IT and Desktop Videos

Download a course collection

Select a category


Security (1288)

Expand all | Collapse all

Access control (74)
Title Speaker Summary ID
Securing User Accounts: Account Change Risks Aaron Sampson After watching this video; you will be able to describe characteristics of account detail changes and how and why they carry risk of attack. 84415
Securing User Accounts: Account Protocols Aaron Sampson After watching this video; you will be able to identify best-practice account protocols to protect against user account security attacks. 84361
Securing User Accounts: Account Verification Aaron Sampson After watching this video; you will be able to identify best practices for account registration verification. 84387
Securing User Accounts: Asymmetric Key Credentials Aaron Sampson After watching this video; you will be able to identify characteristics of asymmetric key credentials for authentication. 84381
Securing User Accounts: At-risk Account Attributes Aaron Sampson After watching this video; you will be able to identify the specific account attributes that hackers target. 84416
Securing User Accounts: Authentication and Identification Aaron Sampson After watching this video; you will be able to describe characteristics of the authentication and identification process and the relationship between them. 84374
Securing User Accounts: Authentication Credentials Overview Aaron Sampson After watching this video; you will be able to identify characteristics and purpose of credentials. 84379
Securing User Accounts: Authentication Types Aaron Sampson After watching this video; you will be able to distinguish between the different types of authentication. 84376
Securing User Accounts: Authenticity Aaron Sampson After watching this video; you will be able to describe characteristics of the fundamental security concept of authenticity as it relates to securing user accounts. 84350
Securing User Accounts: Authorization Aaron Sampson After watching this video; you will be able to describe characteristics of authorization. 84377
Securing User Accounts: Biometric Credentials Aaron Sampson After watching this video; you will be able to identify characteristics of biometric credentials. 84383
Securing User Accounts: Collecting Attack Evidence Aaron Sampson After watching this video; you will be able to identify best practices when collecting evidence and information after a successful attack . 84421
Securing User Accounts: Common Logon Attacks Aaron Sampson After watching this video; you will be able to distinguish between the different common types of attacks on logon pages. 84403
Securing User Accounts: Confidentiality Aaron Sampson After watching this video; you will be able to describe characteristics of the fundamental security concept of confidentiality as it relates to securing user accounts. 84352
Securing User Accounts: Confirming Account Changes Aaron Sampson After watching this video; you will be able to identify best practices for confirming user account changes with users. 84419
Securing User Accounts: CSRF Aaron Sampson After watching this video; you will be able to identify characteristics of Cross-Site Request Forgery (CSRF). 84356
Securing User Accounts: Dealing with Compromised Systems Aaron Sampson After watching this video; you will be able to identify best practices for dealing with compromised systems after a successful security attack. 84420
Securing User Accounts: Defense in Depth Aaron Sampson After watching this video; you will be able to describe best practices for applying defense in depth in secure user account management. 84364
Securing User Accounts: Determining Appropriate User Account Policies Aaron Sampson After watching this video; you will be able to identify appropriate user account security policies and practices. 84373
Securing User Accounts: Development Best Practices Aaron Sampson After watching this video; you will be able to identify best practices during development to secure site logon. 84400
Securing User Accounts: Disabling Unused Accounts Aaron Sampson After watching this video; you will be able to identify best practices for disabling unused user accounts. 84370
Securing User Accounts: Enabling Two-Step Verification Aaron Sampson After watching this video; you will be able to describe purpose and best practices for implementing two-step verification in user account registration policies. 84389
Securing User Accounts: Enforcing Password History Policies Aaron Sampson After watching this video; you will be able to describe benefits and best practices for enforcing password history policies. 84395
Securing User Accounts: Event Logging Aaron Sampson After watching this video; you will be able to identify best practices for event logging as a method for identifying and preventing account security breaches. 84362
Securing User Accounts: Implementing Account Change Notifications Aaron Sampson After watching this video; you will be able to identify best practices for implementing user account change notifications. 84418
Securing User Accounts: Implementing Verification Questions Aaron Sampson After watching this video; you will be able to describe best practices for strengthening password reset with verification questions. 84413
Securing User Accounts: Importance of User Account Security Aaron Sampson After watching this video; you will be able to identify the purpose and requirement for secure user account controls. 84349
Securing User Accounts: Integrity Aaron Sampson After watching this video; you will be able to describe characteristics of the fundamental security concept of integrity as it relates to securing user accounts. 84351
Securing User Accounts: Limiting Logon Attempts Aaron Sampson After watching this video; you will be able to identify characteristics and best practices for limiting logon attempts as a restriction for user accounts. 84368
Securing User Accounts: Logon Fraud Detection and Prevention Aaron Sampson After watching this video; you will be able to describe best practices for detecting and preventing logon fraud. 84404
Securing User Accounts: Managing Simultaneous Sessions Aaron Sampson After watching this video; you will be able to identify best practices for managing multiple simultaneous sessions from the same user. 84402
Securing User Accounts: Naming Conventions Aaron Sampson After watching this video; you will be able to identify characteristics and best practices of implementing appropriate naming convention restrictions for user accounts. 84367
Securing User Accounts: Network Protocols Aaron Sampson After watching this video; you will be able to identify best-practice network protocols to protect against general security attacks. 84360
Securing User Accounts: Neutralizing Attacks Aaron Sampson After watching this video; you will be able to describe best practices for neutralizing user account security attacks. 84422
Securing User Accounts: Overview of Password Reset Aaron Sampson After watching this video; you will be able to identify characteristics and purpose of password reset. 84411
Securing User Accounts: Overview of the Logoff Feature Aaron Sampson After watching this video; you will be able to identify purpose and characteristics of implementing logoff requirements. 84405
Securing User Accounts: Overview of the Logon Feature Aaron Sampson After watching this video; you will be able to describe the characteristics and purpose of the logon feature. 84399
Securing User Accounts: Password Age Policies Aaron Sampson After watching this video; you will be able to describe benefits and best practices for setting minimum and maximum password age requirements. 84396
Securing User Accounts: Password Complexity Requirements Aaron Sampson After watching this video; you will be able to identify password length; width; and depth requirements that can enhance password security. 84392
Securing User Accounts: Password Credentials Aaron Sampson After watching this video; you will be able to identify characteristics of password credentials. 84380
Securing User Accounts: Password Field Security Aaron Sampson After watching this video; you will be able to identify best practices for password field security. 84393
Securing User Accounts: Password Hashing Best Practices Aaron Sampson After watching this video; you will be able to identify best practices for hashing passwords for storage. 84410
Securing User Accounts: Password Hints Aaron Sampson After watching this video; you will be able to identify benefits and challenges of using password hints and best practices. 84414
Securing User Accounts: Password Storage Best Practices Aaron Sampson After watching this video; you will be able to describe best practices for password storage policies. 84409
Securing User Accounts: Password Strength Criteria Aaron Sampson After watching this video; you will be able to describe best practice for setting minimum password strength criteria policies. 84391
Securing User Accounts: Password Strength Feedback Aaron Sampson After watching this video; you will be able to describe techniques for providing feedback to users on password strength. 84394
Securing User Accounts: Password Verification for Changes Aaron Sampson After watching this video; you will be able to describe best practices for using password verification during account change activities. 84417
Securing User Accounts: Patches and Updates Aaron Sampson After watching this video; you will be able to identify best practices for patching and updating to prevent user account compromise. 84359
Securing User Accounts: Permissions Categories Aaron Sampson After watching this video; you will be able to distinguish between the different access permissions categories available to assign to account users. 84366
Securing User Accounts: Preventing Username Enumeration Aaron Sampson After watching this video; you will be able to describe best practices for preventing username enumeration as part of user account registration security. 84390
Securing User Accounts: Principle of Least Privilege Aaron Sampson After watching this video; you will be able to describe best practices for applying the security principle of least privilege in secure user account management. 84363
Securing User Accounts: Privilege Management Aaron Sampson After watching this video; you will be able to distinguish between users; groups; and role structures for privileges. 84365
Securing User Accounts: Protecting against Password Hacking Aaron Sampson After watching this video; you will be able to identify best practices for preventing password hack attempts. 84397
Securing User Accounts: Registration Basics Aaron Sampson After watching this video; you will be able to describe characteristics and purpose of secure user account registration policies and practices. 84385
Securing User Accounts: Remote Logoff Aaron Sampson After watching this video; you will be able to identify characteristics and best practices for remote logoff procedures. 84407
Securing User Accounts: Securing Account Access and Mitigating Risk Aaron Sampson After watching this video; you will be able to identify appropriate logon; logoff and account change policies; and describe best practices for responding to account compromise. 84423
Securing User Accounts: Securing Logoff Against CSRF Aaron Sampson After watching this video; you will be able to describe purpose and techniques for implementing CSRF protection on the logoff feature. 84408
Securing User Accounts: Securing User Account Registration Aaron Sampson After watching this video; you will be able to identify appropriate user account registration and password best practices. 84398
Securing User Accounts: Security Attack Motives Aaron Sampson After watching this video; you will be able to describe goals and motives for user account security attacks. 84353
Securing User Accounts: Security Attack Phases Aaron Sampson After watching this video; you will be able to distinguish between the different phases of a security attack. 84354
Securing User Accounts: Session Expiry Aaron Sampson After watching this video; you will be able to identify best practices and purpose of session expiry . 84406
Securing User Accounts: Setting Account Expiry Dates Aaron Sampson After watching this video; you will be able to identify best practices for setting account expiry dates. 84369
Securing User Accounts: Setting Machine Restrictions Aaron Sampson After watching this video; you will be able to identify best practices for setting machine restrictions on user accounts. 84372
Securing User Accounts: Setting Time Restrictions Aaron Sampson After watching this video; you will be able to identify best practices for setting time restrictions on user accounts. 84371
Securing User Accounts: Ticket-based Hybrid Authentication Aaron Sampson After watching this video; you will be able to identify characteristics of ticket-based hybrid authentication credentials. 84384
Securing User Accounts: Timed Password Reset Aaron Sampson After watching this video; you will be able to identify best practices for implementing timed password resets. 84412
Securing User Accounts: User Authentication Components Aaron Sampson After watching this video; you will be able to distinguish between the three user authentication components and how they interrelate. 84375
Securing User Accounts: User Logon Process Aaron Sampson After watching this video; you will be able to identify the phases of the user logon process. 84378
Securing User Accounts: Username Best Practices Aaron Sampson After watching this video; you will be able to describe best practices for secure usernames and user identifiers. 84386
Securing User Accounts: Username Enumeration Aaron Sampson After watching this video; you will be able to identify characteristics of username enumeration. 84355
Securing User Accounts: Using CAPTCHA Aaron Sampson After watching this video; you will be able to identify best practices and purpose of using CAPTCHA for user account registration and setup. 84388
Securing User Accounts: Using SSL for Logon Security Aaron Sampson After watching this video; you will be able to use SSL to enhance logon security. 84401
Securing User Accounts: Vulnerability Scanning Aaron Sampson After watching this video; you will be able to identify best practices for performing vulnerability scanning to prevent user account compromise. 84358
Securing User Accounts: Web Server Password Cracking Aaron Sampson After watching this video; you will be able to distinguish between the different types of web server password cracking techniques. 84357
Cryptography (50)
Title Speaker Summary ID
Cryptography Fundamentals: Apply Cryptographic Modes and Algorithms Dan Lachance After watching this video; you will be able to apply cryptographic modes and algorithms. 84020
Cryptography Fundamentals: Applying Non-repudiation to Cryptography Dan Lachance After watching this video; you will be able to describe how cryptography can be used to prove; with high certainty; that an action or statement is associated with an entity. 83980
Cryptography Fundamentals: Applying the DES/3DES Block Algorithm Dan Lachance After watching this video; you will be able to describe how the DES and 3DES algorithms work to encrypt and decrypt data. 84002
Cryptography Fundamentals: Creating or Generating Keys Dan Lachance After watching this video; you will be able to describe the creating; or generating; of keys and how the key strength is critical to cryptographic ciphers. 83993
Cryptography Fundamentals: Defining Cryptography Authentication Dan Lachance After watching this video; you will be able to define how cryptography can provide a means to authenticate an entity. 83979
Cryptography Fundamentals: Defining the RSA Algorithm Dan Lachance After watching this video; you will be able to describe the RSA public key encryption and its operation. 84006
Cryptography Fundamentals: Defining Why Cryptography is Difficult Dan Lachance After watching this video; you will be able to describe why cryptography is difficult to get right and how poor cryptography can give you a false sense of security. 83974
Cryptography Fundamentals: Describing Counter (CTR) Dan Lachance After watching this video; you will be able to describe the Counter mode and how It can be used for parallelizing encryption and decryption. 84000
Cryptography Fundamentals: Describing Cryptanalysis Dan Lachance After watching this video; you will be able to perform some basic cryptanalysis and describe methods to decrypt poorly encrypted data. 84018
Cryptography Fundamentals: Describing Cryptographic Terminology Dan Lachance After watching this video; you will be able to use and identify basic cryptographic terminology. 83973
Cryptography Fundamentals: Describing Digital Signatures Dan Lachance After watching this video; you will be able to describe a digital signature and how it can be used for authentication and nonrepudiation. 83987
Cryptography Fundamentals: Describing Electronic Codebook (ECB) Dan Lachance After watching this video; you will be able to describe and identify data that has been encrypted using the ECB mode. 83995
Cryptography Fundamentals: Describing Export Controls and Limits on Cryptography Dan Lachance After watching this video; you will be able to describe basic export controls and limits that can be imposed on cryptography used around the world . 83976
Cryptography Fundamentals: Describing HMAC Dan Lachance After watching this video; you will be able to describe the Hash Message Authentication Code; or HMAC; and its use to authenticate and verify the integrity of a message. 84009
Cryptography Fundamentals: Describing How Cryptography Provides Confidentiality Dan Lachance After watching this video; you will be able to describe how cryptography can keep data confidential within limits. 83977
Cryptography Fundamentals: Describing Key Escrow Dan Lachance After watching this video; you will be able to identify the role and purpose of key escrow policies and procedures. 84012
Cryptography Fundamentals: Describing Key Exchange Dan Lachance After watching this video; you will be able to describe how to cryptographically exchange keys securely. 84011
Cryptography Fundamentals: Describing Key Management Dan Lachance After watching this video; you will be able to identify and describe basic key management policies and procedures. 84010
Cryptography Fundamentals: Describing MD5; SHA1; and SHA3 Dan Lachance After watching this video; you will be able to describe the deprecated MD5 and SHA1 algorithms and the newly chosen replacement; SHA3. 84007
Cryptography Fundamentals: Describing Side-channel Attacks Dan Lachance After watching this video; you will be able to identify external methods that can be used to compromise; or bypass; a cryptographic system. 84019
Cryptography Fundamentals: Describing Substitution Ciphers Dan Lachance After watching this video; you will be able to describe and use a substitution cipher and understand the weaknesses that can be exploited by an attacker against these ciphers. 83982
Cryptography Fundamentals: Describing the Blowfish Block Algorithm Dan Lachance After watching this video; you will be able to describe the Blowfish block cipher algorithm and its properties. 84003
Cryptography Fundamentals: Describing the ElGamal Algorithm Dan Lachance After watching this video; you will be able to describe the ElGamal cipher algorithm and its usage . 84005
Cryptography Fundamentals: Describing the RC4 Streaming Algorithm Dan Lachance After watching this video; you will be able to describe the RC4 streaming cipher and its properties. 84004
Cryptography Fundamentals: Distinguishing between Block and Key Sizes Dan Lachance After watching this video; you will be able to recognize the difference between blocks and key sizes as they apply to cipher algorithms. 83988
Cryptography Fundamentals: Formatting the Output Dan Lachance After watching this video; you will be able to describe how to encode encrypted data for easier storage or transport. 83990
Cryptography Fundamentals: Hiding Data Using Steganography Dan Lachance After watching this video; you will be able to describe the use of stenography in encryption products to hide the fact data is even encrypted. 83985
Cryptography Fundamentals: Identify the Cryptographic Algorithm to Use Dan Lachance After watching this video; you will be able to identify the cryptographic algorithm to use. 83994
Cryptography Fundamentals: Identifying Algorithm and Key Strengths Dan Lachance After watching this video; you will be able to identify the features and strengths of cryptographic algorithms and how to select an algorithm for a particular usage scenario. 84017
Cryptography Fundamentals: Identifying and Using Entropy Dan Lachance After watching this video; you will be able to describe how entropy is used in generating random numbers and how that entropy is critical to the strength of a cryptographic key. 83992
Cryptography Fundamentals: Identifying Historical Use of Cryptography Dan Lachance After watching this video; you will be able to recognize historical uses of cryptography and their relevance to cryptography today. 83972
Cryptography Fundamentals: Identifying Secure Communications Over HTTPS Dan Lachance After watching this video; you will be able to identify web browser-based secure communications and the role of certificates and certificate authorities (CAs). 84013
Cryptography Fundamentals: Identifying the Current State of Cryptography Dan Lachance After watching this video; you will be able to identify the different types of cryptography and how cryptographic algorithms can be verified and validated. 83975
Cryptography Fundamentals: Introducing Cryptography Dan Lachance After watching this video; you will be able to describe and identify the reasons for having and using cryptography. 83971
Cryptography Fundamentals: Recognizing the Need for Data Integrity Dan Lachance After watching this video; you will be able to describe why data integrity is an integral part of cryptography. 83978
Cryptography Fundamentals: Using a One-time Pad Dan Lachance After watching this video; you will be able to describe how OPT; or one-time pad; cryptography can theoretically provide perfect secrecy but has some significant limitations. 83981
Cryptography Fundamentals: Using Cipher Block Chaining (CBC) Dan Lachance After watching this video; you will be able to specify how Cipher Block Chaining uses an IV; or initialization vector; to make data appear random. 83996
Cryptography Fundamentals: Using Cipher Feedback (CFB) Dan Lachance After watching this video; you will be able to describe the Cipher Feedback mode and how it builds on CBC and makes a block cipher into a stream cipher. 83998
Cryptography Fundamentals: Using GPG with E-mail Dan Lachance After watching this video; you will be able to use GPG to encrypt and decrypt an e-mail message. 84015
Cryptography Fundamentals: Using Nonces and the Initialization Vector Dan Lachance After watching this video; you will be able to describe the purpose of an initialization vector for a cipher algorithm and how nonces can be used to protect small datasets. 83991
Cryptography Fundamentals: Using One-way Hashes Dan Lachance After watching this video; you will be able to describe the purpose of cryptographic hash functions and how they can be used in cryptography to provide data integrity. 83986
Cryptography Fundamentals: Using Output Feedback (OFB) Dan Lachance After watching this video; you will be able to describe the Output Feedback mode and how it can use the same process for encryption and decryption. 83999
Cryptography Fundamentals: Using Padding Dan Lachance After watching this video; you will be able to describe and perform padding operations to data for block ciphers. 83989
Cryptography Fundamentals: Using Propagating Cipher Block Chaining (PCBC) Dan Lachance After watching this video; you will be able to describe how Propagating Cipher Block Chaining mode improved on CBC by causing small changes to each block encrypted. 83997
Cryptography Fundamentals: Using SHA2 Dan Lachance After watching this video; you will be able to apply and describe the operation of the SHA2 hashing algorithms. 84008
Cryptography Fundamentals: Using Symmetric Algorithms Dan Lachance After watching this video; you will be able to describe and identify the features and use cases for symmetric-key cipher algorithms . 83983
Cryptography Fundamentals: Using the AES Block Algorithm Dan Lachance After watching this video; you will be able to use a simple AES implementation to encrypt and decrypt data and compare the results to the NIST standard to confirm operation of the algorithm. 84001
Cryptography Fundamentals: Working with Asymmetric Algorithms Dan Lachance After watching this video; you will be able to describe and identify the features and use cases for asymmetric-key cipher algorithms. 83984
Cryptography Fundamentals: Working with Disk Encryption Dan Lachance After watching this video; you will be able to describe how disk encryption works and the threats it can help protect against. 84016
Cryptography Fundamentals: Working with the Secure Shell (SSH) Dan Lachance After watching this video; you will be able to describe of use of SSL and TLS in security tools like the Secure Shell; or SSH. 84014
Network Security (134)
Title Speaker Summary ID
CISSP: Water Issues Dan Lachance After watching this video; you will be able to identify best practices for preventing and responding to water risks. 79271
IT Security: Big Data Challenges in the Cloud Carlos Moros IT security becomes a challenge when dealing with big data in the cloud. In this video; Carlos Moros explains what big data is; its benefits; and why it's a concern for security practitioners in a cloud environment. 55703
IT Security: Building Security Policies for Cloud Infrastructure Carlos Moros IT security requires users to build secure policies that keep pace with cloud computing and storage as well as bricks-and-mortar infrastructures. In this video; Carlos Moros discusses security considerations resulting from the shift from perimeter protection of a static data environment to a virtual environment in which data traverses administrative domains; including e-discovery; identity management; and operational domains. 55699
IT Security: Cloud Encryption and Key Management Carlos Moros IT security includes encryption which deals with confidentiality; key management; and loss of visibility over encrypted information assets. In this video; Carlos Moros uses different encryption models to ensure confidentiality; integrity; and authenticity of data in a Cloud environment. 55696
IT Security: Cloud Security Models and Standards Carlos Moros Cloud security models and standards play a vital role in IT security. In this video; Carlos Moros uses the process standards to explain their role in monitoring; auditing; interoperability; and securing your Cloud. 55698
IT Security: Cloud Visibility Carlos Moros Lack of cloud visibility hampers IT security strategies because so many security functions rely on visibility. In this video; Carlos Moros discusses reasons for restricted visibility and proven standards for defining a visibility strategy; such as the Cloud Trust Protocol; of which the central issues are defining what should be monitored and how; and compelling cloud providers to do so. 55707
IT Security: Data Security in the Cloud Carlos Moros IT security includes the security of high volumes of data that move swiftly in and out of the cloud. This causes data loss prevention to become a crucial concern. In this video; Carlos Moros discusses how multi-tenancy expands the attack surface; data sovereignty being at risk; and the role of a data loss prevention policy throughout the data life cycle. 55702
IT Security: Governance in the Cloud Carlos Moros In terms of IT Security; Governance is defined as a system by which IT infrastructures are managed and controlled. In this video; Carlos Moros explains how to keep control of IT assets in a Cloud Computing environment as well as the processes and procedures you can use to do so. 55695
IT Security: Guidelines to Protect Web Services Carlos Moros IT security applied to cloud services needs to focus on the latest trends in protecting web protocols to define access control into and out of the cloud. In this video; Carlos Moros describes common threats to cloud security and ways to combat them; such as web security gateways and Web 2.0 countermeasures; with special attention given to data loss prevention. 55701
IT Security: Identity Management Carlos Moros Identity management as an IT security strategy in a cloud is more complex than within an enterprise environment; which has known protocols for authentication and authorization. In this video; Carlos Moros discusses principal and resource-centric identity management with rule-based access control. Proliferation of identities and credentials across cloud providers can be curtailed using an identity mediator or a federated approach. 55705
IT Security: iPad - Find My iPad Josh Penzell With Find My iPad enabled; you'll be able to use the Find My iPhone app and your iCloud account; or another iOS device; to locate your iPad and protect its data. In this video; Josh Penzell demonstrates how to use the Find My iPhone app to locate; lock; or erase all the data from your iPad if it's lost or stolen. 55692
IT Security: iPad Privacy Features Josh Penzell The Privacy feature on the iPad allows you to control what applications have access to the private information stored on your iPad. In this video; Josh Penzell demonstrates how to configure the Location Services in the Privacy area and how to determine when an app wants access to specific data on your iPad. 55689
IT Security: iPad Restriction Feature Josh Penzell Restrictions on the iPad is a helpful feature that you can use to prevent access to specific content and applications on the device; allowing you to feel comfortable handing over your iPad to others. In this video; Josh Penzell highlights some of the Restrictions and parental control settings that you can use to lock down your iPad. 55688
IT Security: iPad Safari Security Josh Penzell The iPad Safari browser security settings allow you to keep your personal information safe; and gives you control over your online privacy. In this video; Josh Penzell demonstrates how to lock down Safari's security settings to prevent others from accessing and abusing your personal information while you're browsing the Internet. 55690
IT Security: iPad Wi-Fi Bluetooth Security Josh Penzell Without taking the necessary security precautions when employing Wi-Fi and Bluetooth on your iPad you can expose the device; and the data it contains; to potential security threats. In this video; Josh Penzell demonstrates how to disable wireless connections on the iPad when they're not in use. 55691
IT Security: iPhone - Find My iPhone Josh Penzell If your iPhone is lost or stolen; the Find My iPhone app will enable you to use the iCloud service or another iOS device to locate your iPhone and protect your data from being accessed. In this video; Josh Penzell demonstrates how to configure the Find My iPhone app and highlights the key features provided by the service. 55687
IT Security: iPhone Privacy Features Josh Penzell The Privacy feature on the iPhone allows you to control whether certain applications are allowed access to specific information on your device. In this video; Josh Penzell demonstrates how to configure the Location Services in the Privacy area; and how to determine when an app wants access to specific data on your iPhone. 55684
IT Security: iPhone Restriction Feature Josh Penzell The iPhone includes a helpful feature called Restrictions that you can use to prevent access to specific content and applications on the device so you feel more comfortable handing your iPhone over to others. In this video; Josh Penzell highlights some of the restrictions and parental control settings that you can use to lock down your iPhone. 55683
IT Security: iPhone Safari Security Josh Penzell The iPhone Safari browser security settings allow you to keep your personal information safe and control your online privacy. In this video; Josh Penzell demonstrates how to lock down Safari's security settings in order to prevent others from accessing and abusing your personal information while you're browsing. 55685
IT Security: iPhone Wi-Fi Bluetooth Security Josh Penzell Without taking the necessary security precautions when employing Wi-Fi and Bluetooth on your iPhone; you can expose the device; and the data it contains; to potential security threats. In this video; Josh Penzell highlights some of the best practises for limiting unscrupulous access to your iPhone through wireless connections. 55686
IT Security: Mobile and BYOD Security Carlos Moros The Bring Your Own Device (BYOD) trend challenges IT security strategies applied to the cloud. In this video; Carlos Moros discusses the lack of security controls on consumer devices that access the cloud. If registration; onboarding; and identity management aren't implemented; mobile devices can become bridges between mission-critical corporate information and the cloud. 55706
