IT and Desktop Videos

Download a course collection

Security

Expand all | Collapse all

Access Control (74)
Title Speaker Summary ID
Securing User Accounts: Security Attack Motives Aaron Sampson

After watching this video; you will be able to describe goals and motives for user account security attacks.

84353
Securing User Accounts: Security Attack Phases Aaron Sampson

After watching this video; you will be able to distinguish between the different phases of a security attack.

84354
Securing User Accounts: Session Expiry Aaron Sampson

After watching this video; you will be able to identify best practices and purpose of session expiry .

84406
Securing User Accounts: Setting Account Expiry Dates Aaron Sampson

After watching this video; you will be able to identify best practices for setting account expiry dates.

84369
Securing User Accounts: Setting Machine Restrictions Aaron Sampson

After watching this video; you will be able to identify best practices for setting machine restrictions on user accounts.

84372
Securing User Accounts: Setting Time Restrictions Aaron Sampson

After watching this video; you will be able to identify best practices for setting time restrictions on user accounts.

84371
Securing User Accounts: Ticket-based Hybrid Authentication Aaron Sampson

After watching this video; you will be able to identify characteristics of ticket-based hybrid authentication credentials.

84384
Securing User Accounts: Timed Password Reset Aaron Sampson

After watching this video; you will be able to identify best practices for implementing timed password resets.

84412
Securing User Accounts: User Authentication Components Aaron Sampson

After watching this video; you will be able to distinguish between the three user authentication components and how they interrelate.

84375
Securing User Accounts: User Logon Process Aaron Sampson

After watching this video; you will be able to identify the phases of the user logon process.

84378
Securing User Accounts: Username Best Practices Aaron Sampson

After watching this video; you will be able to describe best practices for secure usernames and user identifiers.

84386
Securing User Accounts: Username Enumeration Aaron Sampson

After watching this video; you will be able to identify characteristics of username enumeration.

84355
Securing User Accounts: Using Captcha Aaron Sampson

After watching this video; you will be able to identify best practices and purpose of using CAPTCHA for user account registration and setup.

84388
Securing User Accounts: Using Ssl For Logon Security Aaron Sampson

After watching this video; you will be able to use SSL to enhance logon security.

84401
Securing User Accounts: Vulnerability Scanning Aaron Sampson

After watching this video; you will be able to identify best practices for performing vulnerability scanning to prevent user account compromise.

84358
Securing User Accounts: Web Server Password Cracking Aaron Sampson

After watching this video; you will be able to distinguish between the different types of web server password cracking techniques.

84357
Securing User Accounts: Password Complexity Requirements Aaron Sampson

After watching this video; you will be able to identify password length; width; and depth requirements that can enhance password security.

84392
Securing User Accounts: Password Credentials Aaron Sampson

After watching this video; you will be able to identify characteristics of password credentials.

84380
Securing User Accounts: Password Field Security Aaron Sampson

After watching this video; you will be able to identify best practices for password field security.

84393
Securing User Accounts: Password Hashing Best Practices Aaron Sampson

After watching this video; you will be able to identify best practices for hashing passwords for storage.

84410
Securing User Accounts: Password Hints Aaron Sampson

After watching this video; you will be able to identify benefits and challenges of using password hints and best practices.

84414
Securing User Accounts: Password Storage Best Practices Aaron Sampson

After watching this video; you will be able to describe best practices for password storage policies.

84409
Securing User Accounts: Password Strength Criteria Aaron Sampson

After watching this video; you will be able to describe best practice for setting minimum password strength criteria policies.

84391
Securing User Accounts: Password Strength Feedback Aaron Sampson

After watching this video; you will be able to describe techniques for providing feedback to users on password strength.

84394
Securing User Accounts: Password Verification For Changes Aaron Sampson

After watching this video; you will be able to describe best practices for using password verification during account change activities.

84417
Securing User Accounts: Patches And Updates Aaron Sampson

After watching this video; you will be able to identify best practices for patching and updating to prevent user account compromise.

84359
Securing User Accounts: Permissions Categories Aaron Sampson

After watching this video; you will be able to distinguish between the different access permissions categories available to assign to account users.

84366
Securing User Accounts: Preventing Username Enumeration Aaron Sampson

After watching this video; you will be able to describe best practices for preventing username enumeration as part of user account registration security.

84390
Securing User Accounts: Principle Of Least Privilege Aaron Sampson

After watching this video; you will be able to describe best practices for applying the security principle of least privilege in secure user account management.

84363
Securing User Accounts: Privilege Management Aaron Sampson

After watching this video; you will be able to distinguish between users; groups; and role structures for privileges.

84365
Securing User Accounts: Protecting Against Password Hacking Aaron Sampson

After watching this video; you will be able to identify best practices for preventing password hack attempts.

84397
Securing User Accounts: Registration Basics Aaron Sampson

After watching this video; you will be able to describe characteristics and purpose of secure user account registration policies and practices.

84385
Securing User Accounts: Remote Logoff Aaron Sampson

After watching this video; you will be able to identify characteristics and best practices for remote logoff procedures.

84407
Securing User Accounts: Securing Account Access And Mitigating Risk Aaron Sampson

After watching this video; you will be able to identify appropriate logon; logoff and account change policies; and describe best practices for responding to account compromise.

84423
Securing User Accounts: Securing Logoff Against Csrf Aaron Sampson

After watching this video; you will be able to describe purpose and techniques for implementing CSRF protection on the logoff feature.

84408
Securing User Accounts: Securing User Account Registration Aaron Sampson

After watching this video; you will be able to identify appropriate user account registration and password best practices.

84398
Securing User Accounts: Development Best Practices Aaron Sampson

After watching this video; you will be able to identify best practices during development to secure site logon.

84400
Securing User Accounts: Disabling Unused Accounts Aaron Sampson

After watching this video; you will be able to identify best practices for disabling unused user accounts.

84370
Securing User Accounts: Enabling Two-step Verification Aaron Sampson

After watching this video; you will be able to describe purpose and best practices for implementing two-step verification in user account registration policies.

84389
Securing User Accounts: Enforcing Password History Policies Aaron Sampson

After watching this video; you will be able to describe benefits and best practices for enforcing password history policies.

84395
Securing User Accounts: Event Logging Aaron Sampson

After watching this video; you will be able to identify best practices for event logging as a method for identifying and preventing account security breaches.

84362
Securing User Accounts: Implementing Account Change Notifications Aaron Sampson

After watching this video; you will be able to identify best practices for implementing user account change notifications.

84418
Securing User Accounts: Implementing Verification Questions Aaron Sampson

After watching this video; you will be able to describe best practices for strengthening password reset with verification questions.

84413
Securing User Accounts: Importance Of User Account Security Aaron Sampson

After watching this video; you will be able to identify the purpose and requirement for secure user account controls.

84349
Securing User Accounts: Integrity Aaron Sampson

After watching this video; you will be able to describe characteristics of the fundamental security concept of integrity as it relates to securing user accounts.

84351
Securing User Accounts: Limiting Logon Attempts Aaron Sampson

After watching this video; you will be able to identify characteristics and best practices for limiting logon attempts as a restriction for user accounts.

84368
Securing User Accounts: Logon Fraud Detection And Prevention Aaron Sampson

After watching this video; you will be able to describe best practices for detecting and preventing logon fraud.

84404
Securing User Accounts: Managing Simultaneous Sessions Aaron Sampson

After watching this video; you will be able to identify best practices for managing multiple simultaneous sessions from the same user.

84402
Securing User Accounts: Naming Conventions Aaron Sampson

After watching this video; you will be able to identify characteristics and best practices of implementing appropriate naming convention restrictions for user accounts.

84367
Securing User Accounts: Network Protocols Aaron Sampson

After watching this video; you will be able to identify best-practice network protocols to protect against general security attacks.

84360
Securing User Accounts: Neutralizing Attacks Aaron Sampson

After watching this video; you will be able to describe best practices for neutralizing user account security attacks.

84422
Securing User Accounts: Overview Of Password Reset Aaron Sampson

After watching this video; you will be able to identify characteristics and purpose of password reset.

84411
Securing User Accounts: Overview Of The Logoff Feature Aaron Sampson

After watching this video; you will be able to identify purpose and characteristics of implementing logoff requirements.

84405
Securing User Accounts: Overview Of The Logon Feature Aaron Sampson

After watching this video; you will be able to describe the characteristics and purpose of the logon feature.

84399
Securing User Accounts: Password Age Policies Aaron Sampson

After watching this video; you will be able to describe benefits and best practices for setting minimum and maximum password age requirements.

84396
Securing User Accounts: Determining Appropriate User Account Policies Aaron Sampson

After watching this video; you will be able to identify appropriate user account security policies and practices.

84373
Securing User Accounts: Dealing With Compromised Systems Aaron Sampson

After watching this video; you will be able to identify best practices for dealing with compromised systems after a successful security attack.

84420
Securing User Accounts: Defense In Depth Aaron Sampson

After watching this video; you will be able to describe best practices for applying defense in depth in secure user account management.

84364
Securing User Accounts: Account Change Risks Aaron Sampson

After watching this video; you will be able to describe characteristics of account detail changes and how and why they carry risk of attack.

84415
Securing User Accounts: Account Protocols Aaron Sampson

After watching this video; you will be able to identify best-practice account protocols to protect against user account security attacks.

84361
Securing User Accounts: Account Verification Aaron Sampson

After watching this video; you will be able to identify best practices for account registration verification.

84387
Securing User Accounts: Asymmetric Key Credentials Aaron Sampson

After watching this video; you will be able to identify characteristics of asymmetric key credentials for authentication.

84381
Securing User Accounts: At-risk Account Attributes Aaron Sampson

After watching this video; you will be able to identify the specific account attributes that hackers target.

84416
Securing User Accounts: Authentication And Identification Aaron Sampson

After watching this video; you will be able to describe characteristics of the authentication and identification process and the relationship between them.

