.mp4
│ ├── 3.6 Select and determine cryptographic solutions
│ │ ├── 10. Hybrid Cryptography vip.bdziyi.com.mp4
│ │ ├── 03. Cryptographic Definitions vip.bdziyi.com.mp4
│ │ ├── 20. Cryptography Summary vip.bdziyi.com.mp4
│ │ ├── 02. 5 Services of Cryptography vip.bdziyi.com.mp4
│ │ ├── 14. Code Signing vip.bdziyi.com.mp4
│ │ ├── 01. History of Cryptography vip.bdziyi.com.mp4
│ │ ├── 15. Digital Certificates vip.bdziyi.com.mp4
│ │ ├── 18. S_MIME vip.bdziyi.com.mp4
│ │ ├── 11. Steganography & Null Ciphers vip.bdziyi.com.mp4
│ │ ├── 05. Avoiding Patterns vip.bdziyi.com.mp4
│ │ ├── 13. Digital Signatures vip.bdziyi.com.mp4
│ │ ├── 16. Root of Trust vip.bdziyi.com.mp4
│ │ ├── 17. Public Key Infastructure vip.bdziyi.com.mp4
│ │ ├── 09. Diffie-Hellmann Key Exchange Protocol vip.bdziyi.com.mp4
│ │ ├── 06. Stream vs. Block Ciphers vip.bdziyi.com.mp4
│ │ ├── 07. Symmetric Cryptography vip.bdziyi.com.mp4
│ │ ├── 08. Asymmetric Cryptography vip.bdziyi.com.mp4
│ │ ├── 04. Substitution & Transposition vip.bdziyi.com.mp4
│ │ ├── 12. Message Integrity Controls vip.bdziyi.com.mp4
│ │ ├── 19. Key Management vip.bdziyi.com.mp4
│ ├── 3.10 Manage the information system lifecycle
│ │ ├── 01. Information System Lifecycle vip.bdziyi.com.mp4
│ ├── 3.4 Understand security capabilities of Information Systems
│ │ ├── 08. Abstraction, Virtualization & Hypervisors vip.bdziyi.com.mp4
│ │ ├── 03. Example RMC, Security Kernel & TCB Question vip.bdziyi.com.mp4
│ │ ├── 02. Details on RMC, Security Kernel, & TCB vip.bdziyi.com.mp4
│ │ ├── 06. Firmware, System Kernel & Middleware vip.bdziyi.com.mp4
│ │ ├── 05. Types of Storage vip.bdziyi.com.mp4
│ │ ├── 09. More detail on VMs and Hypervisors vip.bdziyi.com.mp4
│ │ ├── 04. Processors, States, Isolation & Memory Segmentation vip.bdziyi.com.mp4
│ │ ├── 01. Overview of RMC, Security Kernel, & TCB vip.bdziyi.com.mp4
│ │ ├── 07RING~1_ev.mp4
│ ├── 3.7 Understand methods of cryptanalytic attacks
│ │ ├── 03TERM~1_ev.mp4
│ │ ├── 01. Cryptanalysis - Cryptanalytic Attacks vip.bdziyi.com.mp4
│ │ ├── 05. Birthday attack, Kerberos exploitation_ev.mp4
│ │ ├── 02CRYP~1_ev.mp4
│ │ ├── 04. Dictionary Attack, Rainbow Tables & Salting vip.bdziyi.com.mp4
│ ├── 3.3 Select controls based upon systems security requirements
│ │ ├── 01. Security Control Frameworks vip.bdziyi.com.mp4
├── Domain 6 - Security Assessment and Testing
│ ├── 6.4 Analyze test output and generate report
│ │ ├── 01. Test output vip.bdziyi.com.mp4
│ ├── 6.2 Conduct security control testing
│ │ ├── 08VULN~1_ev.mp4
│ │ ├── 09. SCAP, Breach Attack Simulation & Compliance Checks vip.bdziyi.com.mp4
│ │ ├── 06. Vulnerability Assessment & Penetration Testing vip.bdziyi.com.mp4
│ │ ├── 02. Software Testing Techniques vip.bdziyi.com.mp4
│ │ ├── 11. Operational & Regression Testing vip.bdziyi.com.mp4
│ │ ├── 01. Software Testing Stages vip.bdziyi.com.mp4
│ │ ├── 10. Log Review & Analysis vip.bdziyi.com.mp4
│ │ ├── 03. Types of fuzzing vip.bdziyi.com.mp4