IT Security: SECaaS Carlos Moros IT security in a cloud environment can be seen in Security as a Service (SaaS); which can be provided by third-party providers. In this video; Carlos Moros discusses the merits of SaaS in cloud computing and what options are available to users; where key factors in deciding on an option are interoperability; portability; trust; and adherence to standards. 55700
IT Security: Securing the Cloud Carlos Moros Securing your Cloud is a relatively new IT security challenge. In this video; Carlos Moros uses the virtualization and multi-tenancy features to explain Cloud computing and its security challenges. 55693
IT Security: Threat Vectors in the Cloud Carlos Moros Cloud computing environments face both old and new IT security vulnerabilities and threats. In this video; Carlos Moros uses the Cloud Security Alliance report to identify and investigate potential security threats that are specific to the Cloud. 55694
IT Security: Virtualization for Security and Security for Virtualization Carlos Moros Virtualization is an IT security mechanism that creates the illusion of multi-tenancy and customer segregation. In this video; Carlos Moros use virtual machines to explain virtualization for security and security for virtualization. 55697
IT Security: What is Your Cloud Provider Doing to Protect Your Assets Carlos Moros Because cloud services cause loss of visibility over information assets; IT security practitioners must evaluate cloud providers in terms of business security and legal requirements. In this video; Carlos Moros suggests an approach developed by the European Network and Information Security Agency in 2011; which covers security and resiliency parameters for preparedness; service delivery; response and recovery; and legal compliance. 55704
Microsoft Security Fundamentals: Intrusion Detection and Intrusion Prevention Systems Travis Welton After watching this video; you will be able to distinguish between the two main types of IDS/IPS. 73774
Microsoft Security Fundamentals: Packet Filtering Firewalls Travis Welton After watching this video; you will be able to recognize characteristics of packet filtering firewalls. 73761
Microsoft Security Fundamentals: Zones Travis Welton With Microsoft Windows; it is vitally important to be aware of security fundamentals. Microsoft added the use of four security content zones to Internet Explorer to improve Internet security. In this video; Travis Welton demonstrates how to configure the four security content zones and further customize the security levels in Internet Explorer. 73728
Securing Mobile Devices in the Enterprise - Exercise: Configuring Intune Dan Lachance After watching this video; you will be able to create an account on Microsoft Intune; enroll devices; and deploy enterprise profiles. 97762
Securing Mobile Devices in the Enterprise - Exercise: Mitigating Threat for BYOD and COD Devices Dan Lachance After watching this video; you will be able to describe mitigation strategies for BYOD and COD devices in the enterprise. 97746
Securing Mobile Devices in the Enterprise - Exercise: Securing Back-end Systems Dan Lachance After watching this video; you will be able to describe threats to back-end systems; and strategies to mitigate them. 97721
Securing Mobile Devices in the Enterprise: Application Hardening Dan Lachance After watching this video; you will be able to describe measures to harden services for mobile applications. 97710
Securing Mobile Devices in the Enterprise: Application Wrapper Overview Dan Lachance After watching this video; you will be able to describe security functionality offered by app wrapper technologies for mobile devices. 97741
Securing Mobile Devices in the Enterprise: Assessing Mobile Threats Dan Lachance After watching this video; you will be able to assess threats from OWASP top 10 and their impact on mobile systems. 97477
Securing Mobile Devices in the Enterprise: Asymmetric Encryption Overview Dan Lachance After watching this video; you will be able to describe asymmetric encryption and its common uses. 97483
Securing Mobile Devices in the Enterprise: Back-end Security Requirements Dan Lachance After watching this video; you will be able to describe requirements for back-end security for mobile applications. 97709
Securing Mobile Devices in the Enterprise: Broken Cryptography Dan Lachance After watching this video; you will be able to describe how broken cryptography affects mobile device front-end and back-end systems. 97465
Securing Mobile Devices in the Enterprise: Building a Demilitarized Zone Dan Lachance After watching this video; you will be able to describe the architecture of a demilitarized zone to protect mobile app services. 97714
Securing Mobile Devices in the Enterprise: Business Impacts of Exploits Dan Lachance After watching this video; you will be able to describe the potential business impacts of mobile exploits. 97471
Securing Mobile Devices in the Enterprise: BYOD Container Usage Scenarios Dan Lachance After watching this video; you will be able to describe usage scenarios for BYOD containers. 97739
Securing Mobile Devices in the Enterprise: BYOD Containers Dan Lachance After watching this video; you will be able to describe BYOD containers for segregating data on BYOD devices. 97738
Securing Mobile Devices in the Enterprise: Client-side Injection Dan Lachance After watching this video; you will be able to describe how client-side injection affects mobile device front-end systems. 97466
Securing Mobile Devices in the Enterprise: Configuring BYOD Containers After watching this video; you will be able to configure BYOD containers using Good Work. 97740
Securing Mobile Devices in the Enterprise: Configuring Perfect Forward Secrecy Dan Lachance After watching this video; you will be able to configure perfect forward secrecy in Internet Information Services. 97735
Securing Mobile Devices in the Enterprise: Configuring the Microsoft Intune Connector Role Dan Lachance After watching this video; you will be able to configure the Microsoft Intune connector role. 97759
Securing Mobile Devices in the Enterprise: Configuring Unmanaged Android Devices Dan Lachance After watching this video; you will be able to configure security settings on-device for unmanaged Android devices. 97727
Securing Mobile Devices in the Enterprise: Configuring Unmanaged iOS Devices Dan Lachance After watching this video; you will be able to configure security settings on-device for unmanaged iPhone and iPad iOS devices. 97728
Securing Mobile Devices in the Enterprise: Configuring Unmanaged Windows Phone Devices Dan Lachance After watching this video; you will be able to configure security settings on-device for unmanaged Windows Phone devices. 97729
Securing Mobile Devices in the Enterprise: Configuring Virtual Private Networks Dan Lachance After watching this video; you will be able to connect a mobile device to a VPN server. 97737
Securing Mobile Devices in the Enterprise: Creating a Microsoft Intune Account Dan Lachance After watching this video; you will be able to create an account for Microsoft Intune. 97749
Securing Mobile Devices in the Enterprise: Creating Certificates Dan Lachance After watching this video; you will be able to create a certificate in Visual Studio makecert. 97708
Securing Mobile Devices in the Enterprise: Cryptography One-way Functions Dan Lachance After watching this video; you will be able to describe the theory of one-way cryptographic functions and hashes. 97479
Securing Mobile Devices in the Enterprise: Cryptography Usage Dan Lachance After watching this video; you will be able to describe usage scenarios for cryptography. 97478
Securing Mobile Devices in the Enterprise: Deploy Enterprise Profiles in Microsoft Intune Dan Lachance After watching this video; you will be able to deploy enterprise profiles in Microsoft Intune. 97755
Securing Mobile Devices in the Enterprise: Device Authorization and Authentication Requirements Dan Lachance After watching this video; you will be able to describe requirements for secure device authorization and authentication. 97473
Securing Mobile Devices in the Enterprise: Device Sensor; Jailbreak; & MDM System Requirements Dan Lachance After watching this video; you will be able to describe requirements for secure device sensors; jailbreaking; and mobile device management systems. 97474
Securing Mobile Devices in the Enterprise: Digital Certificates Overview Dan Lachance After watching this video; you will be able to describe digital certificates and the process of issuing certificates in a CA system. 97707
Securing Mobile Devices in the Enterprise: Digital Signing Overview Dan Lachance After watching this video; you will be able to describe digital signing. 97704
Securing Mobile Devices in the Enterprise: Distribute Apps in Microsoft Intune Dan Lachance After watching this video; you will be able to distribute apps in Microsoft Intune. 97756
Securing Mobile Devices in the Enterprise: Encrypting Cloud Data Dan Lachance After watching this video; you will be able to use Boxcryptor to encrypt and secure cloud data. 97731
Securing Mobile Devices in the Enterprise: Enforcing Configurations in Microsoft Intune Dan Lachance After watching this video; you will be able to enforce configurations in Microsoft Intune. 97753
Securing Mobile Devices in the Enterprise: Enrolling Devices in Microsoft Intune Dan Lachance After watching this video; you will be able to enroll devices in Microsoft Intune. 97751
Securing Mobile Devices in the Enterprise: Enterprise Mobile Device Security Challenges Dan Lachance After watching this video; you will be able to describe network architecture challenges for securing enterprise mobile devices. 97747
Securing Mobile Devices in the Enterprise: Enterprise Mobile Device Security Model Solution Dan Lachance After watching this video; you will be able to describe a solution for enterprise mobile device security challenges based on Microsoft's product portfolio. 97748
Securing Mobile Devices in the Enterprise: Exchange ActiveSync Functionality Dan Lachance After watching this video; you will be able to describe Microsoft Exchange ActiveSync functionality for managing mobile devices. 97732
Securing Mobile Devices in the Enterprise: Handling Certificates in Microsoft Intune Dan Lachance After watching this video; you will be able to handle certificates in Microsoft Intune. 97754
Securing Mobile Devices in the Enterprise: Hashing Overview Dan Lachance After watching this video; you will be able to describe hashing and identify the main hashing algorithms. 97480
Securing Mobile Devices in the Enterprise: Identifying Risks Dan Lachance After watching this video; you will be able to describe the process to determine risk in a mobile environment. 97456
Securing Mobile Devices in the Enterprise: Improper Session Handling Dan Lachance After watching this video; you will be able to describe how improper session handling affects mobile device front-end systems. 97468
Securing Mobile Devices in the Enterprise: Infrastructure Security Requirements Dan Lachance After watching this video; you will be able to describe infrastructure security requirements to support secure mobile apps. 97713
Securing Mobile Devices in the Enterprise: Insecure Data Storage Dan Lachance After watching this video; you will be able to describe how insecure data storage affects mobile device front-end and back-end systems. 97461
Securing Mobile Devices in the Enterprise: Insufficient Transport Layer Protection Dan Lachance After watching this video; you will be able to describe how insufficient transport layer protection affects mobile device front-end and back-end systems. 97462
Securing Mobile Devices in the Enterprise: Key Distribution Dan Lachance After watching this video; you will be able to describe key distribution in cryptographic systems. 97706
Securing Mobile Devices in the Enterprise: Lack of Binary Protections Dan Lachance After watching this video; you will be able to describe how lack of binary protections affects mobile device front-end systems. 97469
Securing Mobile Devices in the Enterprise: Managing Devices with Exchange ActiveSync Dan Lachance After watching this video; you will be able to configure Office 365 Exchange ActiveSync to manage mobile devices. 97733
Securing Mobile Devices in the Enterprise: Microsoft Azure Rights Management Overview Dan Lachance After watching this video; you will be able to describe Microsoft Azure Rights Management cloud-based rights management system. 97744
Securing Mobile Devices in the Enterprise: Mitigating Code Vulnerabilities in Apps Dan Lachance After watching this video; you will be able to describe methods to mitigate code vulnerabilities in mobile apps. 97743
Securing Mobile Devices in the Enterprise: Mitigating Malicious App Functionality Dan Lachance After watching this video; you will be able to describe methods to mitigate malicious functionality in mobile apps. 97742
Securing Mobile Devices in the Enterprise: Mobile Device Management Systems Dan Lachance After watching this video; you will be able to describe the use of mobile device management systems to fully manage secure mobile devices. 97720
Securing Mobile Devices in the Enterprise: Mobile Device Overview Dan Lachance After watching this video; you will be able to describe current mobile devices and form factors. 97453
Securing Mobile Devices in the Enterprise: Mobile Device Ownership Models Dan Lachance After watching this video; you will be able to describe mobile device ownership models and how they relate to a coherent mobile threat mitigation strategy. 97723
Securing Mobile Devices in the Enterprise: Navigating Microsoft Intune Dan Lachance After watching this video; you will be able to navigate the Microsoft Intune interface. 97750
Securing Mobile Devices in the Enterprise: Overview of Security Dan Lachance After watching this video; you will be able to describe mobile security considerations. 97455
Securing Mobile Devices in the Enterprise: Performing Digital Signing Dan Lachance After watching this video; you will be able to perform digital signing using OpenSSL. 97705
Securing Mobile Devices in the Enterprise: Performing Encryption Dan Lachance After watching this video; you will be able to encrypt and decrypt a message using OpenSSL. 97703
Securing Mobile Devices in the Enterprise: Performing Hashing Dan Lachance After watching this video; you will be able to perform hashing using Windows PowerShell. 97481
Securing Mobile Devices in the Enterprise: Poor Authorization and Authentication Dan Lachance After watching this video; you will be able to describe how poor authorization and authentication affects mobile device front-end and back-end systems. 97464
Securing Mobile Devices in the Enterprise: Preparing for iOS Mobile Device Enrollment Dan Lachance After watching this video; you will be able to prepare for iOS device enrollment in Microsoft System Center Configuration Manager. 97761
Securing Mobile Devices in the Enterprise: Preparing for Windows Mobile Device Enrollment Dan Lachance After watching this video; you will be able to prepare for Windows Mobile device enrollment in Microsoft System Center Configuration Manager. 97760
Securing Mobile Devices in the Enterprise: Protect Data in Microsoft Intune Dan Lachance After watching this video; you will be able to protect data in Microsoft Intune. 97757
Securing Mobile Devices in the Enterprise: Protecting Content with Microsoft Azure RMS Dan Lachance After watching this video; you will be able to configure Microsoft Azure Rights Management System to protect confidential documents. 97745
Securing Mobile Devices in the Enterprise: Protecting Data at Rest and in Transit Dan Lachance After watching this video; you will be able to describe measures to protect data in transit and at rest. 97719
Securing Mobile Devices in the Enterprise: Protecting the Transport Layer Dan Lachance After watching this video; you will be able to describe measures to protect mobile apps at the transport layer. 97712
Securing Mobile Devices in the Enterprise: Requirements for the Mobile Enterprise Dan Lachance After watching this video; you will be able to describe the requirements for establishing a Mobile Enterprise. 97722
Securing Mobile Devices in the Enterprise: Reverse Proxy Features Dan Lachance After watching this video; you will be able to describe the use of a reverse proxy in protecting mobile app back-end services. 97715
Securing Mobile Devices in the Enterprise: Rights Management Systems Dan Lachance After watching this video; you will be able to describe the use of rights management systems to secure document content. 97718
Securing Mobile Devices in the Enterprise: Secure App Deployment Dan Lachance After watching this video; you will be able to describe requirements for securing mobile app deployment. 97711
Securing Mobile Devices in the Enterprise: Secure Cloud Storage Dan Lachance After watching this video; you will be able to describe requirements for secure cloud storage. 97730
Securing Mobile Devices in the Enterprise: Secure Device Connectivity and App Requirements Dan Lachance After watching this video; you will be able to describe requirements for secure device connectivity and apps. 97475
Securing Mobile Devices in the Enterprise: Secure Device Data-handling Requirements Dan Lachance After watching this video; you will be able to describe requirements for secure device data handling. 97472
Securing Mobile Devices in the Enterprise: Secure Device User Requirements Dan Lachance After watching this video; you will be able to describe requirements for users of secure devices. 97476
Securing Mobile Devices in the Enterprise: Securing Directory Services and CA Dan Lachance After watching this video; you will be able to describe processes for securing directory services and certificate authorities used in mobile app back-end systems. 97716
Securing Mobile Devices in the Enterprise: Securing E-mail Services Dan Lachance After watching this video; you will be able to describe the use of S/MIME to secure e-mail in the enterprise. 97717
Securing Mobile Devices in the Enterprise: Security Decisions via Untrusted Inputs Dan Lachance After watching this video; you will be able to describe how security decisions via untrusted inputs affect mobile device back-end systems. 97467
Securing Mobile Devices in the Enterprise: Sensitive Data Storage and Transport Dan Lachance After watching this video; you will be able to describe how mobile data is stored and transported. 97459
Securing Mobile Devices in the Enterprise: Sensitive Mobile Assets Dan Lachance After watching this video; you will be able to describe sensitive mobile assets. 97457
Securing Mobile Devices in the Enterprise: Sensitive Usage of Mobile Devices Dan Lachance After watching this video; you will be able to describe sensitive usage scenarios for mobile devices. 97458
Securing Mobile Devices in the Enterprise: Short-lived Session Keys Dan Lachance After watching this video; you will be able to describe challenges with transport layer security; and how they can be solved with short-lived session keys and perfect forward secrecy. 97734
Securing Mobile Devices in the Enterprise: Symmetric Encryption Overview Dan Lachance After watching this video; you will be able to describe symmetric encryption. 97482
Securing Mobile Devices in the Enterprise: System Center Configuration Manager Overview Dan Lachance After watching this video; you will be able to describe Microsoft System Center Configuration Manager and Intune interoperability. 97758
Securing Mobile Devices in the Enterprise: Targeting Devices in Microsoft Intune Dan Lachance After watching this video; you will be able to target devices in Microsoft Intune. 97752
Securing Mobile Devices in the Enterprise: Technical Impacts of Exploits Dan Lachance After watching this video; you will be able to describe the potential technical impacts of mobile exploits. 97470
Securing Mobile Devices in the Enterprise: The Mobile Security Landscape Dan Lachance After watching this video; you will be able to describe the current state of mobile device security. 97454
Securing Mobile Devices in the Enterprise: Unintended Data Leakage Dan Lachance After watching this video; you will be able to describe how unintended data leakage affects mobile device front-end and back-end systems. 97463
Securing Mobile Devices in the Enterprise: Unmanaged Company-owned Devices Dan Lachance After watching this video; you will be able to describe mitigation strategies for unmanaged company-owned devices. 97725
Securing Mobile Devices in the Enterprise: Unmanaged Device User Policies Dan Lachance After watching this video; you will be able to describe appropriate user policies for risk mitigation with unmanaged devices. 97726
Securing Mobile Devices in the Enterprise: Unmanaged Devices in a Small Organization Dan Lachance After watching this video; you will be able to describe mitigation strategies for unmanaged devices in a small organization. 97724
Securing Mobile Devices in the Enterprise: Virtual Private Networking Overview Dan Lachance After watching this video; you will be able to describe virtual private networks for securing network connections. 97736
Securing Mobile Devices in the Enterprise: Weak Server-side Controls Dan Lachance After watching this video; you will be able to list the OWASP top ten mobile risks; and describe how weak server-side controls affect mobile device back-end systems. 97460
Security Essentials: Advanced Security with SCM and Windows Baselines Byron Hynes In Windows 7; the Security Compliance Manager includes the Security Baseline feature; which contains Microsoft's recommendations for various security settings; and actual baseline settings that can be applied across a domain. In this video; Byron Hynes uses the Security Baseline feature to review how a computer's security settings should be configured according to the recommendation. 48452
Security Essentials: Avoid Social Engineering Attacks Byron Hynes Social engineering attacks; such as phishing or e-mail fraud; aim to get your personal information. The United States Computer Emergency Readiness Team (US-CERT) warns against giving sensitive information to anyone unless you're sure they are who they claim to be. In this video; Byron Hynes provides some key tips to prevent computer crime from happening to you. 48447
Security Essentials: Company Wide Security with GPOs Byron Hynes In Windows; you can use Group Policy Objects; or GPOs; to centrally apply and manage security settings; such as firewalls and software restrictions; on some or all of the computers in a network. In this video; Byron Hynes creates a group policy to turn on Windows Firewall when a computer connects to a public network. 48450
Security Essentials: Control Access to Files with Permissions Byron Hynes In Windows; you can use permissions to control who has access to shared information. You can set share permissions on the actual share and NTFS permissions on the files stored in the NTFS file system. In this video; Byron Hynes uses share permissions to share a folder across the network and sets NTFS permissions on the folder. 48453
Security Essentials: Encrypt Your USB Sticks and Portable Media Byron Hynes You can encrypt your hard drives; portable media; memory cards; and USB sticks to prevent phishing and information theft. Encryption tools include BitLocker; a built-in Windows product; and TrueCrypt; which is a free download. In the video; Byron Hynes demonstrates how to access BitLocker and use TrueCrypt to create a virtual drive in which any data stored will be encrypted. 48443
Security Essentials: Encrypting Your Wireless Networks Byron Hynes It's important to protect confidential information transmitted across a wireless network from being accessed by others. You can use various methods of network encryption; such as WEP or WPA2; to secure a wireless private network. In this video; Byron Hynes creates an ad hoc wireless network and uses WPA2-Personal encryption to secure it. 48448
Security Essentials: Enhance Your Privacy on Social Networks Byron Hynes Most social networks; such as Twitter; LinkedIn; Yammer; Foursquare; and Facebook; offer varying levels of privacy that enable you to control your online privacy and reputation. In this video; Byron Hynes uses the Privacy Settings tab on Facebook to customize the privacy levels for his profile and the ads; apps; and web sites that run on his profile. 48451
Security Essentials: General Concepts Byron Hynes There are a number of ways you can protect your computer from security threats. In this video; Byron Hynes discusses the steps you can take to safeguard data. 48441
Security Essentials: Improve Security by Running as a Non-Admin Byron Hynes Windows provides several ways to improve system security; such as the User Account Control feature or performing your day-to-day operations as a nonadministrator; depending on your version of Windows. In this video; Byron Hynes uses the User Account Control feature and creates a new user that's not a member of the Administrators group to improve the security on a system. 48449
Security Essentials: Recognizing E-mail Scams Byron Hynes E-mail scams; sometimes called phishing or fraud; exist to get your money or personal information. The United States Computer Emergency Readiness Team (US-CERT) provides key steps to avoid e-mail fraud; such as filtering spam and using antivirus software and a firewall. In this video; Byron Hynes discusses some specific things that you can do to recognize a fraudulent e-mail. 48445
Security Essentials: Transfer Files Securely Byron Hynes It's important to ensure confidential files are transferred securely via e-mail. You can use a third-party service to encrypt files; or encrypt files yourself using tools such as 7-Zip or WinRar. In this video; Byron Hynes uses WinRar to encrypt a compressed file; assign a password; and encrypt the filenames to ensure they stay protected in transit. 48454
Security Essentials: Use Automatic Updates Byron Hynes Automatic Updates keep your system up to date and resilient against the most common and newest threats. Most major vendors; such as Microsoft; Apple; and Google; have a secure automatic updating function built into their software. In this video; Byron Hynes demonstrates how to configure the Windows Update feature. 48446
Security Essentials: Use Microsoft Security Essentials Byron Hynes You should use antimalware or antivirus software to protect your computer against cyber attacks. Microsoft Security Essentials is a free antivirus program for standalone systems or small organizations using Windows. In the video; Byron Hynes uses Security Essentials to protect his computer against virus attacks. 48444
Security Essentials: Using Good Passwords and Managing Them Byron Hynes It's important to use good passwords for digital commerce and to protect your identity and confidential information. Good password practices include using passphrases or randomly generated strong passwords; using different passwords for different systems; and storing passwords safely. In the video; Byron Hynes uses good password practices to create strong passwords and store them in a password vault. 48442
Security Accreditations and Best Practice (876)
Title Speaker Summary ID
CISSP: Account Management Data Dan Lachance After watching this video; you will be able to use account management data for security assessment and testing. 79335
CISSP: Addressing Embedded Device Vulnerabilities Dan Lachance After watching this video; you will be able to identify best practices for assessing and mitigating embedded device and cyber-physical system vulnerabilities. 79251
CISSP: Addressing Mobile System Vulnerabilities Dan Lachance After watching this video; you will be able to identify best practices for assessing and mitigating mobile system vulnerabilities. 79250
CISSP: Addressing Web-based Systems Vulnerabilities Dan Lachance After watching this video; you will be able to identify best practices for assessing and mitigating web-based systems vulnerabilities. 79249
CISSP: Aligning Security Function to the Organization Dan Lachance After watching this video; you will be able to align the security function to an organization's strategy; goals; mission; and objectives. 79148
CISSP: Analyzing Test Outputs Dan Lachance After watching this video; you will be able to identify best practices for analyzing security assessment and testing results. 79340
CISSP: Anti-Malware Dan Lachance After watching this video; you will be able to identify best practices for using anti-malware as a preventative measure. 79382
CISSP: API Security Dan Lachance After watching this video; you will be able to describe best practices for application programming interface security. 79431
CISSP: Applying Availability Dan Lachance After watching this video; you will be able to identify best practices when applying the concept of availability. 79147
CISSP: Applying Complete Mediation to Engineering Processes Dan Lachance After watching this video; you will be able to apply the secure design principle of complete mediation when implementing and managing engineering processes. 79226
CISSP: Applying Confidentiality Dan Lachance After watching this video; you will be able to identify best practices when applying the concept of confidentiality. 79145
CISSP: Applying Defense in Depth to Engineering Processes Dan Lachance After watching this video; you will be able to apply the secure design principle of defense in depth when implementing and managing engineering processes. 79223
CISSP: Applying Economy of Mechanism to Engineering Processes Dan Lachance After watching this video; you will be able to apply the secure design principle of economy of mechanism when implementing and managing engineering processes. 79225
CISSP: Applying Fail Safe to Engineering Processes Dan Lachance After watching this video; you will be able to apply the secure design principle of fail safe when implementing and managing engineering processes. 79224
CISSP: Applying Integrity Dan Lachance After watching this video; you will be able to identify best practices when applying the concept of integrity. 79146
CISSP: Applying Least Common Mechanism Dan Lachance After watching this video; you will be able to apply the secure design principle of least common mechanism when implementing and managing engineering processes. 79228
CISSP: Applying Least Design to Engineering Processes Dan Lachance After watching this video; you will be able to apply the secure design principle of least design when implementing and managing engineering processes. 79221
CISSP: Applying Least Privilege to Security Operations Dan Lachance After watching this video; you will be able to apply the concept of least privilege to security operations. 79362
CISSP: Applying Open Design to Engineering Processes Dan Lachance After watching this video; you will be able to apply the secure design principle of open design when implementing and managing engineering processes. 79227
CISSP: Applying Psychological Acceptability Dan Lachance After watching this video; you will be able to apply the secure design principle of psychological acceptability when implementing and managing engineering processes. 79229
CISSP: Applying Separation of Duties to Engineering Processes Dan Lachance After watching this video; you will be able to apply the secure design principle of separation of duties when implementing and managing engineering processes. 79222
CISSP: Applying Separation of Duties to Security Operations Dan Lachance After watching this video; you will be able to apply the concept of separation of duties and responsibilities to security operations. 79363
CISSP: Applying Weakest Link to Engineering Processes Dan Lachance After watching this video; you will be able to apply the secure design principle of weakest link when implementing and managing engineering processes. 79230
CISSP: Assessing and Mitigating Client-Based Vulnerabilities Dan Lachance After watching this video; you will be able to identify best practices for assessing client-based vulnerabilities in security architectures; design; and solution elements. 79242
CISSP: Assessing and Mitigating Server-Based Vulnerabilities Dan Lachance After watching this video; you will be able to identify best practices for assessing server-based vulnerabilities in security architectures; design; and solution elements. 79243
CISSP: Assessing Risk Dan Lachance After watching this video; you will be able to distinguish between qualitative; quantitative; and hybrid risk assessment strategies. 79176
CISSP: Assessing Risk Controls Dan Lachance After watching this video; you will be able to identify best practices for assessing risk controls. 79181
CISSP: Assessing Security through Change Logs and Audits Dan Lachance After watching this video; you will be able to use audits and change logs to assess the effectiveness of software security. 79432