84374
Securing User Accounts: Authentication Credentials Overview Aaron Sampson

After watching this video; you will be able to identify characteristics and purpose of credentials.

84379
Securing User Accounts: Authentication Types Aaron Sampson

After watching this video; you will be able to distinguish between the different types of authentication.

84376
Securing User Accounts: Authenticity Aaron Sampson

After watching this video; you will be able to describe characteristics of the fundamental security concept of authenticity as it relates to securing user accounts.

84350
Securing User Accounts: Authorization Aaron Sampson

After watching this video; you will be able to describe characteristics of authorization.

84377
Securing User Accounts: Biometric Credentials Aaron Sampson

After watching this video; you will be able to identify characteristics of biometric credentials.

84383
Securing User Accounts: Collecting Attack Evidence Aaron Sampson

After watching this video; you will be able to identify best practices when collecting evidence and information after a successful attack .

84421
Securing User Accounts: Common Logon Attacks Aaron Sampson

After watching this video; you will be able to distinguish between the different common types of attacks on logon pages.

84403
Securing User Accounts: Confidentiality Aaron Sampson

After watching this video; you will be able to describe characteristics of the fundamental security concept of confidentiality as it relates to securing user accounts.

84352
Securing User Accounts: Confirming Account Changes Aaron Sampson

After watching this video; you will be able to identify best practices for confirming user account changes with users.

84419
Securing User Accounts: Csrf Aaron Sampson

After watching this video; you will be able to identify characteristics of Cross-Site Request Forgery (CSRF).

84356
Cryptography (50)
Title Speaker Summary ID
Cryptography Fundamentals: Using Sha2 Dan Lachance

After watching this video; you will be able to apply and describe the operation of the SHA2 hashing algorithms.

84008
Cryptography Fundamentals: Using Symmetric Algorithms Dan Lachance

After watching this video; you will be able to describe and identify the features and use cases for symmetric-key cipher algorithms .

83983
Cryptography Fundamentals: Using The Aes Block Algorithm Dan Lachance

After watching this video; you will be able to use a simple AES implementation to encrypt and decrypt data and compare the results to the NIST standard to confirm operation of the algorithm.

84001
Cryptography Fundamentals: Working With Asymmetric Algorithms Dan Lachance

After watching this video; you will be able to describe and identify the features and use cases for asymmetric-key cipher algorithms.

83984
Cryptography Fundamentals: Working With Disk Encryption Dan Lachance

After watching this video; you will be able to describe how disk encryption works and the threats it can help protect against.

84016
Cryptography Fundamentals: Working With The Secure Shell (ssh) Dan Lachance

After watching this video; you will be able to describe of use of SSL and TLS in security tools like the Secure Shell; or SSH.

84014
Cryptography Fundamentals: Formatting The Output Dan Lachance

After watching this video; you will be able to describe how to encode encrypted data for easier storage or transport.

83990
Cryptography Fundamentals: Hiding Data Using Steganography Dan Lachance

After watching this video; you will be able to describe the use of stenography in encryption products to hide the fact data is even encrypted.

83985
Cryptography Fundamentals: Identify The Cryptographic Algorithm To Use Dan Lachance

After watching this video; you will be able to identify the cryptographic algorithm to use.

83994
Cryptography Fundamentals: Identifying Algorithm And Key Strengths Dan Lachance

After watching this video; you will be able to identify the features and strengths of cryptographic algorithms and how to select an algorithm for a particular usage scenario.

84017
Cryptography Fundamentals: Identifying And Using Entropy Dan Lachance

After watching this video; you will be able to describe how entropy is used in generating random numbers and how that entropy is critical to the strength of a cryptographic key.

83992
Cryptography Fundamentals: Identifying Historical Use Of Cryptography Dan Lachance

After watching this video; you will be able to recognize historical uses of cryptography and their relevance to cryptography today.

83972
Cryptography Fundamentals: Identifying Secure Communications Over Https Dan Lachance

After watching this video; you will be able to identify web browser-based secure communications and the role of certificates and certificate authorities (CAs).

84013
Cryptography Fundamentals: Identifying The Current State Of Cryptography Dan Lachance

After watching this video; you will be able to identify the different types of cryptography and how cryptographic algorithms can be verified and validated.

83975
Cryptography Fundamentals: Introducing Cryptography Dan Lachance

After watching this video; you will be able to describe and identify the reasons for having and using cryptography.

83971
Cryptography Fundamentals: Recognizing The Need For Data Integrity Dan Lachance

After watching this video; you will be able to describe why data integrity is an integral part of cryptography.

83978
Cryptography Fundamentals: Using A One-time Pad Dan Lachance

After watching this video; you will be able to describe how OPT; or one-time pad; cryptography can theoretically provide perfect secrecy but has some significant limitations.

83981
Cryptography Fundamentals: Using Cipher Block Chaining (cbc) Dan Lachance

After watching this video; you will be able to specify how Cipher Block Chaining uses an IV; or initialization vector; to make data appear random.

83996
Cryptography Fundamentals: Using Cipher Feedback (cfb) Dan Lachance

After watching this video; you will be able to describe the Cipher Feedback mode and how it builds on CBC and makes a block cipher into a stream cipher.

83998
Cryptography Fundamentals: Using Gpg With E-mail Dan Lachance

After watching this video; you will be able to use GPG to encrypt and decrypt an e-mail message.

84015
Cryptography Fundamentals: Using Nonces And The Initialization Vector Dan Lachance

After watching this video; you will be able to describe the purpose of an initialization vector for a cipher algorithm and how nonces can be used to protect small datasets.

83991
Cryptography Fundamentals: Using One-way Hashes Dan Lachance

After watching this video; you will be able to describe the purpose of cryptographic hash functions and how they can be used in cryptography to provide data integrity.

83986
Cryptography Fundamentals: Using Output Feedback (ofb) Dan Lachance

After watching this video; you will be able to describe the Output Feedback mode and how it can use the same process for encryption and decryption.

83999
Cryptography Fundamentals: Using Padding Dan Lachance

After watching this video; you will be able to describe and perform padding operations to data for block ciphers.

83989
Cryptography Fundamentals: Using Propagating Cipher Block Chaining (pcbc) Dan Lachance

After watching this video; you will be able to describe how Propagating Cipher Block Chaining mode improved on CBC by causing small changes to each block encrypted.

83997
Cryptography Fundamentals: Distinguishing Between Block And Key Sizes Dan Lachance

After watching this video; you will be able to recognize the difference between blocks and key sizes as they apply to cipher algorithms.

83988
Cryptography Fundamentals: Defining The Rsa Algorithm Dan Lachance

After watching this video; you will be able to describe the RSA public key encryption and its operation.

84006
Cryptography Fundamentals: Defining Why Cryptography Is Difficult Dan Lachance

After watching this video; you will be able to describe why cryptography is difficult to get right and how poor cryptography can give you a false sense of security.

83974
Cryptography Fundamentals: Describing Counter (ctr) Dan Lachance

After watching this video; you will be able to describe the Counter mode and how It can be used for parallelizing encryption and decryption.

84000
Cryptography Fundamentals: Describing Cryptanalysis Dan Lachance

After watching this video; you will be able to perform some basic cryptanalysis and describe methods to decrypt poorly encrypted data.

84018
Cryptography Fundamentals: Describing Cryptographic Terminology Dan Lachance

After watching this video; you will be able to use and identify basic cryptographic terminology.

83973
Cryptography Fundamentals: Describing Digital Signatures Dan Lachance

After watching this video; you will be able to describe a digital signature and how it can be used for authentication and nonrepudiation.

83987
Cryptography Fundamentals: Describing Electronic Codebook (ecb) Dan Lachance

After watching this video; you will be able to describe and identify data that has been encrypted using the ECB mode.

83995
Cryptography Fundamentals: Describing Export Controls And Limits On Cryptography Dan Lachance

After watching this video; you will be able to describe basic export controls and limits that can be imposed on cryptography used around the world .

83976
Cryptography Fundamentals: Describing Hmac Dan Lachance

After watching this video; you will be able to describe the Hash Message Authentication Code; or HMAC; and its use to authenticate and verify the integrity of a message.

84009
Cryptography Fundamentals: Describing How Cryptography Provides Confidentiality Dan Lachance

After watching this video; you will be able to describe how cryptography can keep data confidential within limits.

83977
Cryptography Fundamentals: Describing Key Escrow Dan Lachance

After watching this video; you will be able to identify the role and purpose of key escrow policies and procedures.

84012
Cryptography Fundamentals: Describing Key Exchange Dan Lachance

After watching this video; you will be able to describe how to cryptographically exchange keys securely.

84011
Cryptography Fundamentals: Describing Key Management Dan Lachance

After watching this video; you will be able to identify and describe basic key management policies and procedures.

84010
Cryptography Fundamentals: Describing Md5; Sha1; And Sha3 Dan Lachance

After watching this video; you will be able to describe the deprecated MD5 and SHA1 algorithms and the newly chosen replacement; SHA3.

84007
Cryptography Fundamentals: Describing Side-channel Attacks Dan Lachance

After watching this video; you will be able to identify external methods that can be used to compromise; or bypass; a cryptographic system.

84019
Cryptography Fundamentals: Describing Substitution Ciphers Dan Lachance

After watching this video; you will be able to describe and use a substitution cipher and understand the weaknesses that can be exploited by an attacker against these ciphers.

83982
Cryptography Fundamentals: Describing The Blowfish Block Algorithm Dan Lachance

After watching this video; you will be able to describe the Blowfish block cipher algorithm and its properties.

84003
Cryptography Fundamentals: Describing The Elgamal Algorithm Dan Lachance

After watching this video; you will be able to describe the ElGamal cipher algorithm and its usage .

84005
Cryptography Fundamentals: Describing The Rc4 Streaming Algorithm Dan Lachance

After watching this video; you will be able to describe the RC4 streaming cipher and its properties.