│ │ ├── 05. Decision table & state-based analysis vip.bdziyi.com.mp4
│ │ ├── 07. Red, Blue and Purple Teams vip.bdziyi.com.mp4
│ │ ├── 04. Interactive Application Security Testing (IAST) vip.bdziyi.com.mp4
│ ├── 6.1 Design and validate assessment, test, and audit strategies
│ │ ├── 01. Introduction to Security Assessment and Testing vip.bdziyi.com.mp4
│ │ ├── 02. Location of Assessment vip.bdziyi.com.mp4
│ ├── 6.5 Conduct or facilitate security audits
│ │ ├── 01. Third-Party Audit Reports vip.bdziyi.com.mp4
│ ├── 6.3 Collect security process data (e.g., technical and administrative)
│ │ ├── 01. Metrics - KPIs & KRIs vip.bdziyi.com.mp4
├── Mind Maps
│ ├── Domain 4 - Communication and Network Security
│ │ ├── 03. Network Defense vip.bdziyi.com.mp4
│ │ ├── 04. Remote Access vip.bdziyi.com.mp4
│ │ ├── 02. Networking vip.bdziyi.com.mp4
│ │ ├── 01. Open Systems Interconnection (OSI) Model vip.bdziyi.com.mp4
│ ├── Domain 6 - Security Assessment and Testing
│ │ ├── 01. Security Assessment and Testing vip.bdziyi.com.mp4
│ │ ├── 03. Log Review & Analysis vip.bdziyi.com.mp4
│ │ ├── 02. Identifying Vulnerabilities vip.bdziyi.com.mp4
│ ├── Domain 7 - Security Operations
│ │ ├── 06. Business Continuity Management (BCM) vip.bdziyi.com.mp4
│ │ ├── 03. Malware vip.bdziyi.com.mp4
│ │ ├── 02. Incident Response vip.bdziyi.com.mp4
│ │ ├── 05. Recovery Strategies vip.bdziyi.com.mp4
│ │ ├── 01. Investigations vip.bdziyi.com.mp4
│ │ ├── 04. Patching & Change Management vip.bdziyi.com.mp4
│ ├── Domain 8 - Software Development Security
│ │ ├── 02. Databases vip.bdziyi.com.mp4
│ │ ├── 01. Secure Software Development vip.bdziyi.com.mp4
│ ├── Domain 1 - Security and Risk Management
│ │ ├── 01. Alignment of Security Function to Business Strategy vip.bdziyi.com.mp4
│ │ ├── 02. Privacy & Intellectual Property vip.bdziyi.com.mp4
│ │ ├── 03. Risk Management vip.bdziyi.com.mp4
│ ├── Domain 2 - Asset Security
│ │ ├── 01. Asset Classification vip.bdziyi.com.mp4
│ ├── Domain 3 - Security Architecture and Engineering
│ │ ├── 04. Vulnerabilities in Systems vip.bdziyi.com.mp4
│ │ ├── 06. Cryptography vip.bdziyi.com.mp4
│ │ ├── 01. Models, Secure Design Principles & Frameworks vip.bdziyi.com.mp4
│ │ ├── 09. Physical Security vip.bdziyi.com.mp4
│ │ ├── 02. Evaluation Criteria vip.bdziyi.com.mp4
│ │ ├── 05. Cloud Computing vip.bdziyi.com.mp4
│ │ ├── 07. Digital Signatures & Certificates, PKI & Key Management vip.bdziyi.com.mp4
│ │ ├── 08. Cryptanalysis vip.bdziyi.com.mp4
│ │ ├── 03. Trusted Computing Base (TCB) vip.bdziyi.com.mp4
│ ├── Domain 5 - Identity and Access Management (IAM)
│ │ ├── 02. Single Sign-on - Federated Access vip.bdziyi.com.mp4
│ │ ├── 01. Access Control vip.bdziyi.com.mp4
├── Exam Strategy Practice Test
│ ├── Practice Question 20 vip.bdziyi.com.mp4
│ ├── Practice Question 19 vip.bdziyi.com.mp4
│ ├── Practice Question 5 vip.bdziyi.com.mp4
│ ├── Practice Question 17 vip.bdziyi.com.mp4
│ ├── Practice Question 6 vip.bdziyi.com.mp4
│ ├── Practice Question 18 vip.bdziyi.com.mp4