CISSP: Assigning and Accepting Risk Dan Lachance After watching this video; you will be able to identify options for assigning and accepting risk. 79177
CISSP: Asymmetric Cryptography Dan Lachance After watching this video; you will be able to identify characteristics of asymmetric cryptography. 79254
CISSP: Auditor Role and Responsibilities Dan Lachance After watching this video; you will be able to identify the role of auditors in asset security. 79206
CISSP: Backup Storage Strategies Dan Lachance After watching this video; you will be able to distinguish between backup storage options. 79396
CISSP: Backup Verification Data Dan Lachance After watching this video; you will be able to use backup verification data for security assessment and testing. 79337
CISSP: Baselines Dan Lachance After watching this video; you will be able to use baselines to determine appropriate date security controls. 79214
CISSP: Business Classification Levels Dan Lachance After watching this video; you will be able to distinguish between the four common business classification levels. 79200
CISSP: Business Impact Analysis Dan Lachance After watching this video; you will be able to conduct a business impact analysis. 79168
CISSP: Civil Investigation Requirements Dan Lachance After watching this video; you will be able to identify requirements for civil investigations. 79349
CISSP: Cloud Identity Services Dan Lachance After watching this video; you will be able to describe cloud identity services; and the functioning of identity as a service. 79306
CISSP: Code Repository Security Dan Lachance After watching this video; you will be able to describe best practices for code repository security. 79430
CISSP: Code Review and Testing Dan Lachance After watching this video; you will be able to distinguish between code review and testing types for security control testing. 79327
CISSP: Collection Limitations and Privacy Protection Dan Lachance After watching this video; you will be able to identify data collection best practices to ensure privacy protection. 79210
CISSP: Common Software Vulnerabilities Dan Lachance After watching this video; you will be able to list CWE and SAN top software vulnerabilities. 79331
CISSP: Communications Cryptography Dan Lachance After watching this video; you will be able to identify common cryptographic protocols used for communications. 79278
CISSP: Computer Crimes Dan Lachance After watching this video; you will be able to identify characteristics of computer crimes that pertain to information security. 79156
CISSP: Computer; Equipment; and Data Security Dan Lachance After watching this video; you will be able to identify best practices for computer and equipment room security. 79268
CISSP: Conducting an Audit Dan Lachance After watching this video; you will be able to describe the process for conducting an audit. 79440
CISSP: Confidentiality Security Models Dan Lachance After watching this video; you will be able to identify characteristics of confidentiality security models. 79232
CISSP: Configuration Management for Secure Coding Dan Lachance After watching this video; you will be able to use configuration management as a method for securing the coding environment. 79429
CISSP: Content-Distribution Networks Dan Lachance After watching this video; you will be able to describe content distribution networks and their security implications. 79283
CISSP: Contingency Planning Dan Lachance After watching this video; you will be able to describe characteristics of contingency planning. 79411
CISSP: Continuous Improvement Dan Lachance After watching this video; you will be able to specify the purpose and best practices of continuous improvement as a result of risk management activities. 79185
CISSP: Continuous Monitoring Dan Lachance After watching this video; you will be able to describe characteristics of continuous monitoring. 79354
CISSP: Continuous Security Monitoring Dan Lachance After watching this video; you will be able to define an Information Systems Continuous Monitoring strategy. 79332
CISSP: Control Frameworks Dan Lachance After watching this video; you will be able to apply security governance principles through the use of control frameworks. 79151
CISSP: Controlling Access to Computer Systems Dan Lachance After watching this video; you will be able to describe methods to control access to computer systems. 79298
CISSP: Controlling Access to Devices Dan Lachance After watching this video; you will be able to describe methods to control access to devices; including BYOD. 79299
CISSP: Controlling Access to Facilities Dan Lachance After watching this video; you will be able to describe methods to control physical access to buildings and facilities. 79300
CISSP: Controlling Access to Information Dan Lachance After watching this video; you will be able to describe methods to control access to information assets. 79297
CISSP: Converged Protocols Dan Lachance After watching this video; you will be able to describe protocol convergence and common protocols for converging voice and video on IP networks. 79276
CISSP: Credential Management and Federation Dan Lachance After watching this video; you will be able to describe credential management and federated authentication systems. 79305
CISSP: Crime Prevention through Environmental Design Dan Lachance After watching this video; you will be able to describe crime prevention through environmental design when assessing sites and facilities. 79265
CISSP: Criminal Investigation Requirements Dan Lachance After watching this video; you will be able to identify requirements for criminal investigations. 79348
CISSP: Critical Building Components Dan Lachance After watching this video; you will be able to identify the critical building components that should be physically located away from main entrances; vehicular circulation; parking; and maintenance areas. 79414
CISSP: Cryptanalytic Attack Methods Dan Lachance After watching this video; you will be able to distinguish between cryptanalytic attack methods. 79262
CISSP: Cryptographic Life Cycle Dan Lachance After watching this video; you will be able to recognize characteristics of the cryptographic life cycle. 79252
CISSP: Cryptographic Systems Vulnerabilities Dan Lachance After watching this video; you will be able to identify best practices for assessing and mitigating cryptographic systems vulnerabilities. 79247
CISSP: Cryptography Dan Lachance After watching this video; you will be able to use cryptography for determining appropriate security controls. 79217
CISSP: Data Breaches Dan Lachance After watching this video; you will be able to identify best practices for addressing data breaches that pertain to information security. 79161
CISSP: Data Classification Criteria Dan Lachance After watching this video; you will be able to distinguish between data classification categories. 79197
CISSP: Data Custodian Role and Responsibilities Dan Lachance After watching this video; you will be able to identify the role of data custodians in asset security. 79204
CISSP: Data Networks and Communications Dan Lachance After watching this video; you will be able to identify network types and describe data communication on a network. 79288
CISSP: Data Owner Role and Responsibilities Dan Lachance After watching this video; you will be able to identify the role of data owners in asset security. 79203
CISSP: Data Owners Role in Privacy Protection Dan Lachance After watching this video; you will be able to specify data owner best practices to ensure privacy protection. 79207
CISSP: Data Processors and Privacy Protection Dan Lachance After watching this video; you will be able to specify data processor best practices to ensure privacy protection. 79208
CISSP: Data Remnants and Privacy Protection Dan Lachance After watching this video; you will be able to specify data remanence best practices to ensure privacy protection. 79209
CISSP: Database Security Vulnerabilities Dan Lachance After watching this video; you will be able to identify best practices for assessing and mitigating database security vulnerabilities. 79244
CISSP: Delegated Identity Dan Lachance After watching this video; you will be able to describe delegated identity in the context of authentication systems. 79308
CISSP: Denial of Service Attacks Dan Lachance After watching this video; you will be able to describe distributed denial of service attacks and identify mitigation strategies. 79291
CISSP: Designing Assessment and Test Strategies Dan Lachance After watching this video; you will be able to identify best practices when designing assessment and test strategies. 79321
CISSP: Destruction of Sensitive Information Dan Lachance After watching this video; you will be able to establish best practices for destruction of sensitive information. 79220
CISSP: Determining and Diagramming Potential Attacks Dan Lachance After watching this video; you will be able to use threat trees to diagram potential attacks. 79188
CISSP: Determining IS Training and Education Requirements Dan Lachance After watching this video; you will be able to specify appropriate information system training; education and awareness levels for an organization. 79195
CISSP: Developing a Recovery Strategy Dan Lachance After watching this video; you will be able to identify best practices for developing a recovery strategy. 79395
CISSP: Development Lifecycle Change Management Security Dan Lachance After watching this video; you will be able to identify secure change management best practices during the software development lifecycle. 79425
CISSP: Digital Forensics Dan Lachance After watching this video; you will be able to identify characteristics of digital forensics and their role in security investigations. 79346
CISSP: Digital Rights Management Dan Lachance After watching this video; you will be able to identify best practices for managing digital rights. 79259
CISSP: Digital Signatures Dan Lachance After watching this video; you will be able to use digital signatures for sending and receiving data. 79258
CISSP: Disaster Recovery and Business Continuity Dan Lachance After watching this video; you will be able to use disaster recovery and business continuity data for security assessment and testing. 79339
CISSP: Disaster Recovery Assessment Dan Lachance After watching this video; you will be able to identify best practices for ensuring appropriate event assessment during disaster recovery activities. 79404
CISSP: Disaster Recovery Communications Dan Lachance After watching this video; you will be able to identify best practices for ensuring adequate communications during disaster recovery activities. 79403
CISSP: Disaster Recovery Personnel Dan Lachance After watching this video; you will be able to identify best practices for ensuring adequate personnel practices during disaster recovery activities. 79402
CISSP: Disaster Recovery Response Dan Lachance After watching this video; you will be able to identify best practices for ensuring adequate response during disaster recovery activities. 79401
CISSP: Disaster Recovery Restoration Dan Lachance After watching this video; you will be able to identify best practices for ensuring restoration during disaster recovery activities. 79405
CISSP: Disaster Recovery Training and Awareness Dan Lachance After watching this video; you will be able to identify best practices for incorporating disaster recovery training and awareness in security operations. 79406
CISSP: Discretionary and Mandatory Access Controls Dan Lachance After watching this video; you will be able to identify discretionary and mandatory access controls. 79311
CISSP: Distributed Systems Vulnerabilities Dan Lachance After watching this video; you will be able to identify best practices for assessing and mitigating distributed systems vulnerabilities. 79246
CISSP: Due Care Dan Lachance After watching this video; you will be able to apply due care. 79152
CISSP: Due Diligence Dan Lachance After watching this video; you will be able to apply due diligence. 79153
CISSP: Duress Considerations Dan Lachance After watching this video; you will be able to describe challenges and best practices for incorporating duress considerations in security policies. 79419
CISSP: Egress Monitoring Dan Lachance After watching this video; you will be able to describe characteristics of egress monitoring. 79355
CISSP: Electronic Discovery Investigation Requirements Dan Lachance After watching this video; you will be able to identify requirements for e-Discovery investigations. 79351
CISSP: Elliptic Curve Cryptography Dan Lachance After watching this video; you will be able to identify characteristics of elliptic curve cryptography. 79255
CISSP: Employment Agreements and Policies Dan Lachance After watching this video; you will be able to identify best security practices for employment agreements and policies. 79170
CISSP: Employment Candidate Screening Dan Lachance After watching this video; you will be able to identify best security practices for screening employee candidates. 79169
CISSP: Employment Termination Processes Dan Lachance After watching this video; you will be able to identify best security practices for employment termination processes. 79171
CISSP: Endpoint Security Dan Lachance After watching this video; you will be able to describe local on-device security for network end systems. 79282
CISSP: Evaluating Systems Security Dan Lachance After watching this video; you will be able to identify characteristics of systems security evaluation. 79235
CISSP: Evidence Collection and Handling Dan Lachance After watching this video; you will be able to describe best practices for evidence collection and handling. 79343
CISSP: Facility Security Considerations Dan Lachance After watching this video; you will be able to identify considerations when planning facility security for an organization. 79267
CISSP: Fault Tolerance Dan Lachance After watching this video; you will be able to identify characteristics of fault tolerance as a security capability within information systems. 79241
CISSP: Fire Issues Dan Lachance After watching this video; you will be able to identify best practices for preventing; detecting; and suppressing fires and fire-related security risks and damage. 79272
CISSP: Full-interruption Testing Dan Lachance After watching this video; you will be able to identify best practices for performing full-interruption testing of a recovery plan. 79410
CISSP: Government Classification Levels Dan Lachance After watching this video; you will be able to distinguish between the five typical government/military classification levels. 79199
CISSP: Hardware Asset Retention Dan Lachance After watching this video; you will be able to identify best practices to appropriately retain hardware assets. 79212
CISSP: Honeypots and Honeynets Dan Lachance After watching this video; you will be able to identify best practices for using honeypots and honeynets as a preventative measure. 79381
CISSP: Identifying Threats and Vulnerabilities Dan Lachance After watching this video; you will be able to identify security threats and vulnerabilities. 79175
CISSP: Identifying Threats Through Threat Modeling Dan Lachance After watching this video; you will be able to identify threats using threat modeling techniques. 79187
CISSP: Identity Access Lifecycle Dan Lachance After watching this video; you will be able to describe the identity access lifecycle. 79316
CISSP: Identity Access Regulatory Considerations Dan Lachance After watching this video; you will be able to describe regulatory considerations for identity and access control systems. 79319
CISSP: Identity and Access Management Best Practice Dan Lachance After watching this video; you will be able to identify best practice for identity and access management. 79320
CISSP: Identity Management Implementation Dan Lachance After watching this video; you will be able to identify implementations of identity management. 79301
CISSP: Identity Providers Dan Lachance After watching this video; you will be able to identify on-premises identity providers. 79307
CISSP: Identity Registration and Proofing Dan Lachance After watching this video; you will be able to describe systems for registering identity and assuring identity with a level of certainty. 79304
CISSP: Implementing a Classification Scheme Dan Lachance After watching this video; you will be able to identify the seven phases of implementing a classification scheme. 79198
CISSP: Implementing ISCM Dan Lachance After watching this video; you will be able to implement an Information Systems Continuous Monitoring strategy. 79333
CISSP: Implementing Risk Countermeasures and Controls Dan Lachance After watching this video; you will be able to implement risk countermeasures and controls. 79179
CISSP: Import/Export Controls Dan Lachance After watching this video; you will be able to identify characteristics of import and export controls that pertain to information security. 79158
CISSP: Incident Detection Dan Lachance After watching this video; you will be able to identify best practices for incident detection. 79370
CISSP: Incident Recovery Dan Lachance After watching this video; you will be able to identify best practices for incident recovery. 79373
CISSP: Incident Remediation and Lessons Learned Dan Lachance After watching this video; you will be able to identify best practices for incident remediation. 79374
CISSP: Incident Reporting Dan Lachance After watching this video; you will be able to identify best practices for incident reporting. 79372
CISSP: Incident Response and Mitigation Dan Lachance After watching this video; you will be able to identify best practices for incident response and mitigation. 79371
CISSP: Industrial Control Systems Vulnerabilities Dan Lachance After watching this video; you will be able to identify best practices for assessing and mitigating industrial control systems vulnerabilities. 79248
CISSP: Information Lifecycle and Security Operations Dan Lachance After watching this video; you will be able to describe the role of the information lifecycle in security operations. 79366
CISSP: Integrated Product Team Dan Lachance After watching this video; you will be able to describe the purpose and best practices of IPTs and their role in secure software development. 79426
CISSP: Integrity Dan Lachance After watching this video; you will be able to identify the role of integrity when applying cryptography. 79261
CISSP: Integrity Security Models Dan Lachance After watching this video; you will be able to identify characteristics of integrity security models. 79233
CISSP: Interface Testing Dan Lachance After watching this video; you will be able to use interface testing as a security control testing technique. 79330
CISSP: Interfaces Dan Lachance After watching this video; you will be able to identify characteristics of interfaces as a security capability within information systems. 79240
CISSP: Internal Audits Dan Lachance After watching this video; you will be able to identify best practices for performing internal audits. 79438
CISSP: Internal Security Controls Dan Lachance After watching this video; you will be able to identify appropriate internal security measures. 79416
CISSP: Intrusion Detection and Prevention Dan Lachance After watching this video; you will be able to describe intrusion detection and prevention best practices. 79352
CISSP: Intrusion Detection and Prevention Systems Dan Lachance After watching this video; you will be able to distinguish between different intrusion detection and prevention systems. 79377
CISSP: Investigation Reporting and Documenting Dan Lachance After watching this video; you will be able to describe best practices for reporting and documenting investigation activities. 79344
CISSP: Investigative Techniques Dan Lachance After watching this video; you will be able to distinguish between different investigative techniques. 79345
CISSP: IP Networks Dan Lachance After watching this video; you will be able to describe the IP protocol. 79274
CISSP: Job Rotation Dan Lachance After watching this video; you will be able to describe best practices for using job rotation in security operations. 79365
CISSP: Key Management Practices Dan Lachance After watching this video; you will be able to identify best practices for key management. 79257
CISSP: Key Performance and Risk Indicators Dan Lachance After watching this video; you will be able to use key performance and risk indicators data for security assessment and testing. 79336
CISSP: Large-Scale Parallel Data Systems Vulnerabilities Dan Lachance After watching this video; you will be able to identify best practices for assessing and mitigating large-scale parallel data systems vulnerabilities. 79245
CISSP: Legislative and Regulatory Compliance Dan Lachance After watching this video; you will be able to apply legislative and regulatory compliance requirements to information system security practices. 79154
CISSP: Leveraging Existing Components Dan Lachance After watching this video; you will be able to apply the secure design principle of leveraging existing components when implementing and managing engineering processes. 79231
CISSP: Licensing and Intellectual Property Dan Lachance After watching this video; you will be able to identify characteristics of licensing and intellectual property that pertain to information security. 79157
CISSP: Log Reviews Dan Lachance After watching this video; you will be able to use log reviews as part of security control testing. 79325
CISSP: Malicious Code Attacks Dan Lachance After watching this video; you will be able to describe the use of malicious code or malware in access control attacks. 79314
CISSP: Marking and Labeling Media Dan Lachance After watching this video; you will be able to establish best practices for marking and labeling media. 79218
CISSP: Maturity Models Dan Lachance After watching this video; you will be able to identify characteristics of capability maturity models and their role in software development lifecycle security. 79423
CISSP: Measuring and Monitoring Risk Dan Lachance After watching this video; you will be able to identify best practices for measuring and monitoring risk. 79182
CISSP: Media Asset Retention Dan Lachance After watching this video; you will be able to identify best practices to appropriately retain media assets. 79211
CISSP: Memory and Virtualization Dan Lachance After watching this video; you will be able to distinguish between memory protection and virtualization security capabilities within information systems. 79238
CISSP: Minimum Security Requirements Dan Lachance After watching this video; you will be able to identify best practices when establishing minimum security requirements for acquisition activities. 79193
CISSP: Misuse Case Testing Dan Lachance After watching this video; you will be able to use misuse case testing as a security control testing technique. 79328
CISSP: Mitigating Access Control Attacks Dan Lachance After watching this video; you will be able to describe mitigation strategies for access control attacks. 79315
CISSP: Monitoring and Privacy Policies Dan Lachance After watching this video; you will be able to identify best practices for incorporating monitoring and privacy considerations in security policies. 79417
CISSP: Monitoring Special Privileges Dan Lachance After watching this video; you will be able to describe best practices for monitoring special privileges in security operations. 79364
CISSP: Multifactor Authentication Dan Lachance After watching this video; you will be able to describe authentication factors and the use of multifactor authentication in authentication systems. 79302
CISSP: Multilayer Protocols Dan Lachance After watching this video; you will be able to describe common protocols and their layer in the relevant models. 79275
CISSP: Multi-level Security Models Dan Lachance After watching this video; you will be able to identify characteristics of multi-level security models. 79234
CISSP: Multimedia Collaboration Dan Lachance After watching this video; you will be able to identify options for securing multimedia channels in the network. 79285
CISSP: Multiple Processing Sites Dan Lachance After watching this video; you will be able to identify characteristics of multiple processing sites. 79398
CISSP: Network Access Control Devices Dan Lachance After watching this video; you will be able to describe network access control and the components of a NAC system. 79281
CISSP: Network Models Dan Lachance After watching this video; you will be able to describe the TCP/IP and the OSI network models. 79273
CISSP: Network Security and Vulnerability Management Dan Lachance After watching this video; you will be able to describe network security management techniques. 79290
CISSP: Nonrepudiation Dan Lachance After watching this video; you will be able to identify the role of nonrepudiation when applying cryptography. 79260
CISSP: Operational Investigation Requirements Dan Lachance After watching this video; you will be able to identify requirements for operational investigations. 79347
CISSP: Organizational Code of Ethics Dan Lachance After watching this video; you will be able to support an organization's code of ethics. 79163
CISSP: Outsourcing Considerations Dan Lachance After watching this video; you will be able to identify best practices for ensuring risk considerations are applied when outsourcing hardware; software and services. 79191
CISSP: Overview of Change Management in Security Operations Dan Lachance After watching this video; you will be able to identify the role of change management in security operations. 79391
CISSP: Overview of Cryptography Dan Lachance After watching this video; you will be able to describe cryptography features and history. 79341
CISSP: Overview of Disaster Recovery Dan Lachance After watching this video; you will be able to identify the role of disaster recovery in security operations. 79400
CISSP: Overview of Patch and Vulnerability Management Dan Lachance After watching this video; you will be able to identify the role of patch and vulnerability management in security operations. 79383
CISSP: Parallel Testing Dan Lachance After watching this video; you will be able to identify best practices for performing a parallel test of a recovery plan. 79409
CISSP: Patch Installation and Deployment Dan Lachance After watching this video; you will be able to describe best practices for patch installation and deployment. 79387
CISSP: Patch Management Audit and Assessment Dan Lachance After watching this video; you will be able to describe best practices for auditing and assessing patch management activities. 79388
CISSP: Patch Management Consistency and Compliance Dan Lachance After watching this video; you will be able to describe best practices for ensuring patch management consistency and compliance. 79389
CISSP: Patch Prioritization and Scheduling Dan Lachance After watching this video; you will be able to describe best practices for patch prioritization and scheduling activities. 79385
CISSP: Patch Testing Dan Lachance After watching this video; you will be able to describe best practices for patch testing activities. 79386
CISSP: Penetration Testing Dan Lachance After watching this video; you will be able to use penetration testing as a method for conducting security control testing. 79324
CISSP: Performing Reduction Analysis Dan Lachance After watching this video; you will be able to identify best practices when performing a reduction analysis. 79189
CISSP: Perimeter Security Controls Dan Lachance After watching this video; you will be able to identify appropriate perimeter security controls. 79415
CISSP: Personnel Asset Retention Dan Lachance After watching this video; you will be able to identify best practices to appropriately retain personnel assets. 79213
CISSP: Personnel Security Compliance Policies Dan Lachance After watching this video; you will be able to identify best practices for establishing personnel security compliance policies. 79173
CISSP: Personnel Security Privacy Policies Dan Lachance After watching this video; you will be able to identify best practices for implementing personnel security policies. 79174
CISSP: Physical Protection Programs Dan Lachance After watching this video; you will be able to describe the role of physical protection programs in operational security. 79413
CISSP: Privacy Dan Lachance After watching this video; you will be able to identify characteristics of privacy issues that pertain to information security. 79160
CISSP: Privacy Requirements Compliance Dan Lachance After watching this video; you will be able to apply privacy requirement compliance in information system security practices. 79155
CISSP: Provisioning Access Dan Lachance After watching this video; you will be able to describe the identity access lifecycle provisioning stage. 79317
CISSP: Public Key Infrastructure (PKI) Dan Lachance After watching this video; you will be able to identify characteristics of PKI. 79256
CISSP: Recovery Plan Read-through Dan Lachance After watching this video; you will be able to identify best practices when performing a recovery plan read-through. 79407
CISSP: Recovery Plan Walkthrough Dan Lachance After watching this video; you will be able to identify best practices for performing recovery plan walkthroughs. 79408
CISSP: Recovery Site Strategies Dan Lachance After watching this video; you will be able to distinguish between recovery site options. 79397
CISSP: Regulatory Investigation Requirements Dan Lachance After watching this video; you will be able to identify requirements for regulatory investigations. 79350
CISSP: Remediating Threats Using Technologies Dan Lachance After watching this video; you will be able to distinguish between different technologies and processes that can be used to remediate threats. 79190
CISSP: Remote Access and Connections Dan Lachance After watching this video; you will be able to describe remote access options and security considerations for the network. 79286
CISSP: Remote Management and User Technologies Dan Lachance After watching this video; you will be able to identify remote management and users technologies used in network environments. 79287
CISSP: Reporting Dan Lachance After watching this video; you will be able to identify best practices for reporting risk management activities and findings. 79184
CISSP: Reporting Test Outputs Dan Lachance After watching this video; you will be able to identify best practices for reporting security assessment and testing results. 79437
CISSP: Resource Security through Configuration Management Dan Lachance After watching this video; you will be able to identify best practices for using configuration management as a technique to secure resources. 79357
CISSP: Restricted and Work Area Security Dan Lachance After watching this video; you will be able to identify best practices for securing restricted work areas. 79269
CISSP: Reviewing IS Training Information for Relevancy Dan Lachance After watching this video; you will be able to identify best practices for conducting periodic reviews for content relevancy. 79196
CISSP: Revoking Access Dan Lachance After watching this video; you will be able to describe the identity access lifecycle revoking access stage. 79318
CISSP: Risk Control Types Dan Lachance After watching this video; you will be able to distinguish between preventive; detective; and corrective risk control types. 79180
CISSP: Risk Frameworks Dan Lachance After watching this video; you will be able to identify appropriate risk frameworks. 79186
CISSP: Role-based Access Control Dan Lachance After watching this video; you will be able to describe the functioning of role-based access control systems. 79309
CISSP: Rule-based Access Control Dan Lachance After watching this video; you will be able to describe the functioning of rule-based access control systems. 79310
CISSP: Sandboxing Dan Lachance After watching this video; you will be able to identify best practices for using sandboxing as a preventative measure. 79380
CISSP: Scoping and Tailoring Dan Lachance After watching this video; you will be able to use scoping and tailoring to determine appropriate security controls. 79215
CISSP: Securing Applications Dan Lachance After watching this video; you will be able to identify best practices for securing applications. 79361
CISSP: Securing Asset Inventory Dan Lachance After watching this video; you will be able to identify best practices for securing asset inventory. 79356
CISSP: Securing Cloud Assets Dan Lachance After watching this video; you will be able to describe best practices for securing cloud assets. 79360
CISSP: Securing Networks and Hardware Dan Lachance After watching this video; you will be able to describe security of networks and hardware network design security considerations. 79279
CISSP: Securing Physical Assets Dan Lachance After watching this video; you will be able to describe best practices for securing physical assets. 79358