84004
Cryptography Fundamentals: Defining Cryptography Authentication Dan Lachance

After watching this video; you will be able to define how cryptography can provide a means to authenticate an entity.

83979
Cryptography Fundamentals: Apply Cryptographic Modes And Algorithms Dan Lachance

After watching this video; you will be able to apply cryptographic modes and algorithms.

84020
Cryptography Fundamentals: Applying Non-repudiation To Cryptography Dan Lachance

After watching this video; you will be able to describe how cryptography can be used to prove; with high certainty; that an action or statement is associated with an entity.

83980
Cryptography Fundamentals: Applying The Des/3des Block Algorithm Dan Lachance

After watching this video; you will be able to describe how the DES and 3DES algorithms work to encrypt and decrypt data.

84002
Cryptography Fundamentals: Creating Or Generating Keys Dan Lachance

After watching this video; you will be able to describe the creating; or generating; of keys and how the key strength is critical to cryptographic ciphers.

83993
Network Security (134)
Title Speaker Summary ID
Securing Mobile Devices In The Enterprise: Unintended Data Leakage Dan Lachance

After watching this video; you will be able to describe how unintended data leakage affects mobile device front-end and back-end systems.

97463
Securing Mobile Devices In The Enterprise: Unmanaged Company-owned Devices Dan Lachance

After watching this video; you will be able to describe mitigation strategies for unmanaged company-owned devices.

97725
Securing Mobile Devices In The Enterprise: Unmanaged Device User Policies Dan Lachance

After watching this video; you will be able to describe appropriate user policies for risk mitigation with unmanaged devices.

97726
Securing Mobile Devices In The Enterprise: Unmanaged Devices In A Small Organization Dan Lachance

After watching this video; you will be able to describe mitigation strategies for unmanaged devices in a small organization.

97724
Securing Mobile Devices In The Enterprise: Virtual Private Networking Overview Dan Lachance

After watching this video; you will be able to describe virtual private networks for securing network connections.

97736
Securing Mobile Devices In The Enterprise: Weak Server-side Controls Dan Lachance

After watching this video; you will be able to list the OWASP top ten mobile risks; and describe how weak server-side controls affect mobile device back-end systems.

97460
Security Essentials: Advanced Security With Scm And Windows Baselines Byron Hynes

In Windows 7; the Security Compliance Manager includes the Security Baseline feature; which contains Microsoft’s recommendations for various security settings; and actual baseline settings that can be applied across a domain. In this video; Byron Hynes uses the Security Baseline feature to review how a computer’s security settings should be configured according to the recommendation.

48452
Security Essentials: Avoid Social Engineering Attacks Byron Hynes

Social engineering attacks; such as phishing or e-mail fraud; aim to get your personal information. The United States Computer Emergency Readiness Team (US-CERT) warns against giving sensitive information to anyone unless you’re sure they are who they claim to be. In this video; Byron Hynes provides some key tips to prevent computer crime from happening to you.

48447
Security Essentials: Company Wide Security With Gpos Byron Hynes

In Windows; you can use Group Policy Objects; or GPOs; to centrally apply and manage security settings; such as firewalls and software restrictions; on some or all of the computers in a network. In this video; Byron Hynes creates a group policy to turn on Windows Firewall when a computer connects to a public network.

48450
Security Essentials: Control Access To Files With Permissions Byron Hynes

In Windows; you can use permissions to control who has access to shared information. You can set share permissions on the actual share and NTFS permissions on the files stored in the NTFS file system. In this video; Byron Hynes uses share permissions to share a folder across the network and sets NTFS permissions on the folder.

48453
Security Essentials: Encrypt Your Usb Sticks And Portable Media Byron Hynes

You can encrypt your hard drives; portable media; memory cards; and USB sticks to prevent phishing and information theft. Encryption tools include BitLocker; a built-in Windows product; and TrueCrypt; which is a free download. In the video; Byron Hynes demonstrates how to access BitLocker and use TrueCrypt to create a virtual drive in which any data stored will be encrypted.

48443
Security Essentials: Encrypting Your Wireless Networks Byron Hynes

It’s important to protect confidential information transmitted across a wireless network from being accessed by others. You can use various methods of network encryption; such as WEP or WPA2; to secure a wireless private network. In this video; Byron Hynes creates an ad hoc wireless network and uses WPA2-Personal encryption to secure it.

48448
Security Essentials: Enhance Your Privacy On Social Networks Byron Hynes

Most social networks; such as Twitter; LinkedIn; Yammer; Foursquare; and Facebook; offer varying levels of privacy that enable you to control your online privacy and reputation. In this video; Byron Hynes uses the Privacy Settings tab on Facebook to customize the privacy levels for his profile and the ads; apps; and web sites that run on his profile.

48451
Security Essentials: General Concepts Byron Hynes

There are a number of ways you can protect your computer from security threats. In this video; Byron Hynes discusses the steps you can take to safeguard data.

48441
Security Essentials: Improve Security By Running As A Non-admin Byron Hynes

Windows provides several ways to improve system security; such as the User Account Control feature or performing your day-to-day operations as a nonadministrator; depending on your version of Windows. In this video; Byron Hynes uses the User Account Control feature and creates a new user that’s not a member of the Administrators group to improve the security on a system.

48449
Security Essentials: Recognizing E-mail Scams Byron Hynes

E-mail scams; sometimes called phishing or fraud; exist to get your money or personal information. The United States Computer Emergency Readiness Team (US-CERT) provides key steps to avoid e-mail fraud; such as filtering spam and using antivirus software and a firewall. In this video; Byron Hynes discusses some specific things that you can do to recognize a fraudulent e-mail.

48445
Security Essentials: Transfer Files Securely Byron Hynes

It’s important to ensure confidential files are transferred securely via e-mail. You can use a third-party service to encrypt files; or encrypt files yourself using tools such as 7-Zip or WinRar. In this video; Byron Hynes uses WinRar to encrypt a compressed file; assign a password; and encrypt the filenames to ensure they stay protected in transit.

48454
Security Essentials: Use Automatic Updates Byron Hynes

Automatic Updates keep your system up to date and resilient against the most common and newest threats. Most major vendors; such as Microsoft; Apple; and Google; have a secure automatic updating function built into their software. In this video; Byron Hynes demonstrates how to configure the Windows Update feature.

48446
Security Essentials: Use Microsoft Security Essentials Byron Hynes

You should use antimalware or antivirus software to protect your computer against cyber attacks. Microsoft Security Essentials is a free antivirus program for standalone systems or small organizations using Windows. In the video; Byron Hynes uses Security Essentials to protect his computer against virus attacks.

48444
Security Essentials: Using Good Passwords And Managing Them Byron Hynes

It’s important to use good passwords for digital commerce and to protect your identity and confidential information. Good password practices include using passphrases or randomly generated strong passwords; using different passwords for different systems; and storing passwords safely. In the video; Byron Hynes uses good password practices to create strong passwords and store them in a password vault.

48442
Securing Mobile Devices In The Enterprise: Reverse Proxy Features Dan Lachance

After watching this video; you will be able to describe the use of a reverse proxy in protecting mobile app back-end services.

97715
Securing Mobile Devices In The Enterprise: Rights Management Systems Dan Lachance

After watching this video; you will be able to describe the use of rights management systems to secure document content.

97718
Securing Mobile Devices In The Enterprise: Secure App Deployment Dan Lachance

After watching this video; you will be able to describe requirements for securing mobile app deployment.

97711
Securing Mobile Devices In The Enterprise: Secure Cloud Storage Dan Lachance

After watching this video; you will be able to describe requirements for secure cloud storage.

97730
Securing Mobile Devices In The Enterprise: Secure Device Connectivity And App Requirements Dan Lachance

After watching this video; you will be able to describe requirements for secure device connectivity and apps.

97475
Securing Mobile Devices In The Enterprise: Secure Device Data-handling Requirements Dan Lachance

After watching this video; you will be able to describe requirements for secure device data handling.

97472
Securing Mobile Devices In The Enterprise: Secure Device User Requirements Dan Lachance

After watching this video; you will be able to describe requirements for users of secure devices.

97476
Securing Mobile Devices In The Enterprise: Securing Directory Services And Ca Dan Lachance

After watching this video; you will be able to describe processes for securing directory services and certificate authorities used in mobile app back-end systems.

97716
Securing Mobile Devices In The Enterprise: Securing E-mail Services Dan Lachance

After watching this video; you will be able to describe the use of S/MIME to secure e-mail in the enterprise.

97717
Securing Mobile Devices In The Enterprise: Security Decisions Via Untrusted Inputs Dan Lachance

After watching this video; you will be able to describe how security decisions via untrusted inputs affect mobile device back-end systems.

97467
Securing Mobile Devices In The Enterprise: Sensitive Data Storage And Transport Dan Lachance

After watching this video; you will be able to describe how mobile data is stored and transported.

97459
Securing Mobile Devices In The Enterprise: Sensitive Mobile Assets Dan Lachance

After watching this video; you will be able to describe sensitive mobile assets.

97457
Securing Mobile Devices In The Enterprise: Sensitive Usage Of Mobile Devices Dan Lachance

After watching this video; you will be able to describe sensitive usage scenarios for mobile devices.

97458
Securing Mobile Devices In The Enterprise: Short-lived Session Keys Dan Lachance

After watching this video; you will be able to describe challenges with transport layer security; and how they can be solved with short-lived session keys and perfect forward secrecy.

97734
Securing Mobile Devices In The Enterprise: Symmetric Encryption Overview Dan Lachance

After watching this video; you will be able to describe symmetric encryption.

97482
Securing Mobile Devices In The Enterprise: System Center Configuration Manager Overview Dan Lachance

After watching this video; you will be able to describe Microsoft System Center Configuration Manager and Intune interoperability.

97758
Securing Mobile Devices In The Enterprise: Targeting Devices In Microsoft Intune Dan Lachance

After watching this video; you will be able to target devices in Microsoft Intune.