│ ├── Practice Question 8 vip.bdziyi.com.mp4
│ ├── Exam Question Strategy vip.bdziyi.com.mp4
│ ├── Practice Question 15 vip.bdziyi.com.mp4
│ ├── Practice Question 4 vip.bdziyi.com.mp4
│ ├── Practice Question 11 vip.bdziyi.com.mp4
│ ├── DestCert+Printable+MindMaps.pdf
│ ├── Practice Question 12 vip.bdziyi.com.mp4
│ ├── Practice Question 2 vip.bdziyi.com.mp4
│ ├── Practice Question 21 vip.bdziyi.com.mp4
│ ├── Practice Question 3 vip.bdziyi.com.mp4
│ ├── Practice Question 13 vip.bdziyi.com.mp4
│ ├── Practice Question 9 vip.bdziyi.com.mp4
│ ├── Practice Question 1 vip.bdziyi.com.mp4
│ ├── Practice Question 7 vip.bdziyi.com.mp4
│ ├── Practice Question 14 vip.bdziyi.com.mp4
│ ├── Practice Question 16 vip.bdziyi.com.mp4
│ ├── CISSP+lists+and+processes+to+know.pdf
│ ├── Practice Question 10 vip.bdziyi.com.mp4
├── Domain 4 - Communication and Network Security
│ ├── 4.3 Implement secure communication channels according to design
│ │ ├── 03. IPSec vip.bdziyi.com.mp4
│ │ ├── 01. Tunnelling & VPN vip.bdziyi.com.mp4
│ │ ├── 04. SSL_TLS & Remote Authentication vip.bdziyi.com.mp4
│ │ ├── 02. GRE & split tunneling vip.bdziyi.com.mp4
│ ├── 4.2 Secure network components
│ │ ├── 08. IDS & IPS - Detection Methods vip.bdziyi.com.mp4
│ │ ├── 01. Network Defense Intro & Network Segmentation - Partitioning vip.bdziyi.com.mp4
│ │ ├── 07. IDS & IPS - Analysis Engines vip.bdziyi.com.mp4
│ │ ├── 03. Firewall Technologies vip.bdziyi.com.mp4
│ │ ├── 06. IDS & IPS - Host & Network Based vip.bdziyi.com.mp4
│ │ ├── 04. Firewall Architectures vip.bdziyi.com.mp4
│ │ ├── 02. Proxy, NAT & PAT, and Private Addresses vip.bdziyi.com.mp4
│ │ ├── 05. IDS & IPS vip.bdziyi.com.mp4
│ ├── 4.1 Apply secure design principles in network architectures
│ │ ├── 16. IPv4 vs. IPv6 and Layer 3 Devices & Protocols vip.bdziyi.com.mp4
│ │ ├── 12. Layer 2, Physical Addressing_ev.mp4
│ │ ├── 20. Common Ports vip.bdziyi.com.mp4
│ │ ├── 17. Private IPv4 addresses & Network Classes (subnetting) vip.bdziyi.com.mp4
│ │ ├── 01. Introduction to Networks & Protocols vip.bdziyi.com.mp4
│ │ ├── 28. SDN architecture vip.bdziyi.com.mp4
│ │ ├── 19. TCP 3-Way Handshake, Ports, and Layer 4 Protocols vip.bdziyi.com.mp4
│ │ ├── 31. Monitoring and Management vip.bdziyi.com.mp4
│ │ ├── 14. More detail on Authentication Protocols vip.bdziyi.com.mp4
│ │ ├── 08. Dealing with Collisions vip.bdziyi.com.mp4
│ │ ├── 10. Performance Metrics vip.bdziyi.com.mp4
│ │ ├── 22. Convergence & VoIP vip.bdziyi.com.mp4
│ │ ├── 15. Layer 3 & Logical Addressing vip.bdziyi.com.mp4
│ │ ├── 03. Layer 1, Transmission Media & Crosstalk vip.bdziyi.com.mp4
│ │ ├── 21. Layers 5, 6 & 7 vip.bdziyi.com.mp4
│ │ ├── 11. Layer 1 Devices vip.bdziyi.com.mp4
│ │ ├── 04. Transport Architecture vip.bdziyi.com.mp4
│ │ ├── 23NETW~1_ev.mp4
│ │ ├── 06. Transmission Methods vip.bdziyi.com.mp4
│ │ ├── 30. Wide Area Networks (WAN) vip.bdziyi.com.mp4
│ │ ├── 02. The OSI Model vip.bdziyi.com.mp4
│ │ ├── 29. Third-party connectivity vip.bdziyi.com.mp4