CISSP: Securing Virtual Assets Dan Lachance After watching this video; you will be able to describe best practices for securing virtual assets. 79359
CISSP: Security and Patch Information Sources Dan Lachance After watching this video; you will be able to identify best practices for vetting information required for patch and vulnerability management activities. 79384
CISSP: Security Controls and Metrics Dan Lachance After watching this video; you will be able to define security controls and metrics as part of a risk management framework. 79334
CISSP: Security Impact Analysis Dan Lachance After watching this video; you will be able to describe the role of a security impact analysis in change management. 79394
CISSP: Security in Iterative Development Methodologies Dan Lachance After watching this video; you will be able to describe characteristics of iterative development methodologies and their role in software development security. 79422
CISSP: Security in Non-iterative Development Methodologies Dan Lachance After watching this video; you will be able to describe characteristics of non-iterative development methodologies and their role in software development security. 79421
CISSP: Security Information and Event Management Dan Lachance After watching this video; you will be able to describe characteristics of SIEM. 79353
CISSP: Security Investigations Overview Dan Lachance After watching this video; you will be able to identify characteristics of security investigations. 79342
CISSP: Security Policy Dan Lachance After watching this video; you will be able to identify best practices for developing and implementing a documented security policy. 79164
CISSP: Security Procedures Dan Lachance After watching this video; you will be able to identify best practices for developing and implementing documented security procedures. 79166
CISSP: Security Professional Role and Responsibilities Dan Lachance After watching this video; you will be able to identify the role of security professionals in asset security. 79202
CISSP: Security Standards and Guidelines Dan Lachance After watching this video; you will be able to identify best practices for developing and implementing documented security standards and guidelines. 79165
CISSP: Security Threats Dan Lachance After watching this video; you will be able to identify categories of threats that organizations face. 79266
CISSP: Selecting Controls and Countermeasures Dan Lachance After watching this video; you will be able to identify best practices for selecting controls and countermeasures based on security evaluation models. 79237
CISSP: Selecting Countermeasures Dan Lachance After watching this video; you will be able to select risk countermeasures. 79178
CISSP: Senior Manager Role and Responsibilities Dan Lachance After watching this video; you will be able to identify the role of senior managers in asset security. 79201
CISSP: Service-level Agreements in Security Operations Dan Lachance After watching this video; you will be able to describe the role of service-level agreements in security operations. 79367
CISSP: Service-level Requirements Dan Lachance After watching this video; you will be able to use an SLA to define appropriate service-level requirements. 79194
CISSP: Site and Facility Planning Considerations Dan Lachance After watching this video; you will be able to identify site and facility design considerations. 79264
CISSP: Site and Facility Security Assessments Dan Lachance After watching this video; you will be able to identify elements of site and facility security assessments. 79263
CISSP: Social Engineering Attacks Dan Lachance After watching this video; you will be able to describe social engineering attacks related to access control. 79312
CISSP: Software Assurance Best Practices Dan Lachance After watching this video; you will be able to identify the general questions that should be answered as part of an effective software assurance policy. 79436
CISSP: Software Assurance Phases Dan Lachance After watching this video; you will be able to distinguish between the three major phases of SwA. 79435
CISSP: Software Development Lifecycle Operations Security Dan Lachance After watching this video; you will be able to identify secure operations and maintenance best practices during the software development lifecycle. 79424
CISSP: Software Environment Security Dan Lachance After watching this video; you will be able to distinguish between security controls and best practices for the software environment. 79427
CISSP: Software Security Acceptance Testing Dan Lachance After watching this video; you will be able to describe acceptance testing best practices when assessing the effectiveness of software security. 79434
CISSP: Software Security Risk Analysis and Mitigation Dan Lachance After watching this video; you will be able to describe risk analysis and mitigation best practices when assessing the effectiveness of software security. 79433
CISSP: Source-code Level Security Vulnerabilities Dan Lachance After watching this video; you will be able to identify source-code level security vulnerabilities and methods to mitigate risk from them. 79428
CISSP: Spoofing and Vulnerability Attacks Dan Lachance After watching this video; you will be able to describe spoofing and vulnerability attacks and identify mitigation strategies. 79292
CISSP: Standards Selection Dan Lachance After watching this video; you will be able to use standards selection to determine appropriate security controls. 79216
CISSP: Storing Media Dan Lachance After watching this video; you will be able to establish best practices for storing media. 79219
CISSP: Symmetric Cryptography Dan Lachance After watching this video; you will be able to identify characteristics of symmetric cryptography. 79253
CISSP: Synthetic Transactions Dan Lachance After watching this video; you will be able to use synthetic transactions as a security control testing technique. 79326
CISSP: System Resilience and Fault Tolerance Requirements Dan Lachance After watching this video; you will be able to identify best practices for ensuring system resilience and fault tolerance. 79399
CISSP: Systems Security Evaluation Models Dan Lachance After watching this video; you will be able to distinguish between security evaluation models. 79236
CISSP: Test Coverage Analysis Dan Lachance After watching this video; you will be able to perform test coverage analysis as part of security control testing. 79329
CISSP: The (ISC)2 Code of Professional Ethics Dan Lachance After watching this video; you will be able to follow the (ISC)2 Code of Professional Ethics. 79162
CISSP: The Change Management Process Dan Lachance After watching this video; you will be able to distinguish between the different phases of a change management process. 79392
CISSP: The EMO Management Team Dan Lachance After watching this video; you will be able to identify the key responsibilities of the EMO management team. 79412
CISSP: The Project Scope and Plan Dan Lachance After watching this video; you will be able to develop and document a project scope and plan. 79167
CISSP: The Systems Development Life Cycle Dan Lachance After watching this video; you will be able to distinguish between the basic phases of the SDLC. 79420
CISSP: Third-Party Assessment and Monitoring Dan Lachance After watching this video; you will be able to recognize third-party assessment and monitoring techniques for risk mitigation. 79192
CISSP: Third-party Audits Dan Lachance After watching this video; you will be able to identify best practices for performing third-party audits. 79439
CISSP: Third-Party Security Services Dan Lachance After watching this video; you will be able to identify best practices for using third-party security services as a preventative measure. 79379
CISSP: Training and Awareness Dan Lachance After watching this video; you will be able to use training and awareness data for security assessment and testing. 79338
CISSP: Trans-border Data Flow Dan Lachance After watching this video; you will be able to identify characteristics of trans-border data flow issues that pertain to information security. 79159
CISSP: Transmission Media Dan Lachance After watching this video; you will be able to describe the security characteristic of different choices of network media. 79280
CISSP: Travel Security Policies Dan Lachance After watching this video; you will be able to identify travel security best practices to incorporate in security policies. 79418
CISSP: Trusted Platform Module (TPM) Dan Lachance After watching this video; you will be able to identify characteristics of TPM as a security capability within information systems. 79239
CISSP: Unauthorized Physical Access Attacks Dan Lachance After watching this video; you will be able to describe unauthorized physical access attacks. 79313
CISSP: User Accountability and Session Management Dan Lachance After watching this video; you will be able to identify areas of accountability with respect to authentication; including session management tasks; such as locking workstations and setting screensaver timeouts. 79303
CISSP: User Role and Responsibilities Dan Lachance After watching this video; you will be able to identify the role of user in asset security. 79205
CISSP: Using Asset Management for Resource Protection Dan Lachance After watching this video; you will be able to use hardware and software asset management as a resource protection technique. 79369
CISSP: Using Firewalls as a Preventative Measure Dan Lachance After watching this video; you will be able to describe best practices for operating and maintaining firewalls as a preventative measure. 79376
CISSP: Using Media Management for Resource Protection Dan Lachance After watching this video; you will be able to use media management as a resource protection technique. 79368
CISSP: Using Organizational Processes Dan Lachance After watching this video; you will be able to use organizational processes as a method to apply security governance principles. 79149
CISSP: Using Security Roles and Responsibilities Dan Lachance After watching this video; you will be able to use security roles and responsibilities as a method to apply security governance principles. 79150
CISSP: Utilities and HVAC Considerations Dan Lachance After watching this video; you will be able to identify best practices for safely and securely integrating utilities and HVAC systems in the physical environment. 79270
CISSP: Validating Assessment and Test Strategies Dan Lachance After watching this video; you will be able to identify best practices when validating assessment and test strategies. 79322
CISSP: Valuating Assets Dan Lachance After watching this video; you will be able to specify the purpose of valuating assets. 79183
CISSP: Vendor; Consultant; and Contractor Controls Dan Lachance After watching this video; you will be able to identify best security control practices when partnering with vendors; consultants; and contractors. 79172
CISSP: Versioning and Baselining Dan Lachance After watching this video; you will be able to describe the role of versioning and baselining in change management. 79393
CISSP: Virtualized Networks Dan Lachance After watching this video; you will be able to describe the concept of virtualized networks. 79289
CISSP: Voice Dan Lachance After watching this video; you will be able to describe security options for voice channel in converged and non-converged networks. 79284
CISSP: Vulnerability Assessment Dan Lachance After watching this video; you will be able to perform a vulnerability assessment. 79323
CISSP: Vulnerability Management Systems Dan Lachance After watching this video; you will be able to select appropriate vulnerability management systems. 79390
CISSP: Whitelisting and Blacklisting Dan Lachance After watching this video; you will be able to identify best practices for using whitelisting and blacklisting as a preventative measure. 79378
CISSP: Wireless Networks Dan Lachance After watching this video; you will be able to describe wireless networking and the options for securing wireless networks. 79277
CompTIA CASP CAS-002: Access Control Lists Glen E. Clarke When preparing for the CompTIA CASP CAS-002 examination; you're expected to know about Access Control Lists (ACLs); which form a part of network security. An ACL can exist within a file system and network devices such as routers; switches; and wireless access points. In this video; Glen Clarke discusses ACLs and how they determine what traffic passes through a router. 67850
CompTIA CASP CAS-002: Active Directory The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how the Active Directory trust model can be used to help create a secure network environment. 68014
CompTIA CASP CAS-002: ActiveX Dan LaChance In this video; Dan LaChance discusses how ActiveX issues can affect network security in CompTIA CASP CAS-002. 67899
CompTIA CASP CAS-002: Advanced Authentication The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how advanced authentication can help in creating a secure network environment. 68008
CompTIA CASP CAS-002: Advanced Authorization The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how advanced authorization is used to help create a secure network environment. 68009
CompTIA CASP CAS-002: Advanced Configuration of Network Devices Glen E. Clarke The CompTIA CASP CAS-002 exam covers common advanced security configuration settings; and security features provided by network devices. In this video; Glen Clarke provides discusses security features; such as transport security; trunk security; route protection; security features on switches and routers; and wireless access points and port forwarding. 67848
CompTIA CASP CAS-002: AJAX Dan LaChance AJAX is a new way to use existing programming standards. In this video; Dan LaChance reviews how Ajax issues can affect network security in CompTIA CASP CAS-002. 67902
CompTIA CASP CAS-002: Assessment; Sandboxing; and Debugging Steven Crawford In this video; Steven Crawford explains some testing methods that can be used to secure your network. 67969
CompTIA CASP CAS-002: Asset Control & Data Ownership and Handling In this video; Glen E. Clarke discusses how asset control; data ownership; and data handling contribute to incident response and recovery procedures. 67937
CompTIA CASP CAS-002: Attestation and Identity Propagation The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how attestation and identity propagation can help in creating a secure network environment. 68010
CompTIA CASP CAS-002: Auditing and Continuous Monitoring It is critical that your security policy contains additional policies related to the level of monitoring and auditing that should occur within the organization. In this video; Glen E. Clarke discusses auditing and continuous monitoring policies. 67935
CompTIA CASP CAS-002: Baselining of Networking and Security Components Glen E. Clarke When preparing for the CompTIA CASP CAS-002 examination; you will be expected to know the importance of baselining and monitoring a system; in order to ensure high availability and redundancy. In this video; Glen Clarke demonstrates baselining of networking and security components. 67851
CompTIA CASP CAS-002: Benchmarks and Baselines Steven Crawford In this video; Steven Crawford explains how to use network traffic analysis to create benchmarks to monitor and improve network security. 67955
CompTIA CASP CAS-002: Best Practices & New Technologies for Security Systems Steven Crawford In this video; Steven Crawford discusses policy-based; technology-based; and research-based best practices for securing systems. 67948
CompTIA CASP CAS-002: BIOS and Unified Extensible Firmware Interface Glen E. Clarke In this video; Glen E. Clarke introduces the Unified Extensible Firmware Interface (UEFI). 67875
CompTIA CASP CAS-002: Black Box; White Box; and Gray Box Testing Steven Crawford In this video; Steven Crawford discusses the different methods of penetration testing. 67971
CompTIA CASP CAS-002: Building Automation; Physical; and Industrial Controls Glen E. Clarke The CompTIA CASP CAS-002 exam covers physical security features; such as Building Automation System (BAS); physical access controls; and industrial controls. These are key components of a highly secure environment. In this video; Glen Clarke discusses the features of these controls; and provides examples of how they may best be used to provide additional security measures. 67858
CompTIA CASP CAS-002: Business Continuity Planning Glen E. Clarke In preparing for the CompTIA CASP CAS-002 certification; you need to perform business continuity planning; which consists of six phases. In this video; Glen E. Clarke demonstrates the need for business continuity planning and he explains the each of the phases that are involved in the recovery of a business after a disaster. 67924
CompTIA CASP CAS-002: Chain of Custody In this video; Glen E. Clarke discusses the use of the chain of custody during incident response. 67944
CompTIA CASP CAS-002: Chain of Trust and Root of Trust Steven Crawford Root of trust and chain of trust are important concepts in the world of modern network security. In this video; Steven Crawford discusses the modern network security concepts of chain of trust and root of trust. 67817
CompTIA CASP CAS-002: Change Management; Operations; and Maintenance Dan LaChance In this video; Dan LaChance discusses how change management; operations; and maintenance are used to secure network environments in CompTIA CASP CAS-002. 67984
CompTIA CASP CAS-002: CIA Aggregate Scores Glen E. Clarke In preparing for the CompTIA CASP CAS-002 exam; you need to understand how to analyze confidentiality; integrity; and availability (CIA) aggregate scores. CIA aggregate scores help identify the value and associated type of security controls to be placed on assets. In this video; Glen E. Clarke demonstrates how to interpret CIA aggregate scores for security purposes. 67914
CompTIA CASP CAS-002: CIA Decisions; Requirements; and Policies Glen E. Clarke The CompTIA CASP CAS-002 exam covers how to execute risk management strategies and controls. Confidentiality; integrity; and availability (CIA) decisions; requirements and policies are a key aspect of this. CIA is the foundation of security and maintaining CIA is the ultimate goal of information security. In this video; Glen E. Clarke discusses CIA implementation and the controls to facilitate CIA. 67913
CompTIA CASP CAS-002: Clickjacking Dan LaChance Click jacking occurs when an attacker overlays content over a valid webpage invoking completely different code. In this video; Dan la Chance discusses how click jacking can compromise network security in CompTIA CASP CAS-002. 67887
CompTIA CASP CAS-002: Client-Side Attacks; Vulnerabilities; and Threats Steven Crawford In this video; Steven Crawford explains how complex network security solutions for data flow are used to secure network environments in CompTIA CASP CAS-002. 67949
CompTIA CASP CAS-002: Client-Side Processing vs. Server-Side Processing Dan LaChance In this video; Dan LaChance discusses how client-side processing affects network security in comparison to server-side processing in CompTIA CASP CAS-002. 67897
CompTIA CASP CAS-002: Cloud and Virtualization Considerations and Options The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how cloud and virtualized environments affect network security. 67994
CompTIA CASP CAS-002: Cloud Managed Networks Glen E. Clarke In preparing for the CompTIA CASP CAS-002 exam; you need to know about cloud-managed networks and the benefits they have to offer. This includes low cost; high availability; scalability; and low maintenance. In this video; Glen Clarke discusses cloud managed networks and their advantages. 67853
CompTIA CASP CAS-002: Code Signing and Digital Signatures Steven Crawford Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines code signing and digital signatures. 67814
CompTIA CASP CAS-002: Collaboration and Guidance Dan LaChance In this video; Dan LaChance discusses how different business units must collaborate and use security guidance in CompTIA CASP CAS-002. 67978
CompTIA CASP CAS-002: Collaboration Sites Dan LaChance In this video; Dan LaChance discusses the need for security when working with collaboration sites in CompTIA CASP CAS-002. 67982
CompTIA CASP CAS-002: Command Shell Restrictions Glen E. Clarke A restricted shell is one in which certain commands that would otherwise be available are disabled. In this video; Glen E. Clarke explains how command shell restrictions are used to secure network environments in CompTIA CASP CAS-002. 67867
CompTIA CASP CAS-002: Commissioning; Reuse; and Disposal Dan LaChance In this video; Dan LaChance discusses how commissioning; reuse; and disposal affect network security in CompTIA CASP CAS-002. 67985
CompTIA CASP CAS-002: Complex Network Security Solutions for Data Flow Glen E. Clarke The CompTIA CASP CAS-002 exam covers complex network security solutions for data flow. This includes two common traffic analysis techniques - SSL Inspection and Network Flow Data. In this video; Glen Clarke discusses the SSL Inspection and Network Flow Data techniques. 67849
CompTIA CASP CAS-002: Computer Emergency Response Team Steven Crawford In this video; Steven Crawford discusses the roles; responsibilities; and reporting requirements of Computer Emergency Response Teams (CERTs). 67952
CompTIA CASP CAS-002: Conferencing and Messaging Solutions Dan LaChance In this video; Dan LaChance discusses how conferencing and messaging solutions are used to secure network environments in CompTIA CASP CAS-002. 67979
CompTIA CASP CAS-002: Continuity of Operation Plan The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Glen E. Clarke discusses the importance of having a Continuity of Operation Plan in place in the event that security incidents occur. 67946
CompTIA CASP CAS-002: Continuous Improvement and Monitoring Glen E. Clarke When preparing for the CompTIA CASP CAS-002 certification; you need to be able to monitor; manage; and improve IT systems within an organization. In this video; Glen E. Clarke discusses the continuous improvement and continuous monitoring of an IT system within an organization. 67923
CompTIA CASP CAS-002: Conventions; Threat Actors; & Threat Intelligence Steven Crawford In this video; Steven Crawford considers how conventions; threats actors; and threat intelligence are used to create network security in CompTIA CASP CAS-002. 67953
CompTIA CASP CAS-002: CRM; ERP; and GRC The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how Customer Relationship Management (CRM); Enterprise Resource Planning (ERP); and Governance; Risk Management; and Compliance (GRC) are used to aid in creating a secure network environment. 68005
CompTIA CASP CAS-002: Cross-Site Request Forgery Dan LaChance In this video; Dan LaChance explains how cross-site request forgery can compromise network security in CompTIA CASP CAS-002. 67886
CompTIA CASP CAS-002: Cross-Site Scripting Dan LaChance Cross-site scripting is a very common application-layer web attack. In this video; Dan LaChance explains how cross-site scripting can compromise network security in CompTIA CASP CAS-002. 67885
CompTIA CASP CAS-002: Cryptographic Applications Implementations and Key Escrow Steven Crawford With Key Escrow when you encrypt something with a secret key; you will store or place another copy of that key in Escrow. In the event that you lose your secret key; the data can be encrypted with the key that you have escrowed somewhere else. In this video; Steven Crawford discusses the implementation of cryptographic applications and Key Escrow. 67821
CompTIA CASP CAS-002: Data Aggregation and Isolation The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how data aggregation and isolation are used to aid in securing a network environment. 67997
CompTIA CASP CAS-002: Data Loss Prevention and Patch Management Glen E. Clarke In preparing for the CompTIA CASP CAS-002 exam; you need to implement Data Loss Prevention (DLP) solutions and patch management. DLP solutions are designed to prevent users from sending sensitive data outside an organization. Patch management ensures that systems are kept updated. In this video; Glen E. Clarke discusses the features and uses of these processes. 67863
CompTIA CASP CAS-002: Data Recovery and Reconstitution In this video; Glen E. Clarke discusses data recovery and reconstitution in data breach situations. 67940
CompTIA CASP CAS-002: Data Retention; Legal Holds; and Data Recovery It is important from both a functional and a legal perspective that organizational communications be secured and preserved. In this video; Glen E. Clarke explains how data retention; legal holds; and data recovery are used to help secure a network environment. 67936
CompTIA CASP CAS-002: Data Warehousing and Archiving Steven Crawford Data warehousing is used to make large amounts of data available to users within an organization. In this video; Steven Crawford discusses data warehousing and data archiving. 67827
CompTIA CASP CAS-002: Database Activity Monitor Glen E. Clarke The CompTIA CASP CAS-002 certification includes knowledge of the security components in a network. These include intrusion detection systems; such as the Database Activity Monitor (DAM); which is designed to monitor database activity. In this video; Glen Clarke demonstrates database activity monitors. 67846
CompTIA CASP CAS-002: Database and Network Administrators Dan LaChance In this video; Dan LaChance discusses the role of database and network administrators in network security implementations in CompTIA CASP CAS-002. 67974
CompTIA CASP CAS-002: Dedicated Interfaces and Out-of-Band NICs Glen E. Clarke In this video; Glen E. Clarke discusses how dedicated interfaces and out-of-band NICs are used to secure network environments in CompTIA CASP CAS-002. 67868
CompTIA CASP CAS-002: Deduplication and Dynamic Disk Pools Steven Crawford Tiered storage is the hierarchy of storage categories for storing different types of data in different storage. In this video; Steven Crawford discusses tiered storage. 67833
CompTIA CASP CAS-002: Desktop Sharing; Remote Assistance; and Presence Dan LaChance In this video; Dan LaChance discusses how desktop sharing; remote assistance; and presence affect network security in CompTIA CASP CAS-002. 67980
CompTIA CASP CAS-002: Detection and Collection In this video; Glen E. Clarke discusses detection and collection with e-discovery. 67938
CompTIA CASP CAS-002: Device Tracking Technologies Dan LaChance In this video; Dan LaChance discusses how device tracking technologies are used when securing a network environment in CompTIA CASP CAS-002. 67989
CompTIA CASP CAS-002: DNS; CMDB; and CMS The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how Domain Name System (DNS); Configuration Management Database (CMDB); and Content Management System (CMS) are used to aid in creating a secure network environment. 68007
CompTIA CASP CAS-002: DRM; Watermarking; and GPG Steven Crawford Digital Rights Management or DRM helps to control the illegal duplication of software and digital content. The use of watermarking involves embedding information in digital files in the form of a label. GPG enables you to sign your data transmissions. In this video; Steven Crawford discusses the cryptographic techniques of DRM; watermarking; and GPG. 67824
CompTIA CASP CAS-002: Encryption Types Dan LaChance When preparing for the CompTIA CASP CAS-002 exam; you need to know about the different types of encryption methods available. In this video; Dan LeChance demonstrates Full Disk Encryption using BitLocker and how to encrypt individual files using the Encrypted File System (EFS). 67835
CompTIA CASP CAS-002: Endpoint Security Software Glen E. Clarke The CompTIA CASP CAS-002 exam covers a range of security controls; including endpoint security software. Endpoint security software is software placed at endpoints of a communication channel to secure them; thereby increasing the security posture of the whole network. In this video; Glen E. Clarke discusses the use of endpoint security software and provides several examples. 67861
CompTIA CASP CAS-002: End-User Cloud Storage and Business Integration Steven Crawford In this video; Steven Crawford discusses how end-user cloud storage and business integration can affect network security 67951
CompTIA CASP CAS-002: Entropy; Diffusion; and Confusion Steven Crawford Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines Entropy; Diffusion; and Confusion. 67815
CompTIA CASP CAS-002: Error & Exception Handling and Privilege Escalation Dan LaChance Proper error and exception handling routines are essential to organizational security. In this video; Dan LaChance explains how error and exception handling; along with privilege escalation; are issues that must be dealt with in network security in CompTIA CASP CAS-002. 67890
CompTIA CASP CAS-002: ESB; SOA; and Directory Services The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how enterprise application integration enablers help to secure a network environment. 68006
CompTIA CASP CAS-002: Existing Security Controls Steven Crawford In this video; Steven Crawford discusses the methods to evaluate existing security controls. 67960
CompTIA CASP CAS-002: Exploitation Tools Steven Crawford In this video; Steven Crawford explains how exploitation tools can be used for penetration testing. 67967
CompTIA CASP CAS-002: Extreme Planning and Worst Case Scenarios Glen E. Clarke The CompTIA CASP CAS-002 exam covers extreme planning and worst case scenarios in risk management planning. Considering worst case scenarios are essential for disaster planning and developing associated mitigation techniques. In this video; Glen E. Clarke discusses how extreme planning should be approached. 67915
CompTIA CASP CAS-002: Facilities and Physical Security Managers Dan LaChance In this video; Dan LaChance discusses the role of facilities and physical security managers in network security implementations in CompTIA CASP CAS-002. 67977
CompTIA CASP CAS-002: Federation The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how federation can help in creating a secure network environment. 68011
CompTIA CASP CAS-002: Flash Dan LaChance In this video; Dan LaChance explains how Flash issues can affect network security in CompTIA CASP CAS-002. 67901
CompTIA CASP CAS-002: Forensic Analysis of a Compromised System In this video; Glen E. Clarke discusses forensic analysis of a compromised system. 67945
CompTIA CASP CAS-002: Fuzzing and Fault Injection Dan LaChance Fuzzing is a very important part of the system development life cycle. In this video; Dan LaChance explains how fuzzing and fault injection are issues that must be dealt with in network security in CompTIA CASP CAS-002. 67891
CompTIA CASP CAS-002: Hash Matching in Cloud Environments Glen E. Clarke In this video; Glen E. Clarke discusses the benefits of cloud-based hashing. 67873
CompTIA CASP CAS-002: Host Based Firewalls and Log Monitoring Glen E. Clarke The CompTIA CASP CAS-002 exam covers how to select and troubleshoot security controls for hosts; including host-based firewalls and log monitoring. Host-based firewalls control communication to a specific system; while log monitoring systems collect and analyze data as well as notifying users of suspicious activity. In this video; Glen E. Clarke discusses how these can be used to improve security. 67864
CompTIA CASP CAS-002: HTML5 Dan LaChance In this video; Dan LaChance discusses how HTML5 issues can affect network security in CompTIA CASP CAS-002. 67903
CompTIA CASP CAS-002: Human Resources and Emergency Response Dan LaChance In this video; Dan LaChance discusses the role of human resources and emergency response in network security implementations in CompTIA CASP CAS-002. 67976
CompTIA CASP CAS-002: HVAC Controllers and Sensors Glen E. Clarke The CompTIA CASP CAS-002 certification covers the Heating; Ventilation and Air Conditioning (HVAC) system which is vital in preventing assets overheating. Proper temperature is key to maintaining the availability of information. In this video; Glen Clarke discusses the features of the HVAC system as well as how layout of server racks can influence temperature control. 67857
CompTIA CASP CAS-002: IA; ISA; MOU; and SLA In this video; Glen E. Clarke discusses the business documents that should be in place to support the security of your organization. 67929
CompTIA CASP CAS-002: Impact of De-Perimeterization Glen E. Clarke The CompTIA CASP CAS-002 exam covers how constant changing network boundaries impact network security. In this video; Glen E. Clarke discusses network security considerations inherent to an environment where the network boundaries are constantly changing. 67910
CompTIA CASP CAS-002: Implications of Cryptographic Methods and Design Steven Crawford Cryptography not only protects data being stolen or altered; it can also be used for user authentication. In this video; Steven Crawford explains the implications of cryptographic methods and design in CompTIA CASP CAS-002. 67822