97752
Securing Mobile Devices In The Enterprise: Technical Impacts Of Exploits Dan Lachance

After watching this video; you will be able to describe the potential technical impacts of mobile exploits.

97470
Securing Mobile Devices In The Enterprise: The Mobile Security Landscape Dan Lachance

After watching this video; you will be able to describe the current state of mobile device security.

97454
Securing Mobile Devices In The Enterprise: Requirements For The Mobile Enterprise Dan Lachance

After watching this video; you will be able to describe the requirements for establishing a Mobile Enterprise.

97722
Securing Mobile Devices In The Enterprise: Lack Of Binary Protections Dan Lachance

After watching this video; you will be able to describe how lack of binary protections affects mobile device front-end systems.

97469
Securing Mobile Devices In The Enterprise: Managing Devices With Exchange Activesync Dan Lachance

After watching this video; you will be able to configure Office 365 Exchange ActiveSync to manage mobile devices.

97733
Securing Mobile Devices In The Enterprise: Microsoft Azure Rights Management Overview Dan Lachance

After watching this video; you will be able to describe Microsoft Azure Rights Management cloud-based rights management system.

97744
Securing Mobile Devices In The Enterprise: Mitigating Code Vulnerabilities In Apps Dan Lachance

After watching this video; you will be able to describe methods to mitigate code vulnerabilities in mobile apps.

97743
Securing Mobile Devices In The Enterprise: Mitigating Malicious App Functionality Dan Lachance

After watching this video; you will be able to describe methods to mitigate malicious functionality in mobile apps.

97742
Securing Mobile Devices In The Enterprise: Mobile Device Management Systems Dan Lachance

After watching this video; you will be able to describe the use of mobile device management systems to fully manage secure mobile devices.

97720
Securing Mobile Devices In The Enterprise: Mobile Device Overview Dan Lachance

After watching this video; you will be able to describe current mobile devices and form factors.

97453
Securing Mobile Devices In The Enterprise: Mobile Device Ownership Models Dan Lachance

After watching this video; you will be able to describe mobile device ownership models and how they relate to a coherent mobile threat mitigation strategy.

97723
Securing Mobile Devices In The Enterprise: Navigating Microsoft Intune Dan Lachance

After watching this video; you will be able to navigate the Microsoft Intune interface.

97750
Securing Mobile Devices In The Enterprise: Overview Of Security Dan Lachance

After watching this video; you will be able to describe mobile security considerations.

97455
Securing Mobile Devices In The Enterprise: Performing Digital Signing Dan Lachance

After watching this video; you will be able to perform digital signing using OpenSSL.

97705
Securing Mobile Devices In The Enterprise: Performing Encryption Dan Lachance

After watching this video; you will be able to encrypt and decrypt a message using OpenSSL.

97703
Securing Mobile Devices In The Enterprise: Performing Hashing Dan Lachance

After watching this video; you will be able to perform hashing using Windows PowerShell.

97481
Securing Mobile Devices In The Enterprise: Poor Authorization And Authentication Dan Lachance

After watching this video; you will be able to describe how poor authorization and authentication affects mobile device front-end and back-end systems.

97464
Securing Mobile Devices In The Enterprise: Preparing For Ios Mobile Device Enrollment Dan Lachance

After watching this video; you will be able to prepare for iOS device enrollment in Microsoft System Center Configuration Manager.

97761
Securing Mobile Devices In The Enterprise: Preparing For Windows Mobile Device Enrollment Dan Lachance

After watching this video; you will be able to prepare for Windows Mobile device enrollment in Microsoft System Center Configuration Manager.

97760
Securing Mobile Devices In The Enterprise: Protect Data In Microsoft Intune Dan Lachance

After watching this video; you will be able to protect data in Microsoft Intune.

97757
Securing Mobile Devices In The Enterprise: Protecting Content With Microsoft Azure Rms Dan Lachance

After watching this video; you will be able to configure Microsoft Azure Rights Management System to protect confidential documents.

97745
Securing Mobile Devices In The Enterprise: Protecting Data At Rest And In Transit Dan Lachance

After watching this video; you will be able to describe measures to protect data in transit and at rest.

97719
Securing Mobile Devices In The Enterprise: Protecting The Transport Layer Dan Lachance

After watching this video; you will be able to describe measures to protect mobile apps at the transport layer.

97712
Securing Mobile Devices In The Enterprise: Deploy Enterprise Profiles In Microsoft Intune Dan Lachance

After watching this video; you will be able to deploy enterprise profiles in Microsoft Intune.

97755
Securing Mobile Devices In The Enterprise: Device Authorization And Authentication Requirements Dan Lachance

After watching this video; you will be able to describe requirements for secure device authorization and authentication.

97473
Securing Mobile Devices In The Enterprise: Device Sensor; Jailbreak; & Mdm System Requirements Dan Lachance

After watching this video; you will be able to describe requirements for secure device sensors; jailbreaking; and mobile device management systems.

97474
Securing Mobile Devices In The Enterprise: Digital Certificates Overview Dan Lachance

After watching this video; you will be able to describe digital certificates and the process of issuing certificates in a CA system.

97707
Securing Mobile Devices In The Enterprise: Digital Signing Overview Dan Lachance

After watching this video; you will be able to describe digital signing.

97704
Securing Mobile Devices In The Enterprise: Distribute Apps In Microsoft Intune Dan Lachance

After watching this video; you will be able to distribute apps in Microsoft Intune.

97756
Securing Mobile Devices In The Enterprise: Encrypting Cloud Data Dan Lachance

After watching this video; you will be able to use Boxcryptor to encrypt and secure cloud data.

97731
Securing Mobile Devices In The Enterprise: Enforcing Configurations In Microsoft Intune Dan Lachance

After watching this video; you will be able to enforce configurations in Microsoft Intune.

97753
Securing Mobile Devices In The Enterprise: Enrolling Devices In Microsoft Intune Dan Lachance

After watching this video; you will be able to enroll devices in Microsoft Intune.

97751
Securing Mobile Devices In The Enterprise: Enterprise Mobile Device Security Challenges Dan Lachance

After watching this video; you will be able to describe network architecture challenges for securing enterprise mobile devices.

97747
Securing Mobile Devices In The Enterprise: Enterprise Mobile Device Security Model Solution Dan Lachance

After watching this video; you will be able to describe a solution for enterprise mobile device security challenges based on Microsoft’s product portfolio.

97748
Securing Mobile Devices In The Enterprise: Exchange Activesync Functionality Dan Lachance

After watching this video; you will be able to describe Microsoft Exchange ActiveSync functionality for managing mobile devices.

97732
Securing Mobile Devices In The Enterprise: Handling Certificates In Microsoft Intune Dan Lachance

After watching this video; you will be able to handle certificates in Microsoft Intune.

97754
Securing Mobile Devices In The Enterprise: Hashing Overview Dan Lachance

After watching this video; you will be able to describe hashing and identify the main hashing algorithms.

97480
Securing Mobile Devices In The Enterprise: Identifying Risks Dan Lachance

After watching this video; you will be able to describe the process to determine risk in a mobile environment.

97456
Securing Mobile Devices In The Enterprise: Improper Session Handling Dan Lachance

After watching this video; you will be able to describe how improper session handling affects mobile device front-end systems.

97468
Securing Mobile Devices In The Enterprise: Infrastructure Security Requirements Dan Lachance

After watching this video; you will be able to describe infrastructure security requirements to support secure mobile apps.

97713
Securing Mobile Devices In The Enterprise: Insecure Data Storage Dan Lachance

After watching this video; you will be able to describe how insecure data storage affects mobile device front-end and back-end systems.

97461
Securing Mobile Devices In The Enterprise: Insufficient Transport Layer Protection Dan Lachance

After watching this video; you will be able to describe how insufficient transport layer protection affects mobile device front-end and back-end systems.

97462
Securing Mobile Devices In The Enterprise: Key Distribution Dan Lachance

After watching this video; you will be able to describe key distribution in cryptographic systems.

97706
Securing Mobile Devices In The Enterprise: Asymmetric Encryption Overview Dan Lachance

After watching this video; you will be able to describe asymmetric encryption and its common uses.

97483
Securing Mobile Devices In The Enterprise: Back-end Security Requirements Dan Lachance

After watching this video; you will be able to describe requirements for back-end security for mobile applications.

97709
Securing Mobile Devices In The Enterprise: Broken Cryptography Dan Lachance

After watching this video; you will be able to describe how broken cryptography affects mobile device front-end and back-end systems.

97465
Securing Mobile Devices In The Enterprise: Building A Demilitarized Zone Dan Lachance

After watching this video; you will be able to describe the architecture of a demilitarized zone to protect mobile app services.

97714
Securing Mobile Devices In The Enterprise: Business Impacts Of Exploits Dan Lachance

After watching this video; you will be able to describe the potential business impacts of mobile exploits.

97471
Securing Mobile Devices In The Enterprise: Byod Container Usage Scenarios Dan Lachance

After watching this video; you will be able to describe usage scenarios for BYOD containers.

97739
Securing Mobile Devices In The Enterprise: Byod Containers Dan Lachance

After watching this video; you will be able to describe BYOD containers for segregating data on BYOD devices.

97738
Securing Mobile Devices In The Enterprise: Client-side Injection Dan Lachance

After watching this video; you will be able to describe how client-side injection affects mobile device front-end systems.

97466
Securing Mobile Devices In The Enterprise: Configuring Byod Containers

After watching this video; you will be able to configure BYOD containers using Good Work.

97740
Securing Mobile Devices In The Enterprise: Configuring Perfect Forward Secrecy Dan Lachance

After watching this video; you will be able to configure perfect forward secrecy in Internet Information Services.

97735
Securing Mobile Devices In The Enterprise: Configuring The Microsoft Intune Connector Role Dan Lachance

After watching this video; you will be able to configure the Microsoft Intune connector role.