│ │ ├── 18. Layer 4, TCP & UDP vip.bdziyi.com.mp4
│ │ ├── 24. Network Attacks - DoS & DDoS, Spoofing & ARP Poisoning vip.bdziyi.com.mp4
│ │ ├── 07. Traffic Flows vip.bdziyi.com.mp4
│ │ ├── 25WIRE~1_ev.mp4
│ │ ├── 09. Physical Segmentation vip.bdziyi.com.mp4
│ │ ├── 27. Network Virtualization Technologies - VLAN & SDN vip.bdziyi.com.mp4
│ │ ├── 13. Authentication Protocols and Layer 2 Devices & Protocols vip.bdziyi.com.mp4
│ │ ├── 26. Common tools vip.bdziyi.com.mp4
│ │ ├── 05. Network Topologies vip.bdziyi.com.mp4
│ ├── OSI-Model.pdf
├── Domain 1 - Security and Risk Management
│ ├── 1.5 Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards)
│ │ ├── 01WEWI~1_ev.mp4
│ ├── 1.2 Understand and apply security concepts
│ │ ├── 01. Goals of Information Security vip.bdziyi.com.mp4
│ │ ├── 02. 5 Pillars of Information Security vip.bdziyi.com.mp4
│ ├── 1.12 Establish and maintain a security awareness, education, and training program
│ │ ├── 01. Awareness, Training & Education vip.bdziyi.com.mp4
│ ├── 1.7 Identify, analyze, assess, prioritize, and implement Business Continuity (BC) requirements
│ │ ├── 01. We will cover BCM vip.bdziyi.com.mp4
│ ├── 1.11 Apply Supply Chain Risk Management (SCRM) concepts
│ │ ├── 03. Risks Associated with the Acquisition of Products and Services vip.bdziyi.com.mp4
│ │ ├── 01. Minimum Security Requirements & SLR vip.bdziyi.com.mp4
│ │ ├── 02. SLA & Reporting vip.bdziyi.com.mp4
│ ├── 1.4 Understand legal, regulatory, and compliance issues that pertain to information security in a holistic context
│ │ ├── 04PRIV~1_ev.mp4
│ │ ├── 02ITAR~1_ev.mp4
│ │ ├── 03. Privacy vip.bdziyi.com.mp4
│ │ ├── 01INTE~1_ev.mp4
│ │ ├── 05ORGA~1_ev.mp4
│ ├── 1.3 Evaluate, apply, and sustain security governance principles
│ │ ├── 02. Security Roles & Responsibilities vip.bdziyi.com.mp4
│ │ ├── 03. Due Care and Due Diligence vip.bdziyi.com.mp4
│ │ ├── 01. Alignment of Security to the Business vip.bdziyi.com.mp4
│ ├── 1.1 Understamd, adhere to, an promote professional ethics
│ │ ├── 01. Ethics vip.bdziyi.com.mp4
│ ├── 1.6 Develop, document, and implement security policy, standards, procedures, and guidelines
│ │ ├── 01POLI~1_ev.mp4
│ ├── 1.9. Understand and apply risk management concepts
│ │ ├── 05. Risk Treatment vip.bdziyi.com.mp4
│ │ ├── 02. Asset Valuation vip.bdziyi.com.mp4
│ │ ├── 11. NIST 800-37 vip.bdziyi.com.mp4
│ │ ├── 03. Risk Analysis vip.bdziyi.com.mp4
│ │ ├── 06. Types of Controls vip.bdziyi.com.mp4
│ │ ├── 10. Risk management Supply Chain & Risk Frameworks vip.bdziyi.com.mp4
│ │ ├── 09. Selecting Controls vip.bdziyi.com.mp4
│ │ ├── 01. Risk Management vip.bdziyi.com.mp4
│ │ ├── 04. ALE Calculation vip.bdziyi.com.mp4
│ │ ├── 07. Categorizing Controls vip.bdziyi.com.mp4
│ │ ├── 08. Risk Management Terms Summary vip.bdziyi.com.mp4
│ ├── 1.10 Understand and apply threat modeling concepts and methodologies
│ │ ├── 01. Threat Modeling Methodologies vip.bdziyi.com.mp4
│ │ ├── 03. Social Engineering vip.bdziyi.com.mp4