CompTIA CASP CAS-002: Incident Response and Forensic Tasks In this video; Glen E. Clarke explains how to use user policies to create a secure network environment; specifically policies related to incident response and forensic tasks. 67933
CompTIA CASP CAS-002: Industry-Accepted Application Security Frameworks Dan LaChance Application security frameworks alleviate the overhead associated with regular tasks performed in application security. In this video; Dan LaChance explains the benefits of accepted application security frameworks in CompTIA CASP CAS-002. 67895
CompTIA CASP CAS-002: INE; SIEM; and HSM Glen E. Clarke When preparing for the CompTIA CASP CAS-002 exam; you need to know about security technologies that are used to create secure networks. In this video; Glen Clarke discusses the Inline Network Encryptor (INE) device; the Security Information and Event Management (SIEM) software; and the Hardware Security Modules (HSM) device. 67844
CompTIA CASP CAS-002: Information Classification Glen E. Clarke The CompTIA CASP CAS-002 certification assesses your ability to execute risk mitigation planning; strategies and control; including information classification. Information classification is used to place value on types of information so that appropriate protection mechanisms can be assigned. The two major types of classification are governmental and commercial. In this video; Glen E. Clarke discusses information classification techniques and their uses. 67912
CompTIA CASP CAS-002: Insecure Direct Object References   Dan LaChance In this video; Dan LaChance explains how insecure direct object references can compromise network security in CompTIA CASP CAS-002. 67884
CompTIA CASP CAS-002: Integrity Measurement Architecture Glen E. Clarke In this video; Glen E. Clarke discusses how IMA contributes to securing network environments. 67876
CompTIA CASP CAS-002: Internal and External Influences Glen E. Clarke When preparing for the CompTIA CASP CAS-002 examination; you're expected to understand the internal and external influences that could impact the security of a business. In this video; Glen E. Clarke discusses some of the key internal and external influences that could affect an organization's security. 67911
CompTIA CASP CAS-002: Internal and External Violations When security incidents occur; part of providing an appropriate level of analysis is considering the impact of internal and external violations on network security. In this video; Glen E. Clarke discusses how internal and external violations affect network security. 67942
CompTIA CASP CAS-002: Interoperability Issues The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how interoperability issues affect network security. 67993
CompTIA CASP CAS-002: IP Video and A/V Controls Glen E. Clarke When preparing for the CompTIA CASP CAS-002 examination; you're expected to know that networking environments may have IP video equipment and Audio/Visual (A/V) controls connected to them. In this video; Glen Clarke discusses the different types of video equipment available for connection to the network; and the features of each. 67859
CompTIA CASP CAS-002: IPv6 and Associated Transitional Technologies   Glen E. Clarke In preparation for the CompTIA CASP CAS-002 examination; you should understand the reasons for IPv6 replacing IPv4 and the functioning of IPv6. In this video; Glen Clarke uses discusses the reasons for the transition from IPv4 to IPv6 and highlights ways to make IPv6 addresses more efficient. 67838
CompTIA CASP CAS-002: iSCSI and FCoE Steven Crawford Internet Small Computer System Interface or iSCSI is a networking standard that is used to connect remote data storage locations. In this video; Steven Crawford discusses iSCSI and Fiber Channel over Ethernet; or FCoE. 67829
CompTIA CASP CAS-002: Issuance and Object Support Steven Crawford Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines issuance; key escrow; and object support. 67819
CompTIA CASP CAS-002: IT Governance Glen E. Clarke When preparing for the CompTIA CASP CAS-002 certification; you need to apply IT governance as part of your advanced level security skills. In this video; Glen E. Clarke discusses the role of IT dovernance when securing information within an organization. 67925
CompTIA CASP CAS-002: Java Applets Dan LaChance Although they have the ability to run cross platform; java applets have a number of security issues. In this video; Dan LaChance discusses how Java applet issues can affect network security in CompTIA CASP CAS-002. 67900
CompTIA CASP CAS-002: JavaScript and State Management Dan LaChance In this video; Dan LaChance discusses how JavaScript and state management can affect network security in CompTIA CASP CAS-002. 67905
CompTIA CASP CAS-002: Judgment Calls Steven Crawford In this video; Steven Crawford discusses how security professionals can improve their ability to make good judgment calls. 67965
CompTIA CASP CAS-002: Key Stretching and Hashing Steven Crawford In this video; Steven Crawford discusses key stretching and hashing in CompTIA CASP CAS-002. 67811
CompTIA CASP CAS-002: Legal Compliance and Advocacy In this video; Glen E. Clarke discusses legal compliance when creating and managing security policies. 67927
CompTIA CASP CAS-002: Lessons Learned and After-Action Reports Steven Crawford In this video; Steven Crawford discusses the value of after-action reports for enhancing enterprise security. 67964
CompTIA CASP CAS-002: Lightweight Direct Access Protocol The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how the Lightweight Direct Access Protocol (LDAP) trust model can be used to help create a secure network environment. 68013
CompTIA CASP CAS-002: Likelihood of Threat Glen E. Clarke In preparing for the CompTIA CASP CAS-002 exam; you need to understand how to perform a threat assessment. In this video; Glen E. Clarke discusses the process of identifying the likelihood of a threat on the assets of an organization. 67918
CompTIA CASP CAS-002: Live VM Migration Glen E. Clarke In this video; Glen E. Clarke discusses the security challenges presented by live VM migration. 67878
CompTIA CASP CAS-002: Logical and Physical Deployment Diagrams The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how logical and physical deployment diagrams are used to create secure network environments. 68002
CompTIA CASP CAS-002: LUN Masking and HBA Allocation Steven Crawford RAID is a data storage concept that involves a group of disks working as one disk for fault tolerance and better performance. In this video; Steven Crawford explains how to use RAID striping and mirroring. 67834
CompTIA CASP CAS-002: Magnitude of Impact Glen E. Clarke The CompTIA CASP CAS-002 exam covers an advanced level security skills and knowledge of IT practitioners. In this video; Glen E. Clarke discusses the process of identifying the magnitude of impact a threat can have on IT assets within an organization and explores the formulas that are used to perform a Quantitative Risk Analysis. 67917
CompTIA CASP CAS-002: Management and Data Interfaces Glen E. Clarke In this video; Glen E. Clarke discusses the use of ACLs; VLANs; and authentication servers in providing additional security for network device management in CompTIA CASP CAS-002. 67869
CompTIA CASP CAS-002: Management and Finance Dan LaChance In this video; Dan LaChance discusses the role of management and finance in network security implementations in CompTIA CASP CAS-002. 67975
CompTIA CASP CAS-002: Memory Leaks & Buffer and Integer Overflows Dan LaChance In this video; Dan LaChance discusses how memory leaks; buffer overflows; and integer overflows can damage network security in CompTIA CASP CAS-002. 67893
CompTIA CASP CAS-002: Mergers; Acquisitions; and Divestitures The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how mergers; acquisitions; and divestitures can affect network security. 68000
CompTIA CASP CAS-002: Mesh Networks Glen E. Clarke The CompTIA CASP CAS-002 certification covers mesh networking and 80?.1x authentication. Mesh networking includes mush and partial-mesh networks. In this video; Glen Clarke discusses the characteristics of mesh networking and the function of 802.1x authentication for a supplicant accessing a network. 67841
CompTIA CASP CAS-002: Metrics Collection and Analysis Steven Crawford In this video; Steven Crawford explains how to ensure the right security metrics are collected and analyzed. 67958
CompTIA CASP CAS-002: Mitigation In this video; Glen E. Clarke discusses mitigation techniques used for data breaches. 67939
CompTIA CASP CAS-002: Multipath and Offsite or Multisite Replication Steven Crawford In this video; Steven Crawford discusses multipath and offsite or multisite replication in CompTIA CASP CAS-002. 67831
CompTIA CASP CAS-002: NAS; SAN; and vSAN Steven Crawford In CompTIA CASP CAS-002; you can use different storage devices like Network Attached Storage or NAS; Storage Area Network or SAN; and Virtual Storage Area Network or vSAN for various purposes. In this video; Steven Crawford discusses the NAS; SAN; and vSAN storage options. 67828
CompTIA CASP CAS-002: Network Access Control Glen E. Clarke When preparing for the CompTIA CASP CAS-002 examination; you're expected to know about network security feature - Network Access Control (NAC) which measures the configuration of connecting clients against a health policy. It then only allows the connection if the client is healthy. In this video; Glen Clarke discusses the features of NAC and the health policy. 67856
CompTIA CASP CAS-002: Network Analysis Tools Steven Crawford In this video; Steven Crawford explains how network analysis tools are used to secure your environment. 67966
CompTIA CASP CAS-002: Network Authentication Methods and 802.1x Glen E. Clarke The CompTIA CASP CAS-002 exam covers advanced levels of security. This includes network authentication and authentication protocols. In this video; Glen E. Clarke discusses the various methods of network authentication; such as passwords; PINs; and smartcards; and the types of authentication protocols which accompany these types. 67840
CompTIA CASP CAS-002: Network Management and Monitoring Tools Glen E. Clarke The CompTIA CASP CAS-002 exam covers the use of network management and monitoring tools in securing network; as well as the types of activities you should monitor. In this video; Glen Clarke discusses the network management and monitoring tools. 67852
CompTIA CASP CAS-002: Network Secure Segmentation and Delegation The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how network secure segmentation and delegation can affect network security. 68001
CompTIA CASP CAS-002: Networking and Security Components Glen E. Clarke The CompTIA CASP CAS-002 exam covers how common security components can be used in conjunction to secure a network environment. In this video; Glen E. Clarke discusses how the security features of network switches; wireless controllers; routers; and proxy servers are used collectively to add to the security of an environment. 67847
CompTIA CASP CAS-002: NFS and CIFS Steven Crawford NAS devices use standard file sharing protocols like network file system and common Internet file system in a file sharing environment. In this video; Steven Crawford explains NFS and CIFS. 67830
CompTIA CASP CAS-002: NIPS and NIDS Glen E. Clarke Network Intrusion Detection Systems; or NIDS; identify suspicious activities in a network or a system; Network Intrusion Prevention Systems; or NIPS; take corrective action to block that suspicious traffic. In this video; Glen E. Clarke discusses network security with NIPS and NIDS. 67843
CompTIA CASP CAS-002: Object Tracking and Containment Technologies Dan LaChance In this video; Dan LaChance discusses how object tracking and containment technologies are used when securing a network environment in CompTIA CASP CAS-002. 67990
CompTIA CASP CAS-002: OLA; NDA; and BPA In this video; Glen E. Clarke discusses the three business documents that should be in place to support security in an organization. 67930
CompTIA CASP CAS-002: Order of Volatility The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Glen E. Clarke describes how the Order of Volatility will allow you to recover from security incidents. 67947
CompTIA CASP CAS-002: Over-the-Air Technologies Dan LaChance In this video; Dan LaChance discusses how over-the-air technologies can be secured in a network environment in CompTIA CASP CAS-002. 67983
CompTIA CASP CAS-002: Passive Reconnaissance and Intelligence Gathering Tools Steven Crawford In this video; Steven Crawford explains how you can use passive intelligence gathering to make your system less vulnerable to attackers. 67968
CompTIA CASP CAS-002: Penetration Testing Steven Crawford In this video; Steven Crawford explains how to use penetration testing to enhance network security. 67970
CompTIA CASP CAS-002: Performance; Latency; Scalability; and Capability Steven Crawford In this video; Steven Crawford explains how features of network security must meet the business needs of the enterprise. 67962
CompTIA CASP CAS-002: Peripheral Restrictions Dan LaChance In this video; Dan LeChance explains how peripheral restrictions are used to secure network environments in CompTIA CASP CAS-002. 67870
CompTIA CASP CAS-002: Policies; Processes; and Procedures for Change In this video; Glen E. Clarke discusses the need to update policies and processes or procedures regularly. 67926
CompTIA CASP CAS-002: Privacy Principles and PII In this video; Glen E. Clarke discusses privacy principles and personally identifiable information. 67931
CompTIA CASP CAS-002: Privilege Elevation and Data Remnants Glen E. Clarke In this video; Glen E. Clarke discusses privilege elevation and data remnants as challenges to network security. 67879
CompTIA CASP CAS-002: Prototypes and Testing Steven Crawford In this video; Steven Crawford discusses how prototypes and testing are used to create network security in CompTIA CASP CAS-002. 67956
CompTIA CASP CAS-002: Pseudo Number Generation and Perfect Forward Secrecy Steven Crawford Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines pseudo number generation and perfect forward secrecy. 67812
CompTIA CASP CAS-002: RA; SOA; and BIA In this video; Glen E. Clarke discusses the business documents that should be in place in an organization to support its security goals. 67928
CompTIA CASP CAS-002: Race Conditions; Resource Exhaustion; and Geo-Tagging Dan LaChance In this video; Dan LaChance discusses how race conditions; resource exhaustion; and geo-tagging can affect network security in CompTIA CASP CAS-002. 67894
CompTIA CASP CAS-002: RADIUS The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes the Remote Authentication Dial In User Service (RADIUS) trust model and how it can be used to help create a secure network environment. 68012
CompTIA CASP CAS-002: Reconnaissance; Fingerprinting; and Social Engineering Steven Crawford In this video; Steven Crawford explains how penetration testing methods should be used to help secure network environments. 67972
CompTIA CASP CAS-002: Remote Desktop Protocol and Virtual Network Computing Glen E. Clarke Remote connection software allows you to access a system from the internet and remotely administer the computer. In this video; Glen E. Clarke discusses the use of Remote Desktop Protocol or RDP and Virtual Network Computing or VNC remote connections software. 67837
CompTIA CASP CAS-002: Remote Desktop Services and App-V   Glen E. Clarke In this video; Glen E. Clarke discusses security features that address challenges associated with two Windows remote technologies: Remote Desktop Services (RDS) and App-V. 67881
CompTIA CASP CAS-002: Resources Provisioning and De-Provisioning The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how provisioning and de-provisioning of resources affect network security. 67998
CompTIA CASP CAS-002: Response and Disclosure When a data breach occurs; it is essential that the response be swift and efficient; and then the breach must be disclosed. In this video; Glen E. Clarke discusses response and disclosure in data breach situations. 67941
CompTIA CASP CAS-002: Return on Investment and Total Cost of Ownership Glen E. Clarke The CompTIA CASP CAS-200 certification covers the use of metrics to assess organizational risk as part of assessing the advanced level security skills and knowledge of IT practitioners. In this video; Glen E. Clarke demonstrates how to use two metrics to analyze risk: Return on Investment (ROI) and Total Cost of Ownership (TCO). 67919
CompTIA CASP CAS-002: Reverse Engineering Solutions Steven Crawford In this video; Steven Crawford explains how to deconstruct existing security solutions to improve enterprise security. 67961
CompTIA CASP CAS-002: RFPs; RFQs; FRIs; and Agreements Steven Crawford Clear and precise documentation is crucial to secure application development. In this video; Steven Crawford; discusses the role RFPs; RFQs; FRIs; and agreements that play in network security in CompTIA CASP CAS-002. 67954
CompTIA CASP CAS-002: Risk Appetite Strategies Glen E. Clarke In preparing for the CompTIA CASP CAS-200 certification; you need to perform a risk analysis and interpret the results successfully. In this video; Glen E. Clarke discusses how to handle potential risks to assets if risks have been identified within an organization. 67920
CompTIA CASP CAS-002: Risk Management Glen E. Clarke When preparing for the CompTIA CASP CAS-002 certification; you need to know about risk management. In this video; Glen E. Clarke discusses the risk management process; how to identify threats; and how to ensure improved asset protection. 67906
CompTIA CASP CAS-002: Risk Management Processes Glen E. Clarke When preparing for the CompTIA CASP CAS-002 examination; you're expected to understand the internal and external influences that could impact the security of a business. In this video; Glen E. Clarke discusses some of the key internal and external influences that could affect an organization's security. 67921
CompTIA CASP CAS-002: Sales Staff and Programmers Dan LaChance In this video; Dan LaChance discusses the role of sales staff and programmers in network security implementations in CompTIA CASP CAS-002. 67973
CompTIA CASP CAS-002: Sandboxing and Content Filtering in Cloud Environments Glen E. Clarke In this video; Glen E. Clarke discusses some cloud-based security features. 67872
CompTIA CASP CAS-002: SCADA and Industrial Control Systems Glen E. Clarke The CompTIA CASP CAS-002 certification covers the Supervisory Control and Data Acquisition (SCADA) system which is a system that communicates with other systems for monitoring purposes of remote equipment. SCADA is one type of Industrial Control System (ICS). In this video; Glen Clarke discusses the features of SCADA and where it's typically used. 67860
CompTIA CASP CAS-002: Secure Boot and Measured Launch Glen E. Clarke In this video; Glen E. Clarke discusses ways of securing the boot environment. 67874
CompTIA CASP CAS-002: Secure Coding Standards Dan LaChance In this video; Dan LaChance explains secure coding standards and how they can be used to increase network security in CompTIA CASP CAS-002. 67898
CompTIA CASP CAS-002: Secure Data Flows to Meet Changing Business Needs Dan LaChance In this video; Dan LaChance explains how secure data flows can be used to meet changing business needs in CompTIA CASP CAS-002. 67991
CompTIA CASP CAS-002: Secure Infrastructure Design The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how a secure infrastructure design is used when creating network security plans. 68003
CompTIA CASP CAS-002: Secure Use of On-demand Cloud Computing The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes secure on-demand cloud computing. 67996
CompTIA CASP CAS-002: Securing Virtual Environments The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes securing virtual environments. 67999
CompTIA CASP CAS-002: Securing Virtualized Servers Dan LaChance In this video; Dan LeChance discusses securing virtualized servers in network environments in CompTIA CASP CAS-002. 67871
CompTIA CASP CAS-002: Security Concerns of Integrating Diverse Industries Glen E. Clarke When preparing for the CompTIA CASP CAS-002; you need to interpret business and industry influences and understand associated security risks; such as the security concerns of integrating industries. As different industries have different functionalities and security focuses; when integrating it is essential to ensure rules and policies are merged. In this video; Glen E. Clarke discusses the security issues around this. 67908
CompTIA CASP CAS-002: Security Group Policy Implementations Glen E. Clarke In this video; Glen E. Clarke reviews how security group policy implementations are used to secure network environments in CompTIA CASP CAS-002. 67866
CompTIA CASP CAS-002: Security Requirements Traceability Matrix Dan LaChance In this video; Dan LaChance discusses how to use the Security Requirements Traceability Matrix in CompTIA CASP CAS-002. 67987
CompTIA CASP CAS-002: Security Zones Glen E. Clarke When preparing for the CompTIA CASP CAS-002 examination; you're expected to know how security zones are used to secure network environments. In this video; Glen E. Clarke discusses security zones; how they operate to control communication between different zones; as well as separate critical assets to secure a network environment. 67855
CompTIA CASP CAS-002: Session Management and Input Validation Dan LaChance In this video; Dan LaChance discusses how session management and input validation can be used to ensure network security in CompTIA CASP CAS-002. 67889
CompTIA CASP CAS-002: Snapshots Steven Crawford Snapshots are an effective and viable backup option from an enterprise security perspective. In this video; Steven Crawford discusses the use of snapshots. 67832
CompTIA CASP CAS-002: SOAP Dan LaChance In this video; Dan LaChance discusses how SOAP issues can affect network security in CompTIA CASP CAS-002. 67904
CompTIA CASP CAS-002: Software-Defined Network Glen E. Clarke The CompTIA CASP CAS-002 certification covers software-defined networking. You need to be familiar with the Control plane and the Data plane; and how these components communicate using the OpenFlow protocol. In this video; Glen Clarke discusses software-defined networking. 67854
CompTIA CASP CAS-002: SQL Injection Dan LaChance SQL injection attacks can destroy databases. In this video; Dan LaChance explains how SQL injections compromise network security in CompTIA CASP CAS-002. 67888
CompTIA CASP CAS-002: SSL; SSH; S/MIME Steven Crawford Secure Socket Layer; Secure Shell; and Secure MIME are important protocols in the world of Internet security. In this video; Steven Crawford discusses SSL; SSH; and S/MIME protocols. 67825
CompTIA CASP CAS-002: Standard Operating Environment Configuration Baselines Glen E. Clarke In this video; Glen E. Clarke explains how Standard Operating Environment configuration baselines are used to secure network environments in CompTIA CASP CAS-002. 67865
CompTIA CASP CAS-002: Standards Dan LaChance In this video; Dan LaChance discusses how standards are used to secure a network environment in CompTIA CASP CAS-002. 67992
CompTIA CASP CAS-002: Steganography Steven Crawford Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines steganography. 67820
CompTIA CASP CAS-002: Storage Integration The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how storage integration can be used to aid in securing a network environment. 68004
CompTIA CASP CAS-002: Storage of Sensitive Data Dan LaChance In this video; Dan LaChance explains the importance of proper storage of sensitive data in network environments in CompTIA CASP CAS-002. 67892
CompTIA CASP CAS-002: Strength vs. Performance vs. Feasibility to Implement vs. Interoperability Steven Crawford Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines strength vs. performance vs. feasibility to implement vs. interoperability. 67823
CompTIA CASP CAS-002: System Specific Risk Analysis Glen E. Clarke When preparing for the CompTIA CASP CAS-002 certification; you need to understand system specific risk analysis. This involves identifying all assets; identifying the threats against those assets; prioritizing the threats; and finally developing mitigation plans for those threats. In this video; Glen E. Clarke demonstrates how to approach a system specific risk analysis. 67916
CompTIA CASP CAS-002: System; Audit; and Review Logs In this video; Glen E. Clarke discusses the importance of logging and auditing when performing incident response. 67943
CompTIA CASP CAS-002: Telephony Dan LaChance In this video; Dan LaChance discusses how telephony must be secured in CompTIA CASP CAS-002. 67981
CompTIA CASP CAS-002: Testing and Agile; Waterfall; and Spiral Methodologies Dan LaChance In this video; Dan LaChance discusses how testing and agile; waterfall; and spiral methodologies are used when securing a networked environment in CompTIA CASP CAS-002. 67988
CompTIA CASP CAS-002: The CIA Triad and Non-Repudiation Steven Crawford Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines the CIA triad and non-repudiation. 67816
CompTIA CASP CAS-002: The Virtual Desktop Infrastructure Glen E. Clarke In this video; Glen E. Clarke discusses the security challenges associated with Virtual Desktop Infrastructure. 67880
CompTIA CASP CAS-002: Third Party Information Security Glen E. Clarke When preparing for the CompTIA CASP CAS-002 examination; you're expected to know about allowing third-party providers access to company data. In this video; Glen E. Clarke discusses security considerations when allowing third-party providers access to company data. 67909
CompTIA CASP CAS-002: TPM; VTPM; and HSM Glen E. Clarke In this video; Glen E. Clarke explains how Hardware Security Modules and Trusted Platform Modules are used to secure network environments. 67882
CompTIA CASP CAS-002: Training and Awareness and Employment Termination The security policy should include specifications on how employees are hired and terminated and trained. In this video; Glen E. Clarke discusses training and awareness policies and employment policies. 67934
CompTIA CASP CAS-002: Transport and Data at Rest Encryption Steven Crawford Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines how to use transport and data at rest encryption. 67813
CompTIA CASP CAS-002: Transport Encryption Glen E. Clarke You can use transport encryption to ensure secure communication with remote systems. In this video; Glen E. Clarke discusses the concept of transport encryption and its advantages. 67839
CompTIA CASP CAS-002: Trend Data and Cyber Defense Steven Crawford In this video; Steven Crawford explains how to use trend data analysis to anticipate the cyber defense aids you may need. 67959
CompTIA CASP CAS-002: Trusted OS Glen E. Clarke In this video; Glen E. Clarke explains how and when a trusted OS configuration would be used to secure a networked environment in CompTIA CASP CAS-002. 67862
CompTIA CASP CAS-002: Unified Threat Management Glen E. Clarke When preparing for the CompTIA CASP CAS-002 examination; you're expected to know about the security devices and technologies required for Unified Threat Management (UTM). In this video; Glen E. Clarke discusses the concept of UTM; its components; and how UTM can help to secure a network infrastructure. 67842
CompTIA CASP CAS-002: Usability; Maintainability; Availability; and Recovery Steven Crawford In this video; Steven Crawford explains how the usability; maintainability; availability; and recoverability of security devices should be considered. 67963
CompTIA CASP CAS-002: User Policies Dan LaChance In this video; Dan LeChance explains how to use user policies to create a secure network environment; specifically policies related to incident response and forensic tasks. 67932
CompTIA CASP CAS-002: Virtual and Cloud Storage Steven Crawford In this video; Steven Crawford defines how virtual and cloud storage works in CompTIA CASP CAS-002. 67826
CompTIA CASP CAS-002: Virtual Private Networks Glen E. Clarke The CompTIA CASP CAS-200 certification covers how you apply advanced level security skills; including the implementation of various network types. In this video; Glen E. Clarke demonstrates how Virtual Private Networks (VPNs) are used to secure an environment. 67836
CompTIA CASP CAS-002: VM Escape Glen E. Clarke In this video; Glen E. Clarke discusses virtual machine environment security requirements. 67877
CompTIA CASP CAS-002: Vulnerabilities Associated with Virtual Machines The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how the vulnerabilities associated with virtual machines (VMs) will affect network security. 67995
CompTIA CASP CAS-002: Web and NextGen Firewalls Glen E. Clarke Preparing for the CompTIA CASP CAS-002 exam; you need to know about the application and protocol-aware technologies that are leveraged in networking environments. In this video; Glen Clarke discusses the Web Application Firewall (WAF); NextGen firewall; and Passive Vulnerability Scanner technologies. 67845
CompTIA CASP CAS-002: Web Application Security Design Considerations Dan LaChance In this video; Dan LaChance discusses how web application security design is used to secure network environments in CompTIA CASP CAS-002. 67883
CompTIA CASP CAS-002: Web Services Security Dan Lachance In this video; Dan LaChance discusses how web services security affects network security in CompTIA CASP CAS-002. 67896
CompTIA CASP CAS-002: Wild Cards; OCSP; and CRL Steven Crawford In this video; Steven Crawford discusses wild cards; OCSP; and CRL in CompTIA CASP CAS-002. 67818
CompTIA CASP CAS-002: Zero Day Mitigation and Emergent Threats Steven Crawford In this video; Steven Crawford; discusses how zero-day and emergent threats can affect network security 67950
CSSLP: Accounting Neil McIsaac After watching this video; you will be able to identify the role of accounting in assuring security . 77389
CSSLP: Agile Neil McIsaac After watching this video; you will be able to identify secure software concepts in the Agile methodology. 77409
CSSLP: Anti-tampering Techniques Glen E. Clarke After watching this video; you will be able to list the steps for code signing. 77477
CSSLP: Applicable Methods to Address Core Security Concepts Neil McIsaac After watching this video; you will be able to distinguish between applicable methods to address core security concepts. 77431
CSSLP: Attack Surface Evaluation Neil McIsaac After watching this video; you will be able to measure and minimize attack surface. 77426
CSSLP: Attack Surface Validation Glen E. Clarke After watching this video; you will be able to recognize characteristics of attack surface validation for software testing. 77484
CSSLP: Authentication and Authorization Part 1 Neil McIsaac After watching this video; you will be able to recognize the characteristics of authentication and authorization. 77388
CSSLP: Authentication and Authorization Part 2 Neil McIsaac After watching this video; you will be able to recognize the characteristics of authentication and authorization. 78944
CSSLP: Authentication and Identity Management Neil McIsaac After watching this video; you will be able to distinguish between characteristics of authentication and identity management. 77442
CSSLP: Availability Neil McIsaac After watching this video; you will be able to identify the characteristics of availability. 77387
CSSLP: Backup; Recovery; and Archiving Glen E. Clarke After watching this video; you will be able to recognize characteristics of backup; recovery; and archiving. 77538
CSSLP: Bootstrapping Glen E. Clarke After watching this video; you will be able to identify the role of bootstrapping in deployment activities. 77530
CSSLP: Bug Tracking Glen E. Clarke After watching this video; you will be able to distinguish between bug tracking states. 77483
CSSLP: Build Environment Glen E. Clarke After watching this video; you will be able to identify build-environment best practices. 77474
CSSLP: Chain of Custody Chuck Easttom After watching this video; you will be able to identify chain of custody best practices. 77555
CSSLP: Change Management Glen E. Clarke After watching this video; you will be able to recognize characteristics of change management. 77537
CSSLP: Cloud Architectures Neil McIsaac After watching this video; you will be able to recognize best practices for securing cloud architectures. 77440
CSSLP: Code Analysis Glen E. Clarke After watching this video; you will be able to distinguish between static and dynamic code analysis. 77476
CSSLP: Code Escrow and Data Exports Chuck Easttom After watching this video; you will be able to identify the purpose of code escrow during supplier transitioning. 77562
CSSLP: Code Reuse Plan Best Practice Chuck Easttom After watching this video; you will be able to identify best practices for creating a practical reuse plan. 77542