97759
Securing Mobile Devices In The Enterprise: Configuring Unmanaged Android Devices Dan Lachance

After watching this video; you will be able to configure security settings on-device for unmanaged Android devices.

97727
Securing Mobile Devices In The Enterprise: Configuring Unmanaged Ios Devices Dan Lachance

After watching this video; you will be able to configure security settings on-device for unmanaged iPhone and iPad iOS devices.

97728
Securing Mobile Devices In The Enterprise: Configuring Unmanaged Windows Phone Devices Dan Lachance

After watching this video; you will be able to configure security settings on-device for unmanaged Windows Phone devices.

97729
Securing Mobile Devices In The Enterprise: Configuring Virtual Private Networks Dan Lachance

After watching this video; you will be able to connect a mobile device to a VPN server.

97737
Securing Mobile Devices In The Enterprise: Creating A Microsoft Intune Account Dan Lachance

After watching this video; you will be able to create an account for Microsoft Intune.

97749
Securing Mobile Devices In The Enterprise: Creating Certificates Dan Lachance

After watching this video; you will be able to create a certificate in Visual Studio makecert.

97708
Securing Mobile Devices In The Enterprise: Cryptography One-way Functions Dan Lachance

After watching this video; you will be able to describe the theory of one-way cryptographic functions and hashes.

97479
Securing Mobile Devices In The Enterprise: Cryptography Usage Dan Lachance

After watching this video; you will be able to describe usage scenarios for cryptography.

97478
Securing Mobile Devices In The Enterprise: Assessing Mobile Threats Dan Lachance

After watching this video; you will be able to assess threats from OWASP top 10 and their impact on mobile systems.

97477
It Security: Ipad Wi-fi Bluetooth Security Josh Penzell

Without taking the necessary security precautions when employing Wi-Fi and Bluetooth on your iPad you can expose the device; and the data it contains; to potential security threats. In this video; Josh Penzell demonstrates how to disable wireless connections on the iPad when they’re not in use.

55691
It Security: Iphone – Find My Iphone Josh Penzell

If your iPhone is lost or stolen; the Find My iPhone app will enable you to use the iCloud service or another iOS device to locate your iPhone and protect your data from being accessed. In this video; Josh Penzell demonstrates how to configure the Find My iPhone app and highlights the key features provided by the service.

55687
It Security: Iphone Privacy Features Josh Penzell

The Privacy feature on the iPhone allows you to control whether certain applications are allowed access to specific information on your device. In this video; Josh Penzell demonstrates how to configure the Location Services in the Privacy area; and how to determine when an app wants access to specific data on your iPhone.

55684
It Security: Iphone Restriction Feature Josh Penzell

The iPhone includes a helpful feature called Restrictions that you can use to prevent access to specific content and applications on the device so you feel more comfortable handing your iPhone over to others. In this video; Josh Penzell highlights some of the restrictions and parental control settings that you can use to lock down your iPhone.

55683
It Security: Iphone Safari Security Josh Penzell

The iPhone Safari browser security settings allow you to keep your personal information safe and control your online privacy. In this video; Josh Penzell demonstrates how to lock down Safari’s security settings in order to prevent others from accessing and abusing your personal information while you’re browsing.

55685
It Security: Iphone Wi-fi Bluetooth Security Josh Penzell

Without taking the necessary security precautions when employing Wi-Fi and Bluetooth on your iPhone; you can expose the device; and the data it contains; to potential security threats. In this video; Josh Penzell highlights some of the best practises for limiting unscrupulous access to your iPhone through wireless connections.

55686
It Security: Mobile And Byod Security Carlos Moros

The Bring Your Own Device (BYOD) trend challenges IT security strategies applied to the cloud. In this video; Carlos Moros discusses the lack of security controls on consumer devices that access the cloud. If registration; onboarding; and identity management aren’t implemented; mobile devices can become bridges between mission-critical corporate information and the cloud.

55706
It Security: Secaas Carlos Moros

IT security in a cloud environment can be seen in Security as a Service (SaaS); which can be provided by third-party providers. In this video; Carlos Moros discusses the merits of SaaS in cloud computing and what options are available to users; where key factors in deciding on an option are interoperability; portability; trust; and adherence to standards.

55700
It Security: Securing The Cloud Carlos Moros

Securing your Cloud is a relatively new IT security challenge. In this video; Carlos Moros uses the virtualization and multi-tenancy features to explain Cloud computing and its security challenges.

55693
It Security: Threat Vectors In The Cloud Carlos Moros

Cloud computing environments face both old and new IT security vulnerabilities and threats. In this video; Carlos Moros uses the Cloud Security Alliance report to identify and investigate potential security threats that are specific to the Cloud.

55694
It Security: Virtualization For Security And Security For Virtualization Carlos Moros

Virtualization is an IT security mechanism that creates the illusion of multi-tenancy and customer segregation. In this video; Carlos Moros use virtual machines to explain virtualization for security and security for virtualization.

55697
It Security: What Is Your Cloud Provider Doing To Protect Your Assets Carlos Moros

Because cloud services cause loss of visibility over information assets; IT security practitioners must evaluate cloud providers in terms of business security and legal requirements. In this video; Carlos Moros suggests an approach developed by the European Network and Information Security Agency in 2011; which covers security and resiliency parameters for preparedness; service delivery; response and recovery; and legal compliance.

55704
Microsoft Security Fundamentals: Intrusion Detection And Intrusion Prevention Systems Travis Welton

After watching this video; you will be able to distinguish between the two main types of IDS/IPS.

73774
Microsoft Security Fundamentals: Packet Filtering Firewalls Travis Welton

After watching this video; you will be able to recognize characteristics of packet filtering firewalls.

73761
Microsoft Security Fundamentals: Zones Travis Welton

With Microsoft Windows; it is vitally important to be aware of security fundamentals. Microsoft added the use of four security content zones to Internet Explorer to improve Internet security. In this video; Travis Welton demonstrates how to configure the four security content zones and further customize the security levels in Internet Explorer.

73728
Securing Mobile Devices In The Enterprise – Exercise: Configuring Intune Dan Lachance

After watching this video; you will be able to create an account on Microsoft Intune; enroll devices; and deploy enterprise profiles.

97762
Securing Mobile Devices In The Enterprise – Exercise: Mitigating Threat For Byod And Cod Devices Dan Lachance

After watching this video; you will be able to describe mitigation strategies for BYOD and COD devices in the enterprise.

97746
Securing Mobile Devices In The Enterprise – Exercise: Securing Back-end Systems Dan Lachance

After watching this video; you will be able to describe threats to back-end systems; and strategies to mitigate them.

97721
Securing Mobile Devices In The Enterprise: Application Hardening Dan Lachance

After watching this video; you will be able to describe measures to harden services for mobile applications.

97710
Securing Mobile Devices In The Enterprise: Application Wrapper Overview Dan Lachance

After watching this video; you will be able to describe security functionality offered by app wrapper technologies for mobile devices.

97741
Cissp: Water Issues Dan Lachance

After watching this video; you will be able to identify best practices for preventing and responding to water risks.

79271
It Security: Big Data Challenges In The Cloud Carlos Moros

IT security becomes a challenge when dealing with big data in the cloud. In this video; Carlos Moros explains what big data is; its benefits; and why it’s a concern for security practitioners in a cloud environment.

55703
It Security: Building Security Policies For Cloud Infrastructure Carlos Moros

IT security requires users to build secure policies that keep pace with cloud computing and storage as well as bricks-and-mortar infrastructures. In this video; Carlos Moros discusses security considerations resulting from the shift from perimeter protection of a static data environment to a virtual environment in which data traverses administrative domains; including e-discovery; identity management; and operational domains.

55699
It Security: Cloud Encryption And Key Management Carlos Moros

IT security includes encryption which deals with confidentiality; key management; and loss of visibility over encrypted information assets. In this video; Carlos Moros uses different encryption models to ensure confidentiality; integrity; and authenticity of data in a Cloud environment.

55696
It Security: Cloud Security Models And Standards Carlos Moros

Cloud security models and standards play a vital role in IT security. In this video; Carlos Moros uses the process standards to explain their role in monitoring; auditing; interoperability; and securing your Cloud.

55698
It Security: Cloud Visibility Carlos Moros

Lack of cloud visibility hampers IT security strategies because so many security functions rely on visibility. In this video; Carlos Moros discusses reasons for restricted visibility and proven standards for defining a visibility strategy; such as the Cloud Trust Protocol; of which the central issues are defining what should be monitored and how; and compelling cloud providers to do so.

55707
It Security: Data Security In The Cloud Carlos Moros

IT security includes the security of high volumes of data that move swiftly in and out of the cloud. This causes data loss prevention to become a crucial concern. In this video; Carlos Moros discusses how multi-tenancy expands the attack surface; data sovereignty being at risk; and the role of a data loss prevention policy throughout the data life cycle.

55702
It Security: Governance In The Cloud Carlos Moros

In terms of IT Security; Governance is defined as a system by which IT infrastructures are managed and controlled. In this video; Carlos Moros explains how to keep control of IT assets in a Cloud Computing environment as well as the processes and procedures you can use to do so.

55695
It Security: Guidelines To Protect Web Services Carlos Moros

IT security applied to cloud services needs to focus on the latest trends in protecting web protocols to define access control into and out of the cloud. In this video; Carlos Moros describes common threats to cloud security and ways to combat them; such as web security gateways and Web 2.0 countermeasures; with special attention given to data loss prevention.

55701
It Security: Identity Management Carlos Moros

Identity management as an IT security strategy in a cloud is more complex than within an enterprise environment; which has known protocols for authentication and authorization. In this video; Carlos Moros discusses principal and resource-centric identity management with rule-based access control. Proliferation of identities and credentials across cloud providers can be curtailed using an identity mediator or a federated approach.