│ │ ├── 02. DREAD vip.bdziyi.com.mp4
│ ├── 1.8 Contribute to and enforce personnel security policies and procedures
│ │ ├── 01. Personnel Security vip.bdziyi.com.mp4
├── Domain 7 - Security Operations
│ ├── 7.1 Understand and comply with investigations
│ │ ├── 03. Digital Forensics & The Rules of Evidence vip.bdziyi.com.mp4
│ │ ├── 01. Introduction to Security Operations & Forensic Investigation Process vip.bdziyi.com.mp4
│ │ ├── 04. Types of Investigations vip.bdziyi.com.mp4
│ │ ├── 02. Types of evidence vip.bdziyi.com.mp4
│ ├── 7.7 Operate and maintain detection and preventative measures
│ │ ├── 03. Machine Learning and Artificial Intelligence based tools vip.bdziyi.com.mp4
│ │ ├── 01. Malware vip.bdziyi.com.mp4
│ │ ├── 02. Anti-malware vip.bdziyi.com.mp4
│ ├── 7.2 Conduct logging and monitoring activities
│ │ ├── 01. Security Information and Event Management (SIEM) vip.bdziyi.com.mp4
│ ├── 7.9 Understand and participate in change management processes
│ │ ├── 01. Change Management vip.bdziyi.com.mp4
│ ├── 7.4 Apply foundational security operations concepts
│ │ ├── 01. Foundational Security Concepts vip.bdziyi.com.mp4
│ ├── 7.15 Address personnel safety and security concerns
│ │ ├── 01. Personnel safety and security vip.bdziyi.com.mp4
│ ├── 7.5 Apply resource protection
│ │ ├── 01. Protecting Media vip.bdziyi.com.mp4
│ ├── 7.3 Perform Configuration Management (CM) (e.g., provisioning, baselining, automation)
│ │ ├── 01. Asset Inventory & Configuration Management vip.bdziyi.com.mp4
│ ├── 7.8 Implement and support patch and vulnerability management
│ │ ├── 01. Patch Management vip.bdziyi.com.mp4
│ ├── 7.11 Implement Disaster Recovery (DR) processes
│ │ ├── 03. The BIA Process vip.bdziyi.com.mp4
│ │ ├── 01. BCM, BCP & DRP vip.bdziyi.com.mp4
│ │ ├── 07. Declaring a Disaster vip.bdziyi.com.mp4
│ │ ├── 08. Restoration Order vip.bdziyi.com.mp4
│ │ ├── 04. RPO, RTO, WRT & MTD vip.bdziyi.com.mp4
│ │ ├── 02. BCP-DRP Steps vip.bdziyi.com.mp4
│ │ ├── 05. Zoom in on RPO & RTO vip.bdziyi.com.mp4
│ │ ├── 06. External Dependencies vip.bdziyi.com.mp4
│ ├── 7.6 Conduct incident management
│ │ ├── 01. Incident Response vip.bdziyi.com.mp4
│ ├── 7.10 Implement recovery strategies
│ │ ├── 07. Recovery Site Strategies vip.bdziyi.com.mp4
│ │ ├── 01. Failure modes vip.bdziyi.com.mp4
│ │ ├── 02. Backup Storage Strategies vip.bdziyi.com.mp4
│ │ ├── 03. Backup Storage Locations vip.bdziyi.com.mp4
│ │ ├── 04. Spare Parts vip.bdziyi.com.mp4
│ │ ├── 05. RAID vip.bdziyi.com.mp4
│ │ ├── 06. Clustering & Redundancy vip.bdziyi.com.mp4
│ ├── 7.13 Participate in Business Continuity (BC) planning and exercises
│ │ ├── 01. Goals of BCM vip.bdziyi.com.mp4
│ ├── 7.14 Implement and manage physical security
│ │ ├── 01. We covered Physical Security in Domain 3 vip.bdziyi.com.mp4
│ ├── 7.12 Test Disaster Recovery Plans (DRP)
│ │ ├── 01. Testing DR Plans vip.bdziyi.com.mp4
├── Domain 5 - Identity and Access Management (IAM)
│ ├── 5.6 Implement authentication systems