CSSLP: Code Testing and Verification Chuck Easttom After watching this video; you will be able to identify code testing and verification options for software development and testing. 77552
CSSLP: Complete Mediation Neil McIsaac After watching this video; you will be able to recognize the characteristics of complete mediation. 77396
CSSLP: Completion Criteria Glen E. Clarke After watching this video; you will be able to list the six generic criteria for judging the suitability of a product. 77525
CSSLP: Concurrency Glen E. Clarke After watching this video; you will be able to recognize examples of using concurrency as a defensive coding practice. 77458
CSSLP: Confidentiality Neil McIsaac After watching this video; you will be able to recognize the characteristics of confidentiality. 77385
CSSLP: Configuration Glen E. Clarke After watching this video; you will be able to recognize examples of using configuration as a defensive coding practice. 77459
CSSLP: Configuration Management Process Glen E. Clarke After watching this video; you will be able to distinguish between the six configuration management process activities. 77532
CSSLP: Configuration Management Roles and Plan Glen E. Clarke After watching this video; you will be able to recognize characteristics of configuration management roles and plan. 77531
CSSLP: Configuration Parameter Management Glen E. Clarke After watching this video; you will be able to recognize characteristics of configuration parameter management as a defensive coding practice. 77470
CSSLP: Continuous Testing Glen E. Clarke After watching this video; you will be able to recognize characteristics of continuous testing. 77520
CSSLP: Contracts Chuck Easttom After watching this video; you will be able to identify contracts best practices during supplier transitioning. 77563
CSSLP: Contractual Integrity Controls Chuck Easttom After watching this video; you will be able to identify best practices for contractual integrity controls. 77547
CSSLP: Control Identification and Prioritization Neil McIsaac After watching this video; you will be able to identify characteristics of control identification and prioritization. 77428
CSSLP: Corrective Action Glen E. Clarke After watching this video; you will be able to recognize options for addressing bugs. 77522
CSSLP: Credential Management Neil McIsaac After watching this video; you will be able to recognize characteristics of credential management. 77443
CSSLP: Cryptographic Validation Glen E. Clarke After watching this video; you will be able to recognize characteristics of cryptographic validation. 77518
CSSLP: Cryptology Glen E. Clarke After watching this video; you will be able to recognize examples of using cryptology as a defensive coding practice. 77460
CSSLP: CWE Glen E. Clarke After watching this video; you will be able to locate and list the CWE list of software weaknesses. 77457
CSSLP: Data Classification (Part 1) Neil McIsaac After watching this video; you will be able to identify data state categories. 77412
CSSLP: Data Classification (Part 2) Neil McIsaac After watching this video; you will be able to identify data usage categories. 77413
CSSLP: Data Lifecycle Neil McIsaac After watching this video; you will be able to distinguish between generation; retention; and disposal. 77417
CSSLP: Data Loss Prevention Neil McIsaac After watching this video; you will be able to recognize characteristics of data loss prevention. 77446
CSSLP: Data Ownership Neil McIsaac After watching this video; you will be able to distinguish between the data owner and data custodian roles. 77414
CSSLP: Data Types Neil McIsaac After watching this video; you will be able to distinguish between structured and unstructured data. 77416
CSSLP: Database Security Neil McIsaac After watching this video; you will be able to distinguish between database security techniques. 77450
CSSLP: Declarative Security Neil McIsaac After watching this video; you will be able to recognize characteristics of declarative security. 77454
CSSLP: Defense in Depth Neil McIsaac After watching this video; you will be able to recognize the characteristics of defense in depth. 77393
CSSLP: Deployment Environment Neil McIsaac After watching this video; you will be able to identify the role of the deployment environment within functional requirements. 77419
CSSLP: Deployment Requirements Neil McIsaac After watching this video; you will be able to identify characteristics of software deployment requirements. 77423
CSSLP: Design and Architecture Technical Review Neil McIsaac After watching this video; you will be able to identify characteristics of design and architecture technical review. 77429
CSSLP: Digital Rights Management (DRM) Neil McIsaac After watching this video; you will be able to recognize types of REL in DRM. 77448
CSSLP: Distributed Computing Neil McIsaac After watching this video; you will be able to distinguish between the different architectural forms and supporting elements of secured distributed computing. 77435
CSSLP: Economy of Mechanism Neil McIsaac After watching this video; you will be able to recognize the characteristics of economy of mechanism. 77395
CSSLP: Embedded Systems Neil McIsaac After watching this video; you will be able to distinguish between control systems and firmware. 77453
CSSLP: Environment Glen E. Clarke After watching this video; you will be able to identify environment best practices for ensuring secure software testing . 77482
CSSLP: Error Handling Glen E. Clarke After watching this video; you will be able to recognize examples of using error handling as a defensive coding practice. 77462
CSSLP: Exception Management Glen E. Clarke After watching this video; you will be able to recognize examples of using exception management as a defensive coding practice. 77466
CSSLP: External Requirements Neil McIsaac After watching this video; you will be able to identify typical external security requirements. 77411
CSSLP: Fail-Safe Neil McIsaac After watching this video; you will be able to recognize the characteristics of fail-safe. 77394
CSSLP: Failure Testing Glen E. Clarke After watching this video; you will be able to recognize characteristics of testing for failure. 77517
CSSLP: Flow Control Neil McIsaac After watching this video; you will be able to distinguish between flow control methods. 77444
CSSLP: Functional Testing Glen E. Clarke After watching this video; you will be able to identify characteristics of functional testing. 77479
CSSLP: Fuzzing Glen E. Clarke After watching this video; you will be able to recognize characteristics of the fuzzing method. 77514
CSSLP: Impact Assessment Glen E. Clarke After watching this video; you will be able to recognize characteristics of impact assessment. 77521
CSSLP: Incident Management Glen E. Clarke After watching this video; you will be able to distinguish between the different activities of incident management. 77535
CSSLP: Independent Testing Glen E. Clarke After watching this video; you will be able to recognize characteristics of independent testing. 77529
CSSLP: Input Validation Glen E. Clarke After watching this video; you will be able to recognize examples of using input validation as a defensive coding practice. 77463
CSSLP: Integrating with Existing Architectures Neil McIsaac After watching this video; you will be able to recognize best security practices when integrating with existing architectures. 77439
CSSLP: Integrity Neil McIsaac After watching this video; you will be able to identify the characteristics of integrity. 77386
CSSLP: Intellectual Property Chuck Easttom After watching this video; you will be able to identify best practices for preventing intellectual property theft. 77543
CSSLP: Interconnectivity Neil McIsaac After watching this video; you will be able to distinguish between interconnectivity activities best practices. 77433
CSSLP: Interfaces Neil McIsaac After watching this video; you will be able to identify interfaces best practices. 77434
CSSLP: Internal Requirements Neil McIsaac After watching this video; you will be able to identify typical internal security requirements. 77410
CSSLP: Labeling Neil McIsaac After watching this video; you will be able to distinguish between the different impact level definitions. 77415
CSSLP: Least Common Mechanism Neil McIsaac After watching this video; you will be able to recognize the characteristics of least common mechanism. 77398
CSSLP: Least Privilege Neil McIsaac After watching this video; you will be able to identify the characteristics of least privilege. 77391
CSSLP: Legal Neil McIsaac After watching this video; you will be able to distinguish between legal issues to keep in mind during the software lifecycle. 77405
CSSLP: Legal Compliance Chuck Easttom After watching this video; you will be able to recognize characteristics of legal compliance. 77544
CSSLP: Leveraging Existing Components Neil McIsaac After watching this video; you will be able to recognize the characteristics of leveraging existing components. 77401
CSSLP: Logging Neil McIsaac After watching this video; you will be able to recognize characteristics of logging. 77445
CSSLP: Logging and Auditing Glen E. Clarke After watching this video; you will be able to recognize examples of using logging and auditing as a defensive coding practice. 77464
CSSLP: Managed Services Controls Chuck Easttom After watching this video; you will be able to identify best secure control practices for managed services from a supplier. 77549
CSSLP: Management Requirements Neil McIsaac After watching this video; you will be able to identify characteristics of management requirements. 77425
CSSLP: Memory Management Glen E. Clarke After watching this video; you will be able to recognize characteristics of memory management as a defensive coding practice. 77469
CSSLP: Mobile Applications Neil McIsaac After watching this video; you will be able to recognize best practices for securing mobile applications. 77441
CSSLP: Monitoring Glen E. Clarke After watching this video; you will be able to recognize characteristics of monitoring during operations and maintenance. 77534
CSSLP: Monitoring and Incident Management Chuck Easttom After watching this video; you will be able to identify monitoring and incident management best practices. 77560
CSSLP: Nonfunctional Testing Glen E. Clarke After watching this video; you will be able to distinguish between nonfunctional testing methods. 77480
CSSLP: Non-Repudiation Neil McIsaac After watching this video; you will be able to recognize the characteristics of non-repudiation. 77390
CSSLP: Objects; Activities; and Actions Neil McIsaac After watching this video; you will be able to distinguish between objects; activities; and actions. 77420
CSSLP: Open Design Neil McIsaac After watching this video; you will be able to recognize the characteristics of open design. 77397
CSSLP: Operating Systems Neil McIsaac After watching this video; you will be able to recognize characteristics of operating systems. 77452
CSSLP: Operations Requirements Neil McIsaac After watching this video; you will be able to identify characteristics of operations requirements. 77424
CSSLP: Output Sanitization Glen E. Clarke After watching this video; you will be able to recognize examples of using output sanitization as a defensive coding practice. 77461
CSSLP: OWASP Top 10 Glen E. Clarke After watching this video; you will be able to locate and list the OWASP "Top 10". 77456
CSSLP: Peer-based Code Review Glen E. Clarke After watching this video; you will be able to recognize characteristics of peer-based code reviews. 77475
CSSLP: Penetration Glen E. Clarke After watching this video; you will be able to identify the four steps in the penetration process. 77513
CSSLP: Pervasive and Ubiquitous Computing Neil McIsaac After watching this video; you will be able to recognize best practices for securing pervasive and ubiquitous computing. 77438
CSSLP: Post-release Plan Glen E. Clarke After watching this video; you will be able to identify characteristics of a post-release plan. 77527
CSSLP: Pre-release Testing Process Glen E. Clarke After watching this video; you will be able to identify the characteristics of the pre-release testing process. 77524
CSSLP: Privacy Considerations Neil McIsaac After watching this video; you will be able to distinguish between different privacy considerations. 77403
CSSLP: Problem Management Glen E. Clarke After watching this video; you will be able to recognize characteristics of problem management. 77536
CSSLP: Product Deployment and Sustainment Controls Chuck Easttom After watching this video; you will be able to recognize best practices when integrating product deployment and sustainment controls. 77559
CSSLP: Programmatic Security Glen E. Clarke After watching this video; you will be able to recognize characteristics of programmatic security. 77455
CSSLP: Programming Language Environment Neil McIsaac After watching this video; you will be able to distinguish between compilers; interpreters and hybrid source codes. 77451
CSSLP: Psychological Acceptability Neil McIsaac After watching this video; you will be able to recognize the characteristics of psychological acceptability. 77399
CSSLP: Publishing and Dissemination Controls Chuck Easttom After watching this video; you will be able to distinguish between licenses; encryption; and authentication as publishing and dissemination controls. 77556
CSSLP: Regression Testing Glen E. Clarke After watching this video; you will be able to recognize characteristics of regression testing. 77519
CSSLP: Regulations and Compliance Neil McIsaac After watching this video; you will be able to recognize characteristics of regulations and compliance. 77404
CSSLP: Release Management Glen E. Clarke After watching this video; you will be able to recognize characteristics of release management activities. 77533
CSSLP: Rich Internet Applications Neil McIsaac After watching this video; you will be able to recognize best practices for securing rich Internet applications. 77437
CSSLP: Risk Acceptance Glen E. Clarke After watching this video; you will be able to identify the characteristics of risk acceptance. 77526
CSSLP: Risk Assessment for Code Reuse Neil McIsaac After watching this video; you will be able to identify characteristics of risk assessment for code reuse. 77430
CSSLP: Risk Assessment for Code Reuse Chuck Easttom After watching this video; you will be able to recognize characteristics of risk assessment for code reuse. 77541
CSSLP: Risk Management Neil McIsaac After watching this video; you will be able to distinguish between the steps of the general risk management model. 77407
CSSLP: Role and User Definitions Neil McIsaac After watching this video; you will be able to identify characteristics of role and user definitions. 77418
CSSLP: Safe APIs Glen E. Clarke After watching this video; you will be able to distinguish between safe and unsafe API coding practices. 77467
CSSLP: Sandboxing Glen E. Clarke After watching this video; you will be able to recognize characteristics of sandboxing as a defensive coding practice. 77472
CSSLP: Scanning Glen E. Clarke After watching this video; you will be able to recognize characteristics of scanning. 77515
CSSLP: Security Design Principles Neil McIsaac After watching this video; you will be able to recognize security design principle best practices. 77432
CSSLP: Security Testing Glen E. Clarke After watching this video; you will be able to distinguish between white; gray; and black-box testing. 77481
CSSLP: Security Testing Controls Chuck Easttom After watching this video; you will be able to list the eight steps to create a formal set of security testing controls. 77553
CSSLP: Separation of Duties Neil McIsaac After watching this video; you will be able to recognize the characteristics of separation of duties. 77392
CSSLP: Sequencing and Timing Requirements Neil McIsaac After watching this video; you will be able to identify best practices for sequencing and timing. 77422
CSSLP: Service-level Agreements Chuck Easttom After watching this video; you will be able to distinguish between the two rules SLAs should provide. 77550
CSSLP: Service-Oriented Architecture Neil McIsaac After watching this video; you will be able to recognize best practices for securing service-oriented architecture. 77436
CSSLP: Session Management Glen E. Clarke After watching this video; you will be able to recognize examples of using session management as a defensive coding practice. 77465
CSSLP: Simulation Testing Glen E. Clarke After watching this video; you will be able to recognize characteristics of simulation testing. 77516
CSSLP: Software Authenticity and Integrity Chuck Easttom After watching this video; you will be able to identify software authenticity and integrity best practices during software delivery; operations and maintenance. 77558
CSSLP: Software Disposal Execution Glen E. Clarke After watching this video; you will be able to identify key activities during software disposal execution. 77540
CSSLP: Software Disposal Planning Glen E. Clarke After watching this video; you will be able to identify the components of an effective software disposal plan. 77539
CSSLP: Software Requirements Verification and Validation Chuck Easttom After watching this video; you will be able to identify software requirements verification and validation . 77554
CSSLP: Source Code and Versioning Glen E. Clarke After watching this video; you will be able to identify source code and versioning best practices. 77473
CSSLP: Standards Glen E. Clarke After watching this video; you will be able to distinguish between testing standards for software quality assurance. 77512
CSSLP: Standards Neil McIsaac After watching this video; you will be able to recognize characteristics of standards. 77406
CSSLP: Supplier Prequalification Chuck Easttom After watching this video; you will be able to identify best practices for supplier prequalification activities. 77545
CSSLP: Supplier Sourcing Challenges Chuck Easttom After watching this video; you will be able to distinguish between different security trade-offs in supplier sourcing. 77546
CSSLP: System-of-Systems Integration Chuck Easttom After watching this video; you will be able to identify characteristics of system-of-systems integration. 77557
CSSLP: Technical Controls Chuck Easttom After watching this video; you will be able to identify technical controls for software development and testing. 77551
CSSLP: Test Data Lifecycle Management Glen E. Clarke After watching this video; you will be able to identify best practices in test data lifecycle management. 77523
CSSLP: Testing Artifacts Glen E. Clarke After watching this video; you will be able to recognize characteristics of testing artifacts. 77478
CSSLP: The Privacy Principle Neil McIsaac After watching this video; you will be able to recognize the characteristics of privacy. 77402
CSSLP: Threat Modeling and Documentation Neil McIsaac After watching this video; you will be able to recognize threat modeling techniques and purpose of documentation. 77427
CSSLP: Tokenizing Glen E. Clarke After watching this video; you will be able to recognize examples of tokenizing as a defensive coding practice. 77471
CSSLP: Trusted Computing Neil McIsaac After watching this video; you will be able to recognize characteristics of trusted computing. 77449
CSSLP: Type Safety Glen E. Clarke After watching this video; you will be able to distinguish between examples of static and dynamic type safety enforcement. 77468
CSSLP: Validation and Verification Glen E. Clarke After watching this video; you will be able to recognize characteristics of validation and verification. 77528
CSSLP: Vendor Technical Integrity Controls Chuck Easttom After watching this video; you will be able to identify best practices for vendor technical integrity controls. 77548
CSSLP: Virtualization Neil McIsaac After watching this video; you will be able to identify benefits of virtualization in secure software design. 77447
CSSLP: Vulnerability Management; Tracking; and Resolution Chuck Easttom After watching this video; you will be able to identify best practices for vulnerability management; tracking; and resolution activities. 77561
CSSLP: Waterfall Neil McIsaac After watching this video; you will be able to identify secure software concepts in the Waterfall methodology. 77408
CSSLP: Weakest Link Neil McIsaac After watching this video; you will be able to recognize the characteristics of weakest link. 77400
Microsoft Security Fundamentals: Active Directory Permissions Travis Welton After watching this video; you will be able to identify characteristics of Active Directory permissions. 73740
Microsoft Security Fundamentals: Advantages and Disadvantages of Security Types Travis Welton It is important to be aware of security fundamentals in Microsoft Windows environment. Wireless security is a key component in data protection. In this video; Travis Welton discusses the advantages and disadvantages of various types of wireless security. 73730
Microsoft Security Fundamentals: Antispam Travis Welton After watching this video; you will be able to identify characteristics of spam filtering. 73793
Microsoft Security Fundamentals: Anti-virus for Client Protection Travis Welton After watching this video; you will be able to identify characteristics of viruses. 73788
Microsoft Security Fundamentals: Application-level Firewalls Travis Welton After watching this video; you will be able to recognize characteristics of application-level firewalls. 73763
Microsoft Security Fundamentals: Assigning Hosts to VLANS Travis Welton After watching this video; you will be able to distinguish between ways to assign hosts to VLANS. 73772
Microsoft Security Fundamentals: Attack Surface Travis Welton Attackers can gain access to your system; network; or application through various methods. In this video; Travis Welton discusses various attack surfaces that need to be considered when dealing with system security. 73719
Microsoft Security Fundamentals: Auditing Best Practices Travis Welton After watching this video; you will be able to recognize auditing best practices. 73751
Microsoft Security Fundamentals: Authentication Methods Travis Welton After watching this video; you will be able to distinguish between different authentication methods. 73735
Microsoft Security Fundamentals: Availability Travis Welton One of the core concepts central to IT security is data availability. In this video; Travis Welton discusses what availability means; and outlines threats to data availability; including accidental and deliberate threats. 73715
Microsoft Security Fundamentals: Browser Settings Travis Welton With Microsoft Windows; it is vitally important to be aware of security fundamentals. When browsing the Internet; adequate data and user protection should be in place. In this video; Travis Welton demonstrates how to configure Internet security settings in Internet Explorer. 73727
Microsoft Security Fundamentals: Buffer Overflow Travis Welton After watching this video; you will be able to recognize characteristics of buffer overflow. 73758
Microsoft Security Fundamentals: Certificate Properties and Services Travis Welton After watching this video; you will be able to recognize certificate properties and services policy best practices. 73756
Microsoft Security Fundamentals: Circuit-level Firewalls Travis Welton After watching this video; you will be able to recognize characteristics of circuit-level firewalls. 73762
Microsoft Security Fundamentals: Client versus Server Protection Travis Welton After watching this video; you will be able to identify the advantages and disadvantages of both client and server protection. 73796
Microsoft Security Fundamentals: Common Attack Methods Travis Welton After watching this video; you will be able to recognize common password attack methods. 73749
Microsoft Security Fundamentals: Common Network Attack Methods Part One Travis Welton After watching this video; you will be able to distinguish between common attack methods. 73785
Microsoft Security Fundamentals: Common Network Attack Methods Part Two Travis Welton After watching this video; you will be able to identify characteristics of common attack methods. 73786
Microsoft Security Fundamentals: Computer Security Travis Welton Considerations for computer security relate to safeguarding data on an organization's actual desktop computers; servers; and laptops. The devices alone can be expensive regardless of the valuable data they may additionally contain. In this video; Travis Welton discusses how to secure physical computer systems. 73721
Microsoft Security Fundamentals: Confidentiality Travis Welton Three concepts are central to IT security - confidentiality; integrity; and availability (CIA). In this video; Travis Welton discusses these principles; explains what's meant by confidentiality and how it's implemented; and outlines different confidentiality classifications. 73713
Microsoft Security Fundamentals: Copying and Moving Files Travis Welton After watching this video; you will be able to distinguish NTFS permission behaviors when copying and moving files. 73741
Microsoft Security Fundamentals: Demilitarized Zones (DMZs) Travis Welton After watching this video; you will be able to identify characteristics of DMZs. 73776
Microsoft Security Fundamentals: Disable Log On Locally Travis Welton It is important to be aware of security fundamentals for Microsoft Windows environment. Administrators can prevent a user or group from accessing a local machine by using the Deny log on locally settings. In this video; Travis Welton demonstrates how to prevent a specific user from logging on to a local machine. 73725
Microsoft Security Fundamentals: Disabling Unsecure Authentication Protocols Travis Welton After watching this video; you will be able to disable unsecure authentication protocols. 73803
Microsoft Security Fundamentals: DNS Security Extensions (DNSSec) Travis Welton After watching this video; you will be able to identify characteristics of DNSSec. 73782
Microsoft Security Fundamentals: EFS Travis Welton After watching this video; you will be able to identify characteristics of EFS. 73753
Microsoft Security Fundamentals: Enabling and Securing Audit Information Travis Welton After watching this video; you will be able to enable and secure audits and audit information. 73752
Microsoft Security Fundamentals: Encrypting Offline Files and Folders Travis Welton After watching this video; you will be able to encrypt offline files and folders. 73791
Microsoft Security Fundamentals: Encryption Methods Travis Welton After watching this video; you will be able to distinguish between different encryption methods. 73754
Microsoft Security Fundamentals: File and Registry Permissions Travis Welton After watching this video; you will be able to distinguish between the types of permissions that can be applied. 73723
Microsoft Security Fundamentals: Firewall Overview Travis Welton After watching this video; you will be able to identify the purpose of firewalls. 73760
Microsoft Security Fundamentals: Group Permissions Travis Welton After watching this video; you will be able to set multiple groups with different permissions. 73745
Microsoft Security Fundamentals: Honeypots Travis Welton After watching this video; you will be able to identify characteristics of honeypots. 73775
Microsoft Security Fundamentals: Inheritance Travis Welton After watching this video; you will be able to enable and disable inheritance. 73744
Microsoft Security Fundamentals: Integrity Travis Welton One of the core concepts central to IT security is integrity. In this video; Travis Welton discusses what integrity means in relation to information security and outlines the ways that data integrity can be protected. 73714
Microsoft Security Fundamentals: Internet Protocol Security (IPSec) in Network Isolation Travis Welton After watching this video; you will be able to identify characteristics of IPSec. 73779
Microsoft Security Fundamentals: Keeping OS and Software Current Travis Welton After watching this video; you will be able to use Windows Update/Windows Server Update Service. 73790
Microsoft Security Fundamentals: Keeping Servers Updated Travis Welton After watching this video; you will be able to recognize the benefits of ensuring OS and applications are kept current. 73801
Microsoft Security Fundamentals: Keyloggers Travis Welton With Microsoft Windows; it is vitally important to be aware of security. Keyloggers pose a threat because they are devices that capture keystroke input to procure sensitive information. In this video; Travis Welton demonstrates types of keyloggers and recommends measures to defend against them. 73726
Microsoft Security Fundamentals: Keys Travis Welton It is important to be aware of security fundamentals in the Microsoft Windows environment. Using authentication and encryption is the best approach to securing a wireless local area network (WLAN). In this video; Travis Welton discusses key-based security methods; namely: Wired Equivalent Privacy (WEP); Wi-Fi Protected Access (WPA); and WPA Version 2 (WPA2). 73731
Microsoft Security Fundamentals: Lockout and Group Policies Travis Welton After watching this video; you will be able to implement password policy settings. 73748
Microsoft Security Fundamentals: MAC Filters Travis Welton In Microsoft Windows; it is vitally important to be aware of security fundamentals. A media access control (MAC) address is the unique hardware address of a network card that allows access to a wireless local area network (WLAN) through filtering. In this video; Travis Welton discusses MAC address filtering for WLAN security. 73733
Microsoft Security Fundamentals: Malware Travis Welton After watching this video; you will be able to distinguish between types of malware. 73787
Microsoft Security Fundamentals: Microsoft Baseline Security Analyzer (MBSA) Travis Welton After watching this video; you will be able to use MBSA. 73806
Microsoft Security Fundamentals: Mobility Device Security Travis Welton Mobile device security poses the most challenges of all; as they can store a lot of data and are the least secure. In this video; Travis Welton discusses how to go about securing mobile devices. 73724
Microsoft Security Fundamentals: Multifactor Authentication Travis Welton After watching this video; you will be able to recognize characteristics of authentication. 73734
Microsoft Security Fundamentals: NAP Requirements Travis Welton After watching this video; you will be able to identify NAP requirements. 73770
Microsoft Security Fundamentals: Network Access Protection (NAP) Purpose Travis Welton After watching this video; you will be able to identify the purpose of NAP. 73769
Microsoft Security Fundamentals: Network Address Translation (NAT) Travis Welton After watching this video; you will be able to identify characteristics of NAT. 73777
Microsoft Security Fundamentals: Network Sniffing Travis Welton After watching this video; you will be able to identify characteristics of utility network sniffing. 73784
Microsoft Security Fundamentals: NTFS vs. FAT Travis Welton After watching this video; you will be able to distinguish between NTFS and FAT file systems permissions characteristics. 73743
Microsoft Security Fundamentals: Ownership and Delegation Travis Welton After watching this video; you will be able to set ownership and delegation permission settings. 73746
Microsoft Security Fundamentals: Password Complexity; Length; and History Policies Travis Welton After watching this video; you will be able to recognize password policy best practices. 73747
Microsoft Security Fundamentals: Password Reset Procedures Travis Welton After watching this video; you will be able to identify best practices when establishing password reset procedures. 73739
Microsoft Security Fundamentals: Phishing and Pharming Travis Welton After watching this video; you will be able to distinguish between phishing and pharming. 73795
Microsoft Security Fundamentals: Pointer (PTR) Records Travis Welton After watching this video; you will be able to describe how PTR records function. 73798
Microsoft Security Fundamentals: Principle of Least Privilege Travis Welton The principle of least privilege is an important concept in IT security. In this video; Travis Welton discusses legislation that has led to an increased focus on the principle; explains the challenges involved in applying the principle; and outlines some of the methods for implementing it. 73717
Microsoft Security Fundamentals: Protocol Spoofing Travis Welton After watching this video; you will be able to identify characteristics of protocol spoofing. 73783
Microsoft Security Fundamentals: Public Key Infrastructure (PKI) Travis Welton After watching this video; you will be able to identify characteristics of PKI. 73737
Microsoft Security Fundamentals: RADIUS Authentication Travis Welton After watching this video; you will be able to recognize characteristics of RADIUS authentication. 73736