55705
It Security: Ipad – Find My Ipad Josh Penzell

With Find My iPad enabled; you’ll be able to use the Find My iPhone app and your iCloud account; or another iOS device; to locate your iPad and protect its data. In this video; Josh Penzell demonstrates how to use the Find My iPhone app to locate; lock; or erase all the data from your iPad if it’s lost or stolen.

55692
It Security: Ipad Privacy Features Josh Penzell

The Privacy feature on the iPad allows you to control what applications have access to the private information stored on your iPad. In this video; Josh Penzell demonstrates how to configure the Location Services in the Privacy area and how to determine when an app wants access to specific data on your iPad.

55689
It Security: Ipad Restriction Feature Josh Penzell

Restrictions on the iPad is a helpful feature that you can use to prevent access to specific content and applications on the device; allowing you to feel comfortable handing over your iPad to others. In this video; Josh Penzell highlights some of the Restrictions and parental control settings that you can use to lock down your iPad.

55688
It Security: Ipad Safari Security Josh Penzell

The iPad Safari browser security settings allow you to keep your personal information safe; and gives you control over your online privacy. In this video; Josh Penzell demonstrates how to lock down Safari’s security settings to prevent others from accessing and abusing your personal information while you’re browsing the Internet.

55690
Security Accreditations And Best Practice (874)
Title Speaker Summary ID
Systems Security Certified Practitioner: Understanding Least Privilege Dan Lachance

After watching this video; you will be able to identify characteristics of the concept of least privilege.

91496
Systems Security Certified Practitioner: Understanding Privacy Dan Lachance

After watching this video; you will be able to identify characteristics of the concept of privacy.

91494
Systems Security Certified Practitioner: Understanding Separation Of Duties Dan Lachance

After watching this video; you will be able to identify characteristics of the concept of separation of duties.

91497
Systems Security Certified Practitioner: Virtual Appliances Dan Lachance

After watching this video; you will be able to describe characteristics of virtual appliances and their role in virtual environments.

91605
Systems Security Certified Practitioner: Virtual Environment Attacks And Countermeasures Dan Lachance

After watching this video; you will be able to identify the most common attacks on virtual environments and countermeasures for mitigating risk and damage.

91607
Systems Security Certified Practitioner: Visualization Dan Lachance

After watching this video; you will be able to use visualization to analyze monitoring results.

91529
Systems Security Certified Practitioner: Web Of Trust Dan Lachance

After watching this video; you will be able to describe characteristics of Web of Trust.

91561
Systems Security Certified Practitioner: Wireless Security Devices Dan Lachance

After watching this video; you will be able to describe characteristics of wireless security devices.

91581
Systems Security Certified Practitioner: Wireless Technologies Attacks And Countermeasures Dan Lachance

After watching this video; you will be able to identify common attacks methods and countermeasures for wireless technologies.

91582
Systems Security Certified Practitioner: Wireless Transmission Security Dan Lachance

After watching this video; you will be able to identify best practices for secure wireless transmission.

91580
What’s New In Cissp 2015: Exam Update Overview Dan Lachance

After watching this video; you will be able to describe the high-level changes in ISC2 CISSP 2015 with respect to CISSP 2012.

84474
What’s New In Cissp 2015: New Testing Domains Dan Lachance

After watching this video; you will be able to list the testing domains in ISC2 CISSP 2015.

84476
What’s New In Cissp 2015: New Testing Topics Dan Lachance

After watching this video; you will be able to recognize the new testing topics for ISC2 CISSP 2015.

84477
What’s New In Cissp 2015: Previous Testing Domains Dan Lachance

After watching this video; you will be able to list the testing domains in ISC2 CISSP 2012.

84475
Systems Security Certified Practitioner: Segmentation Dan Lachance

After watching this video; you will be able to use segmentation for managing LAN-based security.

91574
Systems Security Certified Practitioner: Service Models Dan Lachance

After watching this video; you will be able to distinguish between cloud security service models.

91596
Systems Security Certified Practitioner: Shared Storage Dan Lachance

After watching this video; you will be able to describe best practices for shared storage in virtual environments.

91608
Systems Security Certified Practitioner: Single Sign-on Dan Lachance

After watching this video; you will be able to describe best practices for implementing single sign-on authentication.

91472
Systems Security Certified Practitioner: Single/multifactor Authentication Dan Lachance

After watching this video; you will be able to describe best practices for implementing single/multifactor authentication.

91471
Systems Security Certified Practitioner: Software Asset Management Dan Lachance

After watching this video; you will be able to identify best practices for software asset management.

91506
Systems Security Certified Practitioner: Software-defined Networking Dan Lachance

After watching this video; you will be able to describe best practices for secure software-defined networking in virtual environments.

91603
Systems Security Certified Practitioner: Source Systems Dan Lachance

After watching this video; you will be able to describe characteristics and purpose of source systems used in continuous monitoring activities.

91527
Systems Security Certified Practitioner: Symmetric And Asymmetric Encryption Dan Lachance

After watching this video; you will be able to distinguish between symmetric and asymmetric encryption application.

91550
Systems Security Certified Practitioner: System Architecture And Interoperability Dan Lachance

After watching this video; you will be able to identify system architecture and interoperability of systems activities in change management processes.

91513
Systems Security Certified Practitioner: Technical Controls Dan Lachance

After watching this video; you will be able to describe how to use technical controls to implement and assess compliance.

91508
Systems Security Certified Practitioner: Testing And Drills Dan Lachance

After watching this video; you will be able to describe characteristics and best practices for testing and drills for supporting emergency response plans and procedures.

91546
Systems Security Certified Practitioner: Traffic-shaping Devices Dan Lachance

After watching this video; you will be able to identify best practices for using traffic-shaping devices.

91579
Systems Security Certified Practitioner: Transitive Trust Dan Lachance

After watching this video; you will be able to identify characteristics of transitive trust in internetwork trust architectures.

91476
Systems Security Certified Practitioner: Trusted Platform Module Dan Lachance

After watching this video; you will be able to use trusted platform module for endpoint device security.

91592
Systems Security Certified Practitioner: Two-way Trust Relationships Dan Lachance

After watching this video; you will be able to describe characteristics of two-way trust relationships in internetwork trust architectures.

91475
Systems Security Certified Practitioner: Understanding Accountability Dan Lachance

After watching this video; you will be able to identify characteristics of the concept of accountability.

91493
Systems Security Certified Practitioner: Understanding Availability Dan Lachance

After watching this video; you will be able to identify characteristics of the concept of availability.

91492
Systems Security Certified Practitioner: Understanding Confidentiality Dan Lachance

After watching this video; you will be able to describe characteristics of the concept of confidentiality.

91490
Systems Security Certified Practitioner: Understanding Integrity Dan Lachance

After watching this video; you will be able to identify characteristics of the concept of integrity.

91491
Systems Security Certified Practitioner: Provisioning Dan Lachance

After watching this video; you will be able to describe provisioning activities as part of the identity management lifecycle.

91479
Systems Security Certified Practitioner: Public Key Infrastructure Dan Lachance

After watching this video; you will be able to describe how to use PKI as part of implementing and operating cryptographic systems.

91559
Systems Security Certified Practitioner: Regulatory Requirements Dan Lachance

After watching this video; you will be able to identify regulatory requirements for cryptography.

91554
Systems Security Certified Practitioner: Remote Access Operation And Configuration Dan Lachance

After watching this video; you will be able to describe best practices for remote access operation and configuration.

91571
Systems Security Certified Practitioner: Reporting And Feedback Loops Dan Lachance

After watching this video; you will be able to identify lessons learned activities.

91535
Systems Security Certified Practitioner: Responding To Incidents Dan Lachance

After watching this video; you will be able to identify best practices for handling incidents; supporting forensic investigations; and supporting business continuity activities.

91547
Systems Security Certified Practitioner: Restoration Planning Dan Lachance

After watching this video; you will be able to identify best practices for restoration planning as part of business continuity activities.

91544
Systems Security Certified Practitioner: Risk Assessment Dan Lachance

After watching this video; you will be able to identify risk assessment characteristics and options.

91520
Systems Security Certified Practitioner: Risk Management Concepts Dan Lachance

After watching this video; you will be able to describe characteristics of risk management concepts.

91519
Systems Security Certified Practitioner: Risk Treatment Dan Lachance

After watching this video; you will be able to describe options for risk treatment.

91521
Systems Security Certified Practitioner: Risk Visibility And Reporting Dan Lachance

After watching this video; you will be able to describe characteristics of risk visibility and reporting activities.

91518
Systems Security Certified Practitioner: Role-based Access Control Dan Lachance

After watching this video; you will be able to describe best practices when implementing role-based access control.

91485
Systems Security Certified Practitioner: Routers And Switches Dan Lachance

After watching this video; you will be able to identify best practices for using routers and switches securely on networks.

91578
Systems Security Certified Practitioner: Secure Browsing Dan Lachance

After watching this video; you will be able to identify secure browsing best practices for endpoint device security.

91594
Systems Security Certified Practitioner: Secure Device Management Dan Lachance

After watching this video; you will be able to identify best practices for secure device management.

91575
Systems Security Certified Practitioner: Securing Networks And Communications Dan Lachance

After watching this video; you will be able to identify best practices for securing networks; protecting telecommunications technologies; and implementing and operating secure wireless technologies.

91583
Systems Security Certified Practitioner: Securing Systems And Applications Dan Lachance

After watching this video; you will be able to describe best practices for implementing and operating systems and applications security.

91609
Systems Security Certified Practitioner: Security Analytics; Metrics And Trends Dan Lachance

After watching this video; you will be able to use security analytics metrics and trends for analyzing monitoring results.

91528
Systems Security Certified Practitioner: Security Impact Assessment Dan Lachance

After watching this video; you will be able to identify activities in performing a security impact assessment.

91512
Systems Security Certified Practitioner: Proofing Dan Lachance

After watching this video; you will be able to identify proofing best practices during the identity management lifecycle.