│ │ ├── 01. Implement authentication systems vip.bdziyi.com.mp4
│ ├── 5.1 Design identification and authentication strategy
│ │ ├── 01. Introduction to Access Control vip.bdziyi.com.mp4
│ ├── 5.2 Authentication, Authorization and Accounting (AAA)
│ │ ├── 04. Password Vaults vip.bdziyi.com.mp4
│ │ ├── 12. Federated Identity Management (FIM) & SAML vip.bdziyi.com.mp4
│ │ ├── 05. Authentication Types (Factors) - Characteristics vip.bdziyi.com.mp4
│ │ ├── 13. Just-in-Time (JIT) Access vip.bdziyi.com.mp4
│ │ ├── 02. AAA vip.bdziyi.com.mp4
│ │ ├── 10. Authenticator Assurance Levels (AAL) vip.bdziyi.com.mp4
│ │ ├── 08. Password-less Authentication vip.bdziyi.com.mp4
│ │ ├── 09. Single Sign-on, Kerberos & SESAME vip.bdziyi.com.mp4
│ │ ├── 03. Authentication Types (Factors) - Knowledge & Ownership vip.bdziyi.com.mp4
│ │ ├── 07. Single & Multi-Factor Authentication vip.bdziyi.com.mp4
│ │ ├── 01. Access Control Services Overview vip.bdziyi.com.mp4
│ │ ├── 06. Templates vip.bdziyi.com.mp4
│ │ ├── 14. Principle of Access Control vip.bdziyi.com.mp4
│ │ ├── 11. Session Management & Identity Proofing vip.bdziyi.com.mp4
│ ├── 5.4 Implement and manage authorization mechanisms
│ │ ├── 04. Context - Attribute Based Access Controls vip.bdziyi.com.mp4
│ │ ├── 01. Access Control Philosophies vip.bdziyi.com.mp4
│ │ ├── 02. Types of RBAC vip.bdziyi.com.mp4
│ │ ├── 06. Access Policy Enforcement vip.bdziyi.com.mp4
│ │ ├── 03. Roles & Groups vip.bdziyi.com.mp4
│ │ ├── 05. Access control summary vip.bdziyi.com.mp4
│ ├── 5.5 Manage the identity and access provisioning lifecycle
│ │ ├── 02. Service Accounts vip.bdziyi.com.mp4
│ │ ├── 01. Provisioning Lifecycle vip.bdziyi.com.mp4
│ ├── 5.3 Federated identity with a third-party service
│ │ ├── 01. IDaaS vip.bdziyi.com.mp4
├── Domain 8 - Software Development Security
│ ├── 8.3 Assess the effectiveness of software security
│ │ ├── 01. Software Assurance vip.bdziyi.com.mp4
│ ├── 8.1 Understand and integrate security in the Software Development Life Cycle (SDLC)
│ │ ├── 02. Integrated Product Team (DevOps) vip.bdziyi.com.mp4
│ │ ├── 05OPER~1_ev.mp4
│ │ ├── 01. SDLC vs. SLC Development Methodologies vip.bdziyi.com.mp4
│ │ ├── 03. Canary testing & deployments vip.bdziyi.com.mp4
│ │ ├── 04. Maturity Models vip.bdziyi.com.mp4
│ ├── 8.2 Identify and apply security controls in software development ecosystems
│ │ ├── 01PROG~1_ev.mp4
│ │ ├── 03. Components of DBMS and Concurrency & Locks vip.bdziyi.com.mp4
│ │ ├── 02. Secure Programming & obfuscation vip.bdziyi.com.mp4
│ │ ├── 04. Metadata vip.bdziyi.com.mp4
│ ├── 8.4 Assess security impact of acquired software
│ │ ├── 01. Acquiring Software vip.bdziyi.com.mp4
│ │ ├── 02. Involve the Security Function is Assessing vip.bdziyi.com.mp4
│ ├── 8.5 Define and apply secure coding guidelines and standards
│ │ ├── 01. Secure Coding, Buffer Overflows & APIs vip.bdziyi.com.mp4
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
















请登录后查看评论内容