Microsoft Security Fundamentals: Read-Only Domain Controllers Travis Welton After watching this video; you will be able to recognize characteristics and benefits of a read-only domain controller. 73804
Microsoft Security Fundamentals: Removable Devices and Drives Travis Welton In Microsoft Security Fundamentals; you may encounter removable devices and drives. These are very credible threats to a computer system. In this video; Travis Welton discusses how to secure removable devices and drives. 73722
Microsoft Security Fundamentals: Routing Travis Welton After watching this video; you will be able to identify characteristics of routing. 73773
Microsoft Security Fundamentals: Secure Web Sites Travis Welton Secure web browsing is initiated using Hypertext Transfer Protocol Secure (HTTPS) with Secure Sockets Layer (SSL) providing a 128-bit encryption. In this video; Travis Welton provides a definition of HTTPS with SSL for providing secure client/server communications through the Internet. 73729
Microsoft Security Fundamentals: Securing Dynamic DNS Updates Travis Welton After watching this video; you will be able to use secure dynamic DNS functionality. 73802
Microsoft Security Fundamentals: Sender Policy Framework (SPF) Records Travis Welton After watching this video; you will be able to describe how SPF records function. 73797
Microsoft Security Fundamentals: Separation of Services Travis Welton After watching this video; you will be able to identify separation of services best practices. 73799
Microsoft Security Fundamentals: Server and Domain Isolation Travis Welton After watching this video; you will be able to identify characteristics of server and domain isolation. 73780
Microsoft Security Fundamentals: Server Hardening Travis Welton After watching this video; you will be able to recognize importance of hardening the server. 73800
Microsoft Security Fundamentals: Share Permissions Travis Welton After watching this video; you will be able to distinguish and apply share permissions. 73742
Microsoft Security Fundamentals: Site Security Travis Welton Site security is vital when keeping mobile or removable devices and phones safe against any potential threats. In this video; Travis Welton discusses physical site security. 73720
Microsoft Security Fundamentals: Social Engineering Travis Welton With the advancements in technology and services available online one must ensure to protect personal information. In this video; Travis Welton discusses social engineering as a security concern. 73718
Microsoft Security Fundamentals: Software Firewalls Travis Welton After watching this video; you will be able to recognize characteristics of software firewalls. 73765
Microsoft Security Fundamentals: Software Restriction Policies Travis Welton After watching this video; you will be able to recognize benefits of software restriction policies. 73792
Microsoft Security Fundamentals: Spoofing Travis Welton After watching this video; you will be able to recognize characteristics of spoofing. 73794
Microsoft Security Fundamentals: SSID Travis Welton It is important to be aware of security fundamentals for the Microsoft Windows environment. A Service Set Identifier (SSID) is a name that identifies a specified wireless local area network (WLAN); allowing authorized users to connect to that WLAN. In this video; Travis Welton demonstrates SSID best practices. 73732
Microsoft Security Fundamentals: Stateful Multilevel Firewalls Travis Welton After watching this video; you will be able to recognize characteristics of stateful multilevel firewalls. 73764
Microsoft Security Fundamentals: Stateful versus Stateless Inspection Travis Welton After watching this video; you will be able to identify the most appropriate inspection type to use. 73768
Microsoft Security Fundamentals: The Impact of Threat and Risk Travis Welton Risk management is central to implementing effective IT security. In this video; Travis Welton discusses how to define risk; explains the purpose of a risk management plan; and describes the key steps involved in the risk management process. 73716
Microsoft Security Fundamentals: Token Devices Travis Welton After watching this video; you will be able to recognize characteristics of token devices. 73757
Microsoft Security Fundamentals: Tunneling Travis Welton After watching this video; you will be able to identify characteristics of tunneling. 73781
Microsoft Security Fundamentals: Types of Auditing Travis Welton After watching this video; you will be able to distinguish between the different auditing types. 73750
Microsoft Security Fundamentals: Types of Inspection Travis Welton After watching this video; you will be able to distinguish between stateful and stateless inspection. 73767
Microsoft Security Fundamentals: Using Hardware versus Software Firewalls Travis Welton After watching this video; you will be able to identify an appropriate firewall for network protection. 73766
Microsoft Security Fundamentals: Using Run as administrator Travis Welton After watching this video; you will be able to use "Run as" option to perform administrative tasks. 73738
Microsoft Security Fundamentals: Utilizing User Account Control (UAC) Travis Welton After watching this video; you will be able to enable and disable UAC. 73789
Microsoft Security Fundamentals: Virtual LANs (VLANs) Travis Welton After watching this video; you will be able to identify characteristics of VLANS. 73771
Microsoft Security Fundamentals: Virtual Private Networks (VPNs) Travis Welton After watching this video; you will be able to identify characteristics of VPNs. 73778
Microsoft Security Fundamentals: VLAN Separate Management Travis Welton After watching this video; you will be able to describe the concept of separate management of VLAN. 73805
Microsoft Security Fundamentals: VPN and Encryption Algorithms Travis Welton After watching this video; you will be able to identify characteristics and uses of VPN and encryption algorithms. 73755
Microsoft Security Fundamentals: Worms; Trojans; and Spyware Travis Welton After watching this video; you will be able to distinguish between characteristics of worms; trojans; and spyware. 73759
OWASP Top 10: SQL Server Injection Mitigation Hilton Giesenow After watching this video; you will be able to describe SQL Injection and how to mitigate against it. 81038
SSystems Security Certified Practitioner: (ISC)2 Code of Ethics Dan Lachance After watching this video; you will be able to identify characteristics of the (ISC)2 Code of Ethics and best practices for compliance. 91488
Systems Security Certified Practitioner: Access Control and Monitoring Dan Lachance After watching this video; you will be able to distinguish between access control and monitoring techniques. 91569
Systems Security Certified Practitioner: Access Control Standards and Protocols Dan Lachance After watching this video; you will be able to describe access control standards and protocols. 91570
Systems Security Certified Practitioner: Administration and Validation Dan Lachance After watching this video; you will be able to describe administration and validation activities as part of operating and implementing cryptographic systems. 91560
Systems Security Certified Practitioner: Application Vulnerabilities Dan Lachance After watching this video; you will be able to identify application vulnerabilities that apply to big data systems. 91601
Systems Security Certified Practitioner: Application White Listing Dan Lachance After watching this video; you will be able to use application white-listing for endpoint device security. 91590
Systems Security Certified Practitioner: Applying Hashing Dan Lachance After watching this video; you will be able to describe purpose and best practices for applying hashing. 91548
Systems Security Certified Practitioner: Applying Salting Dan Lachance After watching this video; you will be able to describe purpose and best practices for applying salting. 91549
Systems Security Certified Practitioner: Appropriate Use Dan Lachance After watching this video; you will be able to describe best practices for appropriate use of security protocols. 91557
Systems Security Certified Practitioner: Architecture and Design Vulnerabilities Dan Lachance After watching this video; you will be able to identify architecture and design vulnerabilities that apply to big data systems. 91602
Systems Security Certified Practitioner: Attribute-based Access Control Dan Lachance After watching this video; you will be able to describe best practices when implementing attribute-based access control. 91486
Systems Security Certified Practitioner: Audit Findings Dan Lachance After watching this video; you will be able to identify how to use audit findings as part of the risk management process. 91522
Systems Security Certified Practitioner: Authentication Overview Dan Lachance After watching this video; you will be able to identify characteristics of authentication and the role it plays in access control. 91470
Systems Security Certified Practitioner: Authorization Dan Lachance After watching this video; you will be able to describe characteristics of authorization as part of the identify management lifecycle. 91477
Systems Security Certified Practitioner: Chain of Custody Dan Lachance After watching this video; you will be able to describe characteristics and best practices of chain of custody during forensic investigation activities. 91540
Systems Security Certified Practitioner: Cloud Security Outsourcing Requirements Dan Lachance After watching this video; you will be able to identify security requirements when outsourcing cloud services. 91600
Systems Security Certified Practitioner: Cloud Virtualization Dan Lachance After watching this video; you will be able to describe characteristics of cloud virtualization. 91597
Systems Security Certified Practitioner: Common Ports and Protocols Dan Lachance After watching this video; you will be able to describe commonly used ports and protocols and their role in network security. 91566
Systems Security Certified Practitioner: Communicating Findings Dan Lachance After watching this video; you will be able to identify best practices for communicating and reporting monitoring analysis results. 91531
Systems Security Certified Practitioner: Communications Network Attacks and Countermeasures Dan Lachance After watching this video; you will be able to describe common attacks and countermeasures for protecting telecommunications technologies. 91568
Systems Security Certified Practitioner: Compensating Controls Dan Lachance After watching this video; you will be able to describe best practices for compensating security controls. 91502
Systems Security Certified Practitioner: Configuration Management Plan Implementation Dan Lachance After watching this video; you will be able to identify activities in implementing a configuration management plan. 91511
Systems Security Certified Practitioner: Continuity and Resilience Dan Lachance After watching this video; you will be able to describe continuity and resilience in secure virtual environments. 91606
Systems Security Certified Practitioner: Converged Communications Dan Lachance After watching this video; you will be able to describe best practices and benefits of converged communications. 91567
Systems Security Certified Practitioner: Corrective Controls Dan Lachance After watching this video; you will be able to describe best practices for corrective security controls. 91501
Systems Security Certified Practitioner: Data Asset Management Dan Lachance After watching this video; you will be able to identify best practices for data asset management. 91507
Systems Security Certified Practitioner: Data Sensitivity Dan Lachance After watching this video; you will be able to describe the purpose and role of data sensitivity in cryptography. 91553
Systems Security Certified Practitioner: Data Storage and Transmission Dan Lachance After watching this video; you will be able to identify secure data storage and transmission options for cloud security. 91599
Systems Security Certified Practitioner: Detective Controls Dan Lachance After watching this video; you will be able to describe best practices for detective security controls. 91500
Systems Security Certified Practitioner: Determining Appropriate Access Controls Dan Lachance After watching this video; you will be able to identify appropriate access controls and best practices for implementation. 91487
Systems Security Certified Practitioner: Deterrent Controls Dan Lachance After watching this video; you will be able to describe best practices for deterrent security controls. 91498
Systems Security Certified Practitioner: Device Authentication Dan Lachance After watching this video; you will be able to identify best practices for implementing device authentication. 91473
Systems Security Certified Practitioner: Digital Signatures Dan Lachance After watching this video; you will be able to describe characteristics and best practices for applying digital signatures. 91551
Systems Security Certified Practitioner: Discretionary Access Control Dan Lachance After watching this video; you will be able to describe best practices when implementing discretionary access control. 91484
Systems Security Certified Practitioner: Emergency Response Plans and Procedures Dan Lachance After watching this video; you will be able to describe characteristics and best practices for supporting emergency response plans and procedures. 91542
Systems Security Certified Practitioner: Endpoint Encryption Dan Lachance After watching this video; you will be able to use endpoint encryption for endpoint device security. 91591
Systems Security Certified Practitioner: End-user Training Dan Lachance After watching this video; you will be able to identify end-user training best practices related to cryptography. 91555
Systems Security Certified Practitioner: Entitlement Dan Lachance After watching this video; you will be able to describe entitlement activities during the identity management lifecycle. 91481
Systems Security Certified Practitioner: Event Data Analysis Dan Lachance After watching this video; you will be able to describe characteristics and purpose of event data analysis activities. 91530
Systems Security Certified Practitioner: Events of Interest Dan Lachance After watching this video; you will be able to describe characteristics of events of interest as part of continuous monitoring activities. 91525
Systems Security Certified Practitioner: Evidence Handling Dan Lachance After watching this video; you will be able to identify best practices for evidence handling during forensic investigation activities. 91539
Systems Security Certified Practitioner: Firewalls and Proxies Dan Lachance After watching this video; you will be able to identify best practices for using firewalls and proxies. 91576
Systems Security Certified Practitioner: First Responder Dan Lachance After watching this video; you will be able to identify first responder best practices during forensic investigation activities. 91538
Systems Security Certified Practitioner: Hardware Asset Management Dan Lachance After watching this video; you will be able to identify best practices for hardware asset management. 91505
Systems Security Certified Practitioner: HIDS Dan Lachance After watching this video; you will be able to use HIDS for endpoint device security. 91588
Systems Security Certified Practitioner: Host-based Firewalls Dan Lachance After watching this video; you will be able to use host-based firewalls for endpoint device security. 91589
Systems Security Certified Practitioner: Hypervisor Dan Lachance After watching this video; you will be able to identify characteristics and role of hypervisors in virtual environments. 91604
Systems Security Certified Practitioner: Identifying Malicious Activity Dan Lachance After watching this video; you will be able to distinguish between different types of malicious activity. 91586
Systems Security Certified Practitioner: Implementation Variation Dan Lachance After watching this video; you will be able to compare differences in implementation methodologies. 91556
Systems Security Certified Practitioner: Implementing Backup and Redundancy Options Dan Lachance After watching this video; you will be able to describe characteristics and best practices for implementing backup and redundancy options. 91545
Systems Security Certified Practitioner: Implementing Countermeasures Dan Lachance After watching this video; you will be able to identify best practices when implementing countermeasures. 91537
Systems Security Certified Practitioner: Implementing Cryptographic Systems Dan Lachance After watching this video; you will be able to identify best practices for implementing and operating cryptographic systems and controls. 91563
Systems Security Certified Practitioner: Implementing Operational Security Controls Dan Lachance After watching this video; you will be able to identify appropriate best practices when implementing different types of operating security controls. 91503
Systems Security Certified Practitioner: Implementing Secure Protocols Dan Lachance After watching this video; you will be able to identify best practices for implementing secure protocols. 91562
Systems Security Certified Practitioner: Incident Discovery Dan Lachance After watching this video; you will be able to describe incident discovery activities. 91533
Systems Security Certified Practitioner: Incident Escalation Dan Lachance After watching this video; you will be able to identify incident escalation activities. 91534
Systems Security Certified Practitioner: Incident Response Dan Lachance After watching this video; you will be able to identify incident response best practices. 91536
Systems Security Certified Practitioner: Interim Processing Strategies Dan Lachance After watching this video; you will be able to describe interim or alternate processing strategies as part of business continuity activities. 91543
Systems Security Certified Practitioner: Interpreting Scanning and Testing Results Dan Lachance After watching this video; you will be able to describe how to interpret and report scanning and testing results. 91524
Systems Security Certified Practitioner: Legal and Privacy Concerns Dan Lachance After watching this video; you will be able to identify the legal and privacy concerns associated with cloud security. 91598
Systems Security Certified Practitioner: Lifecycle Asset Management Dan Lachance After watching this video; you will be able to identify best practices for lifecycle asset management. 91504
Systems Security Certified Practitioner: Logging Dan Lachance After watching this video; you will be able to describe logging activities as part of operating and maintaining monitoring systems. 91526
Systems Security Certified Practitioner: Maintenance Dan Lachance After watching this video; you will be able to identify maintenance best practices during the identity management lifecycle. 91480
Systems Security Certified Practitioner: Malicious Activity Countermeasures Dan Lachance After watching this video; you will be able to identify countermeasure for mitigating risk and damage from malicious activity. 91587
Systems Security Certified Practitioner: Malicious Code Dan Lachance After watching this video; you will be able to describe characteristics of malicious code. 91584
Systems Security Certified Practitioner: Malicious Code Countermeasures Dan Lachance After watching this video; you will be able to identify countermeasures for mitigating risk and damage from malicious code. 91585
Systems Security Certified Practitioner: Managerial Controls Dan Lachance After watching this video; you will be able to describe how to use managerial controls to implement and assess compliance. 91510
Systems Security Certified Practitioner: Mandatory Access Control Dan Lachance After watching this video; you will be able to describe best practices when implementing mandatory access control. 91482
Systems Security Certified Practitioner: Mobile Device Management Dan Lachance After watching this video; you will be able to use mobile device management for endpoint device security. 91593
Systems Security Certified Practitioner: Monitoring and Analyzing Risk Dan Lachance After watching this video; you will be able to identify best practices for identifying; monitoring; and analyzing risk. 91532
Systems Security Certified Practitioner: Network Access Attacks and Countermeasures Dan Lachance After watching this video; you will be able to describe common network access attacks and appropriate countermeasures. 91572
Systems Security Certified Practitioner: Network Intrusion Detection and Prevention Systems Dan Lachance After watching this video; you will be able to identify best practices for using network intrusion detection and prevention systems. 91577
Systems Security Certified Practitioner: Network Topographies and Relationships Dan Lachance After watching this video; you will be able to identify the different types of network topographies and their role in network security. 91565
Systems Security Certified Practitioner: Non-discretionary Access Control Dan Lachance After watching this video; you will be able to describe best practices when implementing non-discretionary access control. 91483
Systems Security Certified Practitioner: Non-repudiation Dan Lachance After watching this video; you will be able to describe characteristics and best practices for applying non-repudiation. 91552
Systems Security Certified Practitioner: One-way Trust Relationships Dan Lachance After watching this video; you will be able to describe characteristics of one-way trust relationships in internetwork trust architectures. 91474
Systems Security Certified Practitioner: Operation Models Dan Lachance After watching this video; you will be able to distinguish between cloud security operation models. 91595
Systems Security Certified Practitioner: Operational Controls Dan Lachance After watching this video; you will be able to describe how to use operational controls to implement and assess compliance. 91509
Systems Security Certified Practitioner: Organizational Code of Ethics Dan Lachance After watching this video; you will be able to identify best practices for compliance with organizational code of ethics. 91489
Systems Security Certified Practitioner: OSI and TCP/IP Models Dan Lachance After watching this video; you will be able to distinguish between OSI and TCP/IP models and their role in network security issues. 91564
Systems Security Certified Practitioner: Participating in Physical Security Operations Dan Lachance After watching this video; you will be able to identify physical security operations activities. 91516
Systems Security Certified Practitioner: Participating in Security Administration Dan Lachance After watching this video; you will be able to identify appropriate activities for participating in change management; security operations and security administration processes. 91517
Systems Security Certified Practitioner: Participating in Security Awareness and Training Dan Lachance After watching this video; you will be able to identify security awareness and training activities. 91515
Systems Security Certified Practitioner: Participating in Security Testing and Evaluation Dan Lachance After watching this video; you will be able to describe security testing and evaluation activities. 91523
Systems Security Certified Practitioner: Patch Management Dan Lachance After watching this video; you will be able to describe activities for implementing and testing patches; fixes; and updates. 91514
Systems Security Certified Practitioner: Plane Separation Dan Lachance After watching this video; you will be able to describe data plane and control plane separation for managing LAN-based security. 91573
Systems Security Certified Practitioner: Preservation of Scene Dan Lachance After watching this video; you will be able to identify best practices for preservation of scene during forensic investigation activities. 91541
Systems Security Certified Practitioner: Preventative Controls Dan Lachance After watching this video; you will be able to describe best practices for preventative security controls. 91499
Systems Security Certified Practitioner: Proofing Dan Lachance After watching this video; you will be able to identify proofing best practices during the identity management lifecycle. 91478
Systems Security Certified Practitioner: Provisioning Dan Lachance After watching this video; you will be able to describe provisioning activities as part of the identity management lifecycle. 91479
Systems Security Certified Practitioner: Public Key Infrastructure Dan Lachance After watching this video; you will be able to describe how to use PKI as part of implementing and operating cryptographic systems. 91559
Systems Security Certified Practitioner: Regulatory Requirements Dan Lachance After watching this video; you will be able to identify regulatory requirements for cryptography. 91554
Systems Security Certified Practitioner: Remote Access Operation and Configuration Dan Lachance After watching this video; you will be able to describe best practices for remote access operation and configuration. 91571
Systems Security Certified Practitioner: Reporting and Feedback Loops Dan Lachance After watching this video; you will be able to identify lessons learned activities. 91535
Systems Security Certified Practitioner: Responding to Incidents Dan Lachance After watching this video; you will be able to identify best practices for handling incidents; supporting forensic investigations; and supporting business continuity activities. 91547
Systems Security Certified Practitioner: Restoration Planning Dan Lachance After watching this video; you will be able to identify best practices for restoration planning as part of business continuity activities. 91544
Systems Security Certified Practitioner: Risk Assessment Dan Lachance After watching this video; you will be able to identify risk assessment characteristics and options. 91520
Systems Security Certified Practitioner: Risk Management Concepts Dan Lachance After watching this video; you will be able to describe characteristics of risk management concepts. 91519
Systems Security Certified Practitioner: Risk Treatment Dan Lachance After watching this video; you will be able to describe options for risk treatment. 91521
Systems Security Certified Practitioner: Risk Visibility and Reporting Dan Lachance After watching this video; you will be able to describe characteristics of risk visibility and reporting activities. 91518
Systems Security Certified Practitioner: Role-based Access Control Dan Lachance After watching this video; you will be able to describe best practices when implementing role-based access control. 91485
Systems Security Certified Practitioner: Routers and Switches Dan Lachance After watching this video; you will be able to identify best practices for using routers and switches securely on networks. 91578
Systems Security Certified Practitioner: Secure Browsing Dan Lachance After watching this video; you will be able to identify secure browsing best practices for endpoint device security. 91594
Systems Security Certified Practitioner: Secure Device Management Dan Lachance After watching this video; you will be able to identify best practices for secure device management. 91575
Systems Security Certified Practitioner: Securing Networks and Communications Dan Lachance After watching this video; you will be able to identify best practices for securing networks; protecting telecommunications technologies; and implementing and operating secure wireless technologies. 91583
Systems Security Certified Practitioner: Securing Systems and Applications Dan Lachance After watching this video; you will be able to describe best practices for implementing and operating systems and applications security. 91609
Systems Security Certified Practitioner: Security Analytics; Metrics and Trends Dan Lachance After watching this video; you will be able to use security analytics metrics and trends for analyzing monitoring results. 91528
Systems Security Certified Practitioner: Security Impact Assessment Dan Lachance After watching this video; you will be able to identify activities in performing a security impact assessment. 91512
Systems Security Certified Practitioner: Segmentation Dan Lachance After watching this video; you will be able to use segmentation for managing LAN-based security. 91574
Systems Security Certified Practitioner: Service Models Dan Lachance After watching this video; you will be able to distinguish between cloud security service models. 91596
Systems Security Certified Practitioner: Shared Storage Dan Lachance After watching this video; you will be able to describe best practices for shared storage in virtual environments. 91608
Systems Security Certified Practitioner: Single Sign-on Dan Lachance After watching this video; you will be able to describe best practices for implementing single sign-on authentication. 91472
Systems Security Certified Practitioner: Single/Multifactor Authentication Dan Lachance After watching this video; you will be able to describe best practices for implementing single/multifactor authentication. 91471
Systems Security Certified Practitioner: Software Asset Management Dan Lachance After watching this video; you will be able to identify best practices for software asset management. 91506
Systems Security Certified Practitioner: Software-defined Networking Dan Lachance After watching this video; you will be able to describe best practices for secure software-defined networking in virtual environments. 91603
Systems Security Certified Practitioner: Source Systems Dan Lachance After watching this video; you will be able to describe characteristics and purpose of source systems used in continuous monitoring activities. 91527
Systems Security Certified Practitioner: Symmetric and Asymmetric Encryption Dan Lachance After watching this video; you will be able to distinguish between symmetric and asymmetric encryption application. 91550
Systems Security Certified Practitioner: System Architecture and Interoperability Dan Lachance After watching this video; you will be able to identify system architecture and interoperability of systems activities in change management processes. 91513
Systems Security Certified Practitioner: Technical Controls Dan Lachance After watching this video; you will be able to describe how to use technical controls to implement and assess compliance. 91508
Systems Security Certified Practitioner: Testing and Drills Dan Lachance After watching this video; you will be able to describe characteristics and best practices for testing and drills for supporting emergency response plans and procedures. 91546
Systems Security Certified Practitioner: Traffic-shaping Devices Dan Lachance After watching this video; you will be able to identify best practices for using traffic-shaping devices. 91579
Systems Security Certified Practitioner: Transitive Trust Dan Lachance After watching this video; you will be able to identify characteristics of transitive trust in internetwork trust architectures. 91476
Systems Security Certified Practitioner: Trusted Platform Module Dan Lachance After watching this video; you will be able to use trusted platform module for endpoint device security. 91592
Systems Security Certified Practitioner: Two-way Trust Relationships Dan Lachance After watching this video; you will be able to describe characteristics of two-way trust relationships in internetwork trust architectures. 91475
Systems Security Certified Practitioner: Understanding Accountability Dan Lachance After watching this video; you will be able to identify characteristics of the concept of accountability. 91493
Systems Security Certified Practitioner: Understanding Availability Dan Lachance After watching this video; you will be able to identify characteristics of the concept of availability. 91492
Systems Security Certified Practitioner: Understanding Confidentiality Dan Lachance After watching this video; you will be able to describe characteristics of the concept of confidentiality. 91490
Systems Security Certified Practitioner: Understanding Integrity Dan Lachance After watching this video; you will be able to identify characteristics of the concept of integrity. 91491
Systems Security Certified Practitioner: Understanding Least Privilege Dan Lachance After watching this video; you will be able to identify characteristics of the concept of least privilege. 91496
Systems Security Certified Practitioner: Understanding Privacy Dan Lachance After watching this video; you will be able to identify characteristics of the concept of privacy. 91494
Systems Security Certified Practitioner: Understanding Separation of Duties Dan Lachance After watching this video; you will be able to identify characteristics of the concept of separation of duties. 91497
Systems Security Certified Practitioner: Virtual Appliances Dan Lachance After watching this video; you will be able to describe characteristics of virtual appliances and their role in virtual environments. 91605