91478
Systems Security Certified Practitioner: Mobile Device Management Dan Lachance

After watching this video; you will be able to use mobile device management for endpoint device security.

91593
Systems Security Certified Practitioner: Monitoring And Analyzing Risk Dan Lachance

After watching this video; you will be able to identify best practices for identifying; monitoring; and analyzing risk.

91532
Systems Security Certified Practitioner: Network Access Attacks And Countermeasures Dan Lachance

After watching this video; you will be able to describe common network access attacks and appropriate countermeasures.

91572
Systems Security Certified Practitioner: Network Intrusion Detection And Prevention Systems Dan Lachance

After watching this video; you will be able to identify best practices for using network intrusion detection and prevention systems.

91577
Systems Security Certified Practitioner: Network Topographies And Relationships Dan Lachance

After watching this video; you will be able to identify the different types of network topographies and their role in network security.

91565
Systems Security Certified Practitioner: Non-discretionary Access Control Dan Lachance

After watching this video; you will be able to describe best practices when implementing non-discretionary access control.

91483
Systems Security Certified Practitioner: Non-repudiation Dan Lachance

After watching this video; you will be able to describe characteristics and best practices for applying non-repudiation.

91552
Systems Security Certified Practitioner: One-way Trust Relationships Dan Lachance

After watching this video; you will be able to describe characteristics of one-way trust relationships in internetwork trust architectures.

91474
Systems Security Certified Practitioner: Operation Models Dan Lachance

After watching this video; you will be able to distinguish between cloud security operation models.

91595
Systems Security Certified Practitioner: Operational Controls Dan Lachance

After watching this video; you will be able to describe how to use operational controls to implement and assess compliance.

91509
Systems Security Certified Practitioner: Organizational Code Of Ethics Dan Lachance

After watching this video; you will be able to identify best practices for compliance with organizational code of ethics.

91489
Systems Security Certified Practitioner: Osi And Tcp/ip Models Dan Lachance

After watching this video; you will be able to distinguish between OSI and TCP/IP models and their role in network security issues.

91564
Systems Security Certified Practitioner: Participating In Physical Security Operations Dan Lachance

After watching this video; you will be able to identify physical security operations activities.

91516
Systems Security Certified Practitioner: Participating In Security Administration Dan Lachance

After watching this video; you will be able to identify appropriate activities for participating in change management; security operations and security administration processes.

91517
Systems Security Certified Practitioner: Participating In Security Awareness And Training Dan Lachance

After watching this video; you will be able to identify security awareness and training activities.

91515
Systems Security Certified Practitioner: Participating In Security Testing And Evaluation Dan Lachance

After watching this video; you will be able to describe security testing and evaluation activities.

91523
Systems Security Certified Practitioner: Patch Management Dan Lachance

After watching this video; you will be able to describe activities for implementing and testing patches; fixes; and updates.

91514
Systems Security Certified Practitioner: Plane Separation Dan Lachance

After watching this video; you will be able to describe data plane and control plane separation for managing LAN-based security.

91573
Systems Security Certified Practitioner: Preservation Of Scene Dan Lachance

After watching this video; you will be able to identify best practices for preservation of scene during forensic investigation activities.

91541
Systems Security Certified Practitioner: Preventative Controls Dan Lachance

After watching this video; you will be able to describe best practices for preventative security controls.

91499
Systems Security Certified Practitioner: Implementing Countermeasures Dan Lachance

After watching this video; you will be able to identify best practices when implementing countermeasures.

91537
Systems Security Certified Practitioner: Implementing Cryptographic Systems Dan Lachance

After watching this video; you will be able to identify best practices for implementing and operating cryptographic systems and controls.

91563
Systems Security Certified Practitioner: Implementing Operational Security Controls Dan Lachance

After watching this video; you will be able to identify appropriate best practices when implementing different types of operating security controls.

91503
Systems Security Certified Practitioner: Implementing Secure Protocols Dan Lachance

After watching this video; you will be able to identify best practices for implementing secure protocols.

91562
Systems Security Certified Practitioner: Incident Discovery Dan Lachance

After watching this video; you will be able to describe incident discovery activities.

91533
Systems Security Certified Practitioner: Incident Escalation Dan Lachance

After watching this video; you will be able to identify incident escalation activities.

91534
Systems Security Certified Practitioner: Incident Response Dan Lachance

After watching this video; you will be able to identify incident response best practices.

91536
Systems Security Certified Practitioner: Interim Processing Strategies Dan Lachance

After watching this video; you will be able to describe interim or alternate processing strategies as part of business continuity activities.

91543
Systems Security Certified Practitioner: Interpreting Scanning And Testing Results Dan Lachance

After watching this video; you will be able to describe how to interpret and report scanning and testing results.

91524
Systems Security Certified Practitioner: Legal And Privacy Concerns Dan Lachance

After watching this video; you will be able to identify the legal and privacy concerns associated with cloud security.

91598
Systems Security Certified Practitioner: Lifecycle Asset Management Dan Lachance

After watching this video; you will be able to identify best practices for lifecycle asset management.

91504
Systems Security Certified Practitioner: Logging Dan Lachance

After watching this video; you will be able to describe logging activities as part of operating and maintaining monitoring systems.

91526
Systems Security Certified Practitioner: Maintenance Dan Lachance

After watching this video; you will be able to identify maintenance best practices during the identity management lifecycle.

91480
Systems Security Certified Practitioner: Malicious Activity Countermeasures Dan Lachance

After watching this video; you will be able to identify countermeasure for mitigating risk and damage from malicious activity.

91587
Systems Security Certified Practitioner: Malicious Code Dan Lachance

After watching this video; you will be able to describe characteristics of malicious code.

91584
Systems Security Certified Practitioner: Malicious Code Countermeasures Dan Lachance

After watching this video; you will be able to identify countermeasures for mitigating risk and damage from malicious code.

91585
Systems Security Certified Practitioner: Managerial Controls Dan Lachance

After watching this video; you will be able to describe how to use managerial controls to implement and assess compliance.

91510
Systems Security Certified Practitioner: Mandatory Access Control Dan Lachance

After watching this video; you will be able to describe best practices when implementing mandatory access control.

91482
Systems Security Certified Practitioner: Implementing Backup And Redundancy Options Dan Lachance

After watching this video; you will be able to describe characteristics and best practices for implementing backup and redundancy options.

91545
Systems Security Certified Practitioner: Implementation Variation Dan Lachance

After watching this video; you will be able to compare differences in implementation methodologies.

91556
Systems Security Certified Practitioner: Determining Appropriate Access Controls Dan Lachance

After watching this video; you will be able to identify appropriate access controls and best practices for implementation.

91487
Systems Security Certified Practitioner: Deterrent Controls Dan Lachance

After watching this video; you will be able to describe best practices for deterrent security controls.

91498
Systems Security Certified Practitioner: Device Authentication Dan Lachance

After watching this video; you will be able to identify best practices for implementing device authentication.

91473
Systems Security Certified Practitioner: Digital Signatures Dan Lachance

After watching this video; you will be able to describe characteristics and best practices for applying digital signatures.

91551
Systems Security Certified Practitioner: Discretionary Access Control Dan Lachance

After watching this video; you will be able to describe best practices when implementing discretionary access control.

91484
Systems Security Certified Practitioner: Emergency Response Plans And Procedures Dan Lachance

After watching this video; you will be able to describe characteristics and best practices for supporting emergency response plans and procedures.

91542
Systems Security Certified Practitioner: Endpoint Encryption Dan Lachance

After watching this video; you will be able to use endpoint encryption for endpoint device security.

91591
Systems Security Certified Practitioner: End-user Training Dan Lachance

After watching this video; you will be able to identify end-user training best practices related to cryptography.

91555
Systems Security Certified Practitioner: Entitlement Dan Lachance

After watching this video; you will be able to describe entitlement activities during the identity management lifecycle.

91481
Systems Security Certified Practitioner: Event Data Analysis Dan Lachance

After watching this video; you will be able to describe characteristics and purpose of event data analysis activities.

91530
Systems Security Certified Practitioner: Events Of Interest Dan Lachance

After watching this video; you will be able to describe characteristics of events of interest as part of continuous monitoring activities.

91525
Systems Security Certified Practitioner: Evidence Handling Dan Lachance

After watching this video; you will be able to identify best practices for evidence handling during forensic investigation activities.

91539
Systems Security Certified Practitioner: Firewalls And Proxies Dan Lachance

After watching this video; you will be able to identify best practices for using firewalls and proxies.

91576
Systems Security Certified Practitioner: First Responder Dan Lachance

After watching this video; you will be able to identify first responder best practices during forensic investigation activities.

91538
Systems Security Certified Practitioner: Hardware Asset Management Dan Lachance

After watching this video; you will be able to identify best practices for hardware asset management.

91505
Systems Security Certified Practitioner: Hids Dan Lachance

After watching this video; you will be able to use HIDS for endpoint device security.

91588
Systems Security Certified Practitioner: Host-based Firewalls Dan Lachance

After watching this video; you will be able to use host-based firewalls for endpoint device security.

91589
Systems Security Certified Practitioner: Hypervisor Dan Lachance

After watching this video; you will be able to identify characteristics and role of hypervisors in virtual environments.

91604
Systems Security Certified Practitioner: Identifying Malicious Activity Dan Lachance

After watching this video; you will be able to distinguish between different types of malicious activity.

91586
Systems Security Certified Practitioner: Detective Controls Dan Lachance

After watching this video; you will be able to describe best practices for detective security controls.

91500
Systems Security Certified Practitioner: Architecture And Design Vulnerabilities Dan Lachance

After watching this video; you will be able to identify architecture and design vulnerabilities that apply to big data systems.

91602
Systems Security Certified Practitioner: Attribute-based Access Control Dan Lachance

After watching this video; you will be able to describe best practices when implementing attribute-based access control.

91486
Systems Security Certified Practitioner: Audit Findings Dan Lachance

After watching this video; you will be able to identify how to use audit findings as part of the risk management process.