Systems Security Certified Practitioner: Virtual Environment Attacks and Countermeasures Dan Lachance After watching this video; you will be able to identify the most common attacks on virtual environments and countermeasures for mitigating risk and damage. 91607
Systems Security Certified Practitioner: Visualization Dan Lachance After watching this video; you will be able to use visualization to analyze monitoring results. 91529
Systems Security Certified Practitioner: Web of Trust Dan Lachance After watching this video; you will be able to describe characteristics of Web of Trust. 91561
Systems Security Certified Practitioner: Wireless Security Devices Dan Lachance After watching this video; you will be able to describe characteristics of wireless security devices. 91581
Systems Security Certified Practitioner: Wireless Technologies Attacks and Countermeasures Dan Lachance After watching this video; you will be able to identify common attacks methods and countermeasures for wireless technologies. 91582
Systems Security Certified Practitioner: Wireless Transmission Security Dan Lachance After watching this video; you will be able to identify best practices for secure wireless transmission. 91580
What's New in CISSP 2015: Exam Update Overview Dan Lachance After watching this video; you will be able to describe the high-level changes in ISC2 CISSP 2015 with respect to CISSP 2012. 84474
What's New in CISSP 2015: New Testing Domains Dan Lachance After watching this video; you will be able to list the testing domains in ISC2 CISSP 2015. 84476
What's New in CISSP 2015: New Testing Topics Dan Lachance After watching this video; you will be able to recognize the new testing topics for ISC2 CISSP 2015. 84477
What's New in CISSP 2015: Previous Testing Domains Dan Lachance After watching this video; you will be able to list the testing domains in ISC2 CISSP 2012. 84475
Software Development Security (154)
Title Speaker Summary ID
F# Fundamentals: Pipelining and Chaining in Functions Jason Row After watching this video; you will be able to implement pipelining and function chaining. 81739
Foundations of Android Security: Accessing Application Databases Wesley Miller After watching this video; you will be able to retrieve and access an Android application database. 82668
Foundations of Android Security: Analyzing Android Device Mount Points Wesley Miller After watching this video; you will be able to analyze Android File System mount points on a typical Android device; specifally root; /system; /cache; /data; /mnt/sdcard; and /mnt/secure/asec. 82661
Foundations of Android Security: Analyzing Application Traffic and Data Wesley Miller After watching this video; you will be able to perform a penetration test using any pen test tool of choice to intercept and analyze non-browser application traffic. 82671
Foundations of Android Security: Analyzing Network Traffic Using Wireshark Wesley Miller After watching this video; you will be able to analyze network traffic on an Android device using Wireshark. 82658
Foundations of Android Security: Creating a Signing Key and Certificate Wesley Miller After watching this video; you will be able to create an Android application signing key and certificate in Android Studio. 82637
Foundations of Android Security: Creating an Android Device Image Wesley Miller After watching this video; you will be able to create a system image for an Android device. 82667
Foundations of Android Security: Declaring Application Permissions Wesley Miller After watching this video; you will be able to add a permission declaration for an Android appliaction in its Manifest permissions file. 82642
Foundations of Android Security: Declaring Custom Permissions Wesley Miller After watching this video; you will be able to declare a custom permission in a Manifest permissions file. 82644
Foundations of Android Security: Enabling the ProGuard Tool in Android SDK Wesley Miller After watching this video; you will be able to enable the ProGuard code obfuscation tool in Android SDK. 82636
Foundations of Android Security: Enforcing Application Permissions Wesley Miller After watching this video; you will be able to locate and modify the Manifest permissions file on Android emulator to secure an Android application. 82670
Foundations of Android Security: Enforcing Permissions Wesley Miller After watching this video; you will be able to describe how permissions are enforced at the kernel level; native daemon level; and the framework level in Android OS. 82643
Foundations of Android Security: Examining Android Device Directory Structure Wesley Miller After watching this video; you will be able to examine Android device directory structure. 82663
Foundations of Android Security: Examining Android File Systems Wesley Miller After watching this video; you will be able to examine Android file systems; specifically YAFFS; YAFFS2; ext2; ext3; ext4; and vfat. 82662
Foundations of Android Security: Examining Network Activity with BusyBox Wesley Miller After watching this video; you will be able to carry out a penetration test on an Android device using BusyBox. 82657
Foundations of Android Security: Exploring Mobile Browser Vulnerabilities Wesley Miller After watching this video; you will be able to describe Android mobile browser vulnerabilities. 82648
Foundations of Android Security: Exploring the /data/data Directory Wesley Miller After watching this video; you will be able to explore the contents of the /data/data directory; especially shared_prefs and lib directories. 82665
Foundations of Android Security: General Steps for Carrying out a Penetration Test Wesley Miller After watching this video; you will be able to describe main steps for carrying out a generic penetration test on Android OS and devices. 82655
Foundations of Android Security: Getting Familiar with Activity Lifecycles Wesley Miller After watching this video; you will be able to define an activity and describe activity stack and callback methods used to implement activity lifecycles. 82627
Foundations of Android Security: Getting Familiar with Android Application Services Wesley Miller After watching this video; you will be able to describe how to start; bind; and create an application service; as well as how to declare a service in the Manifest.xml file. 82626
Foundations of Android Security: Getting Familiar with Code Signing Wesley Miller After watching this video; you will be able to describe the process of application code signing. 82631
Foundations of Android Security: Identifying Android Malware Wesley Miller After watching this video; you will be able to describe the methodology used for identifying malware on Android. 82646
Foundations of Android Security: Identifying Application-based Permissions Wesley Miller After watching this video; you will be able to identify application-based permissions; specifically Android Manifest Permissions. 82634
Foundations of Android Security: Identifying Common Application Security Risks Wesley Miller After watching this video; you will be able to identify common mobile device security issues. 82645
Foundations of Android Security: Installing Android Standalone SDK Tools Wesley Miller After watching this video; you will be able to download and install the Android stand-alone SDK tools package. 82623
Foundations of Android Security: Installing the Android Studio IDE Wesley Miller After watching this video; you will be able to download and install the Android Studio IDE. 82635
Foundations of Android Security: Intercepting Browser Application Traffic Wesley Miller After watching this video; you will be able to use Burp suite to intercept traffic for a browser application on a virtual Android device. 82659
Foundations of Android Security: Leveraging Linux Security Services to Protect Data Wesley Miller After watching this video; you will be able to use Linux security services to protect Android application data. 82639
Foundations of Android Security: Overview of Android Software Stack Layers Wesley Miller After watching this video; you will be able to describe Android software stack layers. 82629
Foundations of Android Security: Overview of Application User Protection Levels Wesley Miller After watching this video; you will be able to define the user protection levels that can be assigned in a Manifest permissions file. 82630
Foundations of Android Security: Overview of Storage Options for Application Data Wesley Miller After watching this video; you will be able to describe storage options for Android application data. 82664
Foundations of Android Security: Overview on Android Security Concerns in Enterprise Wesley Miller After watching this video; you will be able to describe Android security concerns that ought to be addressed in the enterprise environment. 82649
Foundations of Android Security: Overview on Penetration Testing Methodology Wesley Miller After watching this video; you will be able to describe Android device penetration testing methodology. 82654
Foundations of Android Security: Packaging an Android Application Wesley Miller After watching this video; you will be able to securely package an Android application. 82632
Foundations of Android Security: Penetration Testing Best Practices Wesley Miller After watching this video; you will be able to describe the Android app development best practices against which penetration tests should be carried out. 82660
Foundations of Android Security: Scanning a Network Using Nmap Wesley Miller After watching this video; you will be able to carry out a network scan using Nmap. 82656
Foundations of Android Security: Understanding the Android Environment Wesley Miller After watching this video; you will be able to describe the major components of the Android environment; specifically the Android SDK; Eclipse IDE and ADT tools (DDMS; adb). 82622
Foundations of Android Security: Understanding Android Application Framework Wesley Miller After watching this video; you will be able to describe the Android application framework layer services; specifically the resource manager; activity manager; location manager; notification manager; package manager; views; and content providers. 82628
Foundations of Android Security: Understanding Android Runtime Components Wesley Miller After watching this video; you will be able to describe Android runtime components; specifically the Dalvik VM and Core Libraries. 82625
Foundations of Android Security: Understanding Compliance and Audit Considerations Wesley Miller After watching this video; you will be able to describe compliance and audit considerations that must be taken into account when developing Android apps for enterprise. 82650
Foundations of Android Security: Understanding Permissions Assignment Wesley Miller After watching this video; you will be able to describe how permissions and process attributes are assigned in Android OS. 82640
Foundations of Android Security: Understanding the Linux Kernel Wesley Miller After watching this video; you will be able to describe how the Linux kernel provides security on the Android platform; including Linux permissions enforcement. 82624
Foundations of Android Security: Updating an Android Application Wesley Miller After watching this video; you will be able to securely update an Android application. 82633
Foundations of Android Security: Using Code Signing to Protect Application from Malware Wesley Miller After watching this video; you will be able to use code signing to protect Android application code from malware attacks. 82638
Foundations of Android Security: Using Recommended Security Practices for Mobiles Wesley Miller After watching this video; you will be able to describe recommended security practices for mobiles in the enterprise environment. 82653
Foundations of Android Security: Using Reverse Engineering to Reveal Threats Wesley Miller After watching this video; you will be able to describe the general methodology used to reverse engineer an Android application so as to reveal malicious threats. 82647
Foundations of Android Security: Using Untrusted Devices; Applications; and Networks Wesley Miller After watching this video; you will be able to describe considerations for using user-owned; untrusted devices as well as untrusted applications and networks. 82651
Foundations of Android Security: Working with Device Administration Policies Wesley Miller After watching this video; you will be able to extract various kinds of data from Android devices; specifically SMS messages; contact information; and application database information. 82669
Foundations of Android Security: Working with Root Access Wesley Miller After watching this video; you will be able to root an Android device so that it can be analyzed. 82666
Foundations of Android Security: Working with Shared User IDs Wesley Miller After watching this video; you will be able to describe how permissions are granted and managed for applications with shared user IDs. 82641
Foundations of Android Security: Working with Untrusted Systems and Content Wesley Miller After watching this video; you will be able to describe considerations for dealing with untrusted systems and content on an enterprise network. 82652
Foundations of iOS Security: Attacking User Passcodes Jamie Campbell After watching this video; you will be able to describe how user passcodes may be attacked. 83137
Foundations of iOS Security: Carrying Out a Fuzz Test Jamie Campbell After watching this video; you will be able to describe steps for carrying out a fuzz test. 83165
Foundations of iOS Security: Collecting and Verifying Signing Information Jamie Campbell After watching this video; you will be able to describe how application signing information can be collected and verified. 83149
Foundations of iOS Security: Creating a Configuration Profile Wesley Miller After watching this video; you will be able to use Apple Configurator to create a new configuration profile. 83159
Foundations of iOS Security: Displaying iOS Signing Info and Entitlements Wesley Miller After watching this video; you will be able to use the Xcode codesign tool to obtain information on an iOS application's signing certificate authority and its granted entitlements. 78946
Foundations of iOS Security: Enforcing Signatures on Processes Jamie Campbell After watching this video; you will be able to describe how signatures are enforced on application processes. 83150
Foundations of iOS Security: Enrolling Devices by Downloading Enrollment Profiles Wesley Miller After watching this video; you will be able to enroll a user device with the OS X Server mobile device management service by downloading and installing an enrollment profile. 83163
Foundations of iOS Security: Enrolling Devices using Profile Manager Web Portal Wesley Miller After watching this video; you will be able to enroll a user device with the OS X Server mobile device management service using the user's Profile Manager web portal. 83162
Foundations of iOS Security: Exploiting Bug Classes Jamie Campbell After watching this video; you will be able to describe how to exploit use-after-free and double-free bugs. 83167
Foundations of iOS Security: Fuzzing MobileSafari Wesley Miller After watching this video; you will be able to carry out a fuzzing test on MobileSafari. 83166
Foundations of iOS Security: Fuzzing Safari Wesley Miller After watching this video; you will be able to write and use a Bash shell script to crash test Safari on Mac OS X. 78947
Foundations of iOS Security: Getting Familiar with Application Signing Wesley Miller After watching this video; you will be able to use the Xcode codesign tool to show signing certificate authority information for an iOS application. 83147
Foundations of iOS Security: Getting Familiar with File Protection Classes Jamie Campbell After watching this video; you will be able to describe file protection classes. 83134
Foundations of iOS Security: Getting Familiar with Keybags Jamie Campbell After watching this video; you will be able to describe how file and keychain Data Protection classes are collected and managed in keybags. 83136
Foundations of iOS Security: Getting Familiar with Keychain Protection Classes Jamie Campbell After watching this video; you will be able to describe keychain item protection classes. 83135
Foundations of iOS Security: Getting Familiar with the Data Protection API Jamie Campbell After watching this video; you will be able to describe data protection API and class hierarchy. 83133
Foundations of iOS Security: Listing Application Entitlements Wesley Miller After watching this video; you will be able to use command line to list the entitlements for a signed application. 83148
Foundations of iOS Security: Overview of Apple Store Security Jamie Campbell After watching this video; you will be able to describe how Apple protects the Apple Store. 83128
Foundations of iOS Security: Overview of Code Signing in iOS Jamie Campbell After watching this video; you will be able to describe how code signing is used to enforce iOS security. 83144
Foundations of iOS Security: Overview of Fuzzing iOS Applications Jamie Campbell After watching this video; you will be able to describe the basic idea behind fuzzing and how it is used to reveal security issues in iOS applications. 83164
Foundations of iOS Security: Overview of iOS Sandbox Jamie Campbell After watching this video; you will be able to identify iOS Sandbox components and describe how they are related. 83153
Foundations of iOS Security: Overview of Return-Oriented Programming Jamie Campbell After watching this video; you will be able to describe background on ROP and basics in ARM architecture. 83170
Foundations of iOS Security: Overview on iOS Network Security Wesley Miller After watching this video; you will be able to identify components of network security supported by iOS 8. 83138
Foundations of iOS Security: Preventing Changes on Signed Pages Jamie Campbell After watching this video; you will be able to describe how to prevent signed code from being tampered with. 83151
Foundations of iOS Security: Protecting Processes and Code Segments Jamie Campbell After watching this video; you will be able to describe privilege separation; address space layout randomization; and sandboxing. 83132
Foundations of iOS Security: Setting Up the OS X Server Profile Manager Wesley Miller After watching this video; you will be able to configure and run the Profile Manager service. 83161
Foundations of iOS Security: Understanding Dynamic Code Signing Jamie Campbell After watching this video; you will be able to describe how to use just-in-time compiling to implement dynamic code signing. 83152
Foundations of iOS Security: Understanding How Sandboxing Impacts the App Store Jamie Campbell After watching this video; you will be able to describe how applications are launched under a sandbox and how applications are restricted to their own container directories in the App Store. 83156
Foundations of iOS Security: Understanding iOS Attack Surface Jamie Campbell After watching this video; you will be able to describe reduced attack surface and stripped-down iOS. 83130
Foundations of iOS Security: Understanding Possible Security Threats Jamie Campbell After watching this video; you will be able to define malware; exploitation; and compare Mac OS threats versus iOS threats. 83129
Foundations of iOS Security: Understanding Provisioning Jamie Campbell After watching this video; you will be able to describe the provisioning profile and how the provisioning file is validated. 83146
Foundations of iOS Security: Understanding Sandboxing and Runtime Security Wesley Miller After watching this video; you will be able to describe how runtime process security makes use of sandboxing to protect applications and their data on iOS 8 devices. 83154
Foundations of iOS Security: Understanding Sandboxing with Extensions Wesley Miller After watching this video; you will be able to describe how extensions are sandboxed to protect their files and memory space in iOS. 83155
Foundations of iOS Security: Understanding TCMalloc Jamie Campbell After watching this video; you will be able to describe TCMalloc allocator as well as large and small object allocation and deallocation. 83169
Foundations of iOS Security: Understanding the ARM Systems Call Convention Jamie Campbell After watching this video; you will be able to describe how system calls are invoked on ARM. 83171
Foundations of iOS Security: Understanding the iOS ARM Calling Convention Jamie Campbell After watching this video; you will be able to describe the ARM calling convention on iOS. 83172
Foundations of iOS Security: Understanding the iOS System Allocator Jamie Campbell After watching this video; you will be able to describe the concept of regions and how regions are allocated and deallocated. 83168
Foundations of iOS Security: Understanding the Mandatory Access Control Framework Jamie Campbell After watching this video; you will be able to describe how Mandatory Code Signing is controlled by the Mandatory Access Control Framework; including AMFI hooks. 83145
Foundations of iOS Security: Updating and Removing Configuration Profiles Wesley Miller After watching this video; you will be able to use the Apple Configurator to update and remove configuration profiles. 83160
Foundations of iOS Security: Using Code Signing and Data Execution Prevention Jamie Campbell After watching this video; you will be able to describe code signing; return-oriented programming (ROP); and data execution prevention. 83131
Foundations of iOS Security: Working with AirDrop Security Wesley Miller After watching this video; you will be able to describe iOS 8 support for AirDrop security. 83143
Foundations of iOS Security: Working with Bluetooth Connections Wesley Miller After watching this video; you will be able to describe Bluetooth connections and profiles supported by iOS 8. 83141
Foundations of iOS Security: Working with Mobile Configuration Profiles Jamie Campbell After watching this video; you will be able to identify the contents of a configuration profile and how to identify configuration profile payload types. 83157
Foundations of iOS Security: Working with Single Sign-on Authentication Wesley Miller After watching this video; you will be able to describe iOS 8 support for single sign-on authentication on enterprise networks. 83142
Foundations of iOS Security: Working with the Apple Configurator Jamie Campbell After watching this video; you will be able to describe the general functionality of the Apple Configurator. 83158
Foundations of iOS Security: Working with Virtual Private Networks Wesley Miller After watching this video; you will be able to describe the VPN protocols and authentication methods supported by iOS 8. 83139
Foundations of iOS Security: Working with Wi-Fi Networks Wesley Miller After watching this video; you will be able to describe Wi-Fi standards and authentication methods supported by iOS 8. 83140
Getting Started With Ubuntu: Adding and Modifying Groups Steve Scott After watching this video; you will be able to add and modify groups in Ubuntu using various command line tools. 85111
Getting Started With Ubuntu: Managing /etc/hosts for Web Development Steve Scott After watching this video; you will be able to modify the /etc/hosts file to point a domain to a local web server. 85134
OWASP Top 10: .NET Web Authentication Types Hilton Giesenow After watching this video; you will be able to identify the authentication types in web-hosted .NET projects and configure them in IIS and in configuration files. 81046
OWASP Top 10: A1 Injection - How It Works Hilton Giesenow After watching this video; you will be able to identify what the A1 exploit relies on to work. 81011
OWASP Top 10: A1 Injection In Action Hilton Giesenow After watching this video; you will be able to describe how the A1 exploit works in practice. 81010
OWASP Top 10: A10 Unvalidated Redirects and Forwards - How It Works Hilton Giesenow After watching this video; you will be able to identify what the A10 exploit relies on to work. 81029
OWASP Top 10: A10 Unvalidated Redirects and Forwards In Action Hilton Giesenow After watching this video; you will be able to describe how the A10 exploit works in practice. 81028
OWASP Top 10: A2 Broken Authentication/Session - How It Works Hilton Giesenow After watching this video; you will be able to identify what the A2 exploit relies on to work. 81013
OWASP Top 10: A2 Broken Authentication/Session Management In Action Hilton Giesenow After watching this video; you will be able to describe how the A2 exploit works in practice. 81012
OWASP Top 10: A3 Cross Site Scripting In Action Hilton Giesenow After watching this video; you will be able to describe how the A3 exploit works in practice. 81014
OWASP Top 10: A3 Cross Site Scripting In Action - How It Works Hilton Giesenow After watching this video; you will be able to identify what the A3 exploit relies on to work. 81015
OWASP Top 10: A4 Insecure Direct Object References - How It Works Hilton Giesenow After watching this video; you will be able to identify what the A4 exploit relies on to work. 81017
OWASP Top 10: A4 Insecure Direct Object References In Action Hilton Giesenow After watching this video; you will be able to describe how the A4 exploit works in practice. 81016
OWASP Top 10: A5 Security Misconfiguration - How It Works Hilton Giesenow After watching this video; you will be able to identify what the A5 exploit relies on to work. 81019
OWASP Top 10: A5 Security Misconfiguration In Action Hilton Giesenow After watching this video; you will be able to describe how the A5 exploit works in practice. 81018
OWASP Top 10: A6 Sensitive Data Exposure - How It Works Hilton Giesenow After watching this video; you will be able to identify what the A6 exploit relies on to work. 81021
OWASP Top 10: A6 Sensitive Data Exposure In Action Hilton Giesenow After watching this video; you will be able to describe how the A6 exploit works in practice. 81020
OWASP Top 10: A7 Missing Function Level Access Control - How It Works Hilton Giesenow After watching this video; you will be able to identify what the A7 exploit relies on to work. 81023
OWASP Top 10: A7 Missing Function Level Access Control In Action Hilton Giesenow After watching this video; you will be able to describe how the A7 exploit works in practice. 81022
OWASP Top 10: A8 Cross Site Request Forgery - How It Works Hilton Giesenow After watching this video; you will be able to identify what the A8 exploit relies on to work. 81025
OWASP Top 10: A8 Cross Site Request Forgery In Action Hilton Giesenow After watching this video; you will be able to describe how the A8 exploit works in practice. 81024
OWASP Top 10: A9 Using Components with Known Exploits - How It Works Hilton Giesenow After watching this video; you will be able to identify what the A9 exploit relies on to work. 81027
OWASP Top 10: A9 Using Components with Known Exploits In Action Hilton Giesenow After watching this video; you will be able to describe how the A9 exploit works in practice. 81026
OWASP Top 10: Appropriate Password Management Hilton Giesenow After watching this video; you will be able to list appropriate approaches to capturing; storing; validating; and resetting user passwords. 81056
OWASP Top 10: ASP.NET & ASP.NET MVC Validation Hilton Giesenow After watching this video; you will be able to recognize how the built-in validation capabilities in ASP.NET and ASP.NET MVC protect against attacks. 81052
OWASP Top 10: Asymmetric Encryption in .NET Hilton Giesenow After watching this video; you will be able to describe PATH variables in the Windows operating system and how they can be exploited. 81034
OWASP Top 10: Authenticating with External Logins in ASP.NET MVC Hilton Giesenow After watching this video; you will be able to allow your users to authenticate against external login providers like Microsoft; Twitter; Facebook and Google. 87533
OWASP Top 10: Authentication versus Authorization Hilton Giesenow After watching this video; you will be able to compare authentication and authorization. 81030
OWASP Top 10: Authorization in ASP.NET MVC Controllers Hilton Giesenow After watching this video; you will be able to implement authorization in ASP.NET MVC. 81059
OWASP Top 10: Authorization in WCF Hilton Giesenow After watching this video; you will be able to recognize where and how to implement authorization in WCF. 81045
OWASP Top 10: Authorization in Web API Hilton Giesenow After watching this video; you will be able to recognize where and how to implement authorization in ASP.NET Web API. 81044
OWASP Top 10: Command Injection Mitigation Hilton Giesenow After watching this video; you will be able to describe how to mitigate against command injection at the base .NET Framework level. 81037
OWASP Top 10: Config File Encryption Hilton Giesenow After watching this video; you will be able to recognize how to encrypt relevant sections of the .NET configuration files. 81033
OWASP Top 10: Content Spoofing Mitigation Hilton Giesenow After watching this video; you will be able to describe JavaScript behaviors that can lead to security breaches and how to mitigate against them. 81050
OWASP Top 10: CORS Preflight Scrutiny Hilton Giesenow After watching this video; you will be able to describe CORS Preflight requests and how to secure them in ASP.Net Web API. 81043
OWASP Top 10: Defense in Depth Hilton Giesenow After watching this video; you will be able to define the Defense in Depth principle. 81031
OWASP Top 10: Error Message Security Hilton Giesenow After watching this video; you will be able to recognize how error message handling can be exploited and how to deal with this. 81032
OWASP Top 10: HttpOnly Cookie Flag Hilton Giesenow After watching this video; you will be able to describe the HttpOnly Cookie Flag and how to apply it in ASP.NET and ASP.NET MVC. 81057
OWASP Top 10: Identify Top 10 Threats Hilton Giesenow After watching this video; you will be able to identify the OWASP Top 10 exploits in a real-world scenario. 83969
OWASP Top 10: Insecure Direct Object Reference Mitigation Hilton Giesenow After watching this video; you will be able to identify mitigations to Insecure Direct Object Reference at the database level. 81040
OWASP Top 10: Insecure Web.config Setting Mitigation Hilton Giesenow After watching this video; you will be able to recognize the impacts of various web.config file settings. 81047
OWASP Top 10: Introduction to the OWASP Project Hilton Giesenow After watching this video; you will be able to describe the history of the OWASP Project. 81008
OWASP Top 10: Introduction to the OWASP Top 10 Hilton Giesenow After watching this video; you will be able to understand the OWASP Top 10 list and recognize its patterns in your own applications. 81009
OWASP Top 10: Microsoft Anti-cross Site Scripting Library Hilton Giesenow After watching this video; you will be able to use the Microsoft Anti-cross Site Scripting Library. 81058
OWASP Top 10: Mitigate Security Hilton Giesenow After watching this video; you will be able to identify mitigations for OWASP Top 10 violations in a given scenario. 83970
OWASP Top 10: Multi-factor Authentication Hilton Giesenow After watching this video; you will be able to describe Multi-Factor Authentication and how it can be implemented in ASP.NET MVC. 81055
OWASP Top 10: NuGet Packages Security Hilton Giesenow After watching this video; you will be able to recognize how to handle security when using NuGet packages. 81035
OWASP Top 10: Output Encoding Hilton Giesenow After watching this video; you will be able to describe how to appropriately encode output into a page to avoid script injection; XSS; and other exploits. 81051
OWASP Top 10: Password Hashing Hilton Giesenow After watching this video; you will be able to describe password hashing and its application. 81041
OWASP Top 10: Password Policies Hilton Giesenow After watching this video; you will be able to implement password policies in ASP.NET and ASP.NET MVC. 81054
OWASP Top 10: Releasing Resources to Avoid Pool Exhaustion Hilton Giesenow After watching this video; you will be able to describe how inadequately releasing types can lead to denial of service. 81042
OWASP Top 10: Session State in ASP.NET MVC Hilton Giesenow After watching this video; you will be able to describe how session state works in ASP.NET and ASP.NET MVC. 81053
OWASP Top 10: SSL and Transport Security Hilton Giesenow After watching this video; you will be able to describe SSL/HTTPS security. 81048
OWASP Top 10: Symmetric Encryption in .NET Hilton Giesenow After watching this video; you will be able to describe when and how to use encryption in .NET. 81036
OWASP Top 10: Trusted versus SQL Authentication Hilton Giesenow After watching this video; you will be able to identify the SQL Server authentication models. 81039
OWASP Top 10: Web Parameter Tampering Mitigation Hilton Giesenow After watching this video; you will be able to describe how to mitigate web parameter tampering in ASP.NET MVC and JavaScript. 81049