91522
Systems Security Certified Practitioner: Authentication Overview Dan Lachance

After watching this video; you will be able to identify characteristics of authentication and the role it plays in access control.

91470
Systems Security Certified Practitioner: Authorization Dan Lachance

After watching this video; you will be able to describe characteristics of authorization as part of the identify management lifecycle.

91477
Systems Security Certified Practitioner: Chain Of Custody Dan Lachance

After watching this video; you will be able to describe characteristics and best practices of chain of custody during forensic investigation activities.

91540
Systems Security Certified Practitioner: Cloud Security Outsourcing Requirements Dan Lachance

After watching this video; you will be able to identify security requirements when outsourcing cloud services.

91600
Systems Security Certified Practitioner: Cloud Virtualization Dan Lachance

After watching this video; you will be able to describe characteristics of cloud virtualization.

91597
Systems Security Certified Practitioner: Common Ports And Protocols Dan Lachance

After watching this video; you will be able to describe commonly used ports and protocols and their role in network security.

91566
Systems Security Certified Practitioner: Communicating Findings Dan Lachance

After watching this video; you will be able to identify best practices for communicating and reporting monitoring analysis results.

91531
Systems Security Certified Practitioner: Communications Network Attacks And Countermeasures Dan Lachance

After watching this video; you will be able to describe common attacks and countermeasures for protecting telecommunications technologies.

91568
Systems Security Certified Practitioner: Compensating Controls Dan Lachance

After watching this video; you will be able to describe best practices for compensating security controls.

91502
Systems Security Certified Practitioner: Configuration Management Plan Implementation Dan Lachance

After watching this video; you will be able to identify activities in implementing a configuration management plan.

91511
Systems Security Certified Practitioner: Continuity And Resilience Dan Lachance

After watching this video; you will be able to describe continuity and resilience in secure virtual environments.

91606
Systems Security Certified Practitioner: Converged Communications Dan Lachance

After watching this video; you will be able to describe best practices and benefits of converged communications.

91567
Systems Security Certified Practitioner: Corrective Controls Dan Lachance

After watching this video; you will be able to describe best practices for corrective security controls.

91501
Systems Security Certified Practitioner: Data Asset Management Dan Lachance

After watching this video; you will be able to identify best practices for data asset management.

91507
Systems Security Certified Practitioner: Data Sensitivity Dan Lachance

After watching this video; you will be able to describe the purpose and role of data sensitivity in cryptography.

91553
Systems Security Certified Practitioner: Data Storage And Transmission Dan Lachance

After watching this video; you will be able to identify secure data storage and transmission options for cloud security.

91599
Systems Security Certified Practitioner: Appropriate Use Dan Lachance

After watching this video; you will be able to describe best practices for appropriate use of security protocols.

91557
Microsoft Security Fundamentals: Types Of Auditing Travis Welton

After watching this video; you will be able to distinguish between the different auditing types.

73750
Microsoft Security Fundamentals: Types Of Inspection Travis Welton

After watching this video; you will be able to distinguish between stateful and stateless inspection.

73767
Microsoft Security Fundamentals: Using Hardware Versus Software Firewalls Travis Welton

After watching this video; you will be able to identify an appropriate firewall for network protection.

73766
Microsoft Security Fundamentals: Using Run As Administrator Travis Welton

After watching this video; you will be able to use "Run as" option to perform administrative tasks.

73738
Microsoft Security Fundamentals: Utilizing User Account Control (uac) Travis Welton

After watching this video; you will be able to enable and disable UAC.

73789
Microsoft Security Fundamentals: Virtual Lans (vlans) Travis Welton

After watching this video; you will be able to identify characteristics of VLANS.

73771
Microsoft Security Fundamentals: Virtual Private Networks (vpns) Travis Welton

After watching this video; you will be able to identify characteristics of VPNs.

73778
Microsoft Security Fundamentals: Vlan Separate Management Travis Welton

After watching this video; you will be able to describe the concept of separate management of VLAN.

73805
Microsoft Security Fundamentals: Vpn And Encryption Algorithms Travis Welton

After watching this video; you will be able to identify characteristics and uses of VPN and encryption algorithms.

73755
Microsoft Security Fundamentals: Worms; Trojans; And Spyware Travis Welton

After watching this video; you will be able to distinguish between characteristics of worms; trojans; and spyware.

73759
Owasp Top 10: Sql Server Injection Mitigation Hilton Giesenow

After watching this video; you will be able to describe SQL Injection and how to mitigate against it.

81038
Ssystems Security Certified Practitioner: (isc)2 Code Of Ethics Dan Lachance

After watching this video; you will be able to identify characteristics of the (ISC)2 Code of Ethics and best practices for compliance.

91488
Systems Security Certified Practitioner: Access Control And Monitoring Dan Lachance

After watching this video; you will be able to distinguish between access control and monitoring techniques.

91569
Systems Security Certified Practitioner: Access Control Standards And Protocols Dan Lachance

After watching this video; you will be able to describe access control standards and protocols.

91570
Systems Security Certified Practitioner: Administration And Validation Dan Lachance

After watching this video; you will be able to describe administration and validation activities as part of operating and implementing cryptographic systems.

91560
Systems Security Certified Practitioner: Application Vulnerabilities Dan Lachance

After watching this video; you will be able to identify application vulnerabilities that apply to big data systems.

91601
Systems Security Certified Practitioner: Application White Listing Dan Lachance

After watching this video; you will be able to use application white-listing for endpoint device security.

91590
Systems Security Certified Practitioner: Applying Hashing Dan Lachance

After watching this video; you will be able to describe purpose and best practices for applying hashing.

91548
Systems Security Certified Practitioner: Applying Salting Dan Lachance

After watching this video; you will be able to describe purpose and best practices for applying salting.

91549
Microsoft Security Fundamentals: Tunneling Travis Welton

After watching this video; you will be able to identify characteristics of tunneling.

73781
Microsoft Security Fundamentals: Removable Devices And Drives Travis Welton

In Microsoft Security Fundamentals; you may encounter removable devices and drives. These are very credible threats to a computer system. In this video; Travis Welton discusses how to secure removable devices and drives.

73722
Microsoft Security Fundamentals: Routing Travis Welton

After watching this video; you will be able to identify characteristics of routing.

73773
Microsoft Security Fundamentals: Secure Web Sites Travis Welton

Secure web browsing is initiated using Hypertext Transfer Protocol Secure (HTTPS) with Secure Sockets Layer (SSL) providing a 128-bit encryption. In this video; Travis Welton provides a definition of HTTPS with SSL for providing secure client/server communications through the Internet.

73729
Microsoft Security Fundamentals: Securing Dynamic Dns Updates Travis Welton

After watching this video; you will be able to use secure dynamic DNS functionality.

73802
Microsoft Security Fundamentals: Sender Policy Framework (spf) Records Travis Welton

After watching this video; you will be able to describe how SPF records function.

73797
Microsoft Security Fundamentals: Separation Of Services Travis Welton

After watching this video; you will be able to identify separation of services best practices.

73799
Microsoft Security Fundamentals: Server And Domain Isolation Travis Welton

After watching this video; you will be able to identify characteristics of server and domain isolation.

73780
Microsoft Security Fundamentals: Server Hardening Travis Welton

After watching this video; you will be able to recognize importance of hardening the server.

73800
Microsoft Security Fundamentals: Share Permissions Travis Welton

After watching this video; you will be able to distinguish and apply share permissions.

73742
Microsoft Security Fundamentals: Site Security Travis Welton

Site security is vital when keeping mobile or removable devices and phones safe against any potential threats. In this video; Travis Welton discusses physical site security.

73720
Microsoft Security Fundamentals: Social Engineering Travis Welton

With the advancements in technology and services available online one must ensure to protect personal information. In this video; Travis Welton discusses social engineering as a security concern.

73718
Microsoft Security Fundamentals: Software Firewalls Travis Welton

After watching this video; you will be able to recognize characteristics of software firewalls.

73765
Microsoft Security Fundamentals: Software Restriction Policies Travis Welton

After watching this video; you will be able to recognize benefits of software restriction policies.

73792
Microsoft Security Fundamentals: Spoofing Travis Welton

After watching this video; you will be able to recognize characteristics of spoofing.

73794
Microsoft Security Fundamentals: Ssid Travis Welton

It is important to be aware of security fundamentals for the Microsoft Windows environment. A Service Set Identifier (SSID) is a name that identifies a specified wireless local area network (WLAN); allowing authorized users to connect to that WLAN. In this video; Travis Welton demonstrates SSID best practices.

73732
Microsoft Security Fundamentals: Stateful Multilevel Firewalls Travis Welton

After watching this video; you will be able to recognize characteristics of stateful multilevel firewalls.

73764
Microsoft Security Fundamentals: Stateful Versus Stateless Inspection Travis Welton

After watching this video; you will be able to identify the most appropriate inspection type to use.

73768
Microsoft Security Fundamentals: The Impact Of Threat And Risk Travis Welton

Risk management is central to implementing effective IT security. In this video; Travis Welton discusses how to define risk; explains the purpose of a risk management plan; and describes the key steps involved in the risk management process.

73716
Microsoft Security Fundamentals: Token Devices Travis Welton

After watching this video; you will be able to recognize characteristics of token devices.

73757
Microsoft Security Fundamentals: Read-only Domain Controllers Travis Welton

After watching this video; you will be able to recognize characteristics and benefits of a read-only domain controller.

73804
Microsoft Security Fundamentals: Mac Filters Travis Welton

In Microsoft Windows; it is vitally important to be aware of security fundamentals. A media access control (MAC) address is the unique hardware address of a network card that allows access to a wireless local area network (WLAN) through filtering. In this video; Travis Welton discusses MAC address filtering for WLAN security.

73733
Microsoft Security Fundamentals: Malware Travis Welton

After watching this video; you will be able to distinguish between types of malware.

73787
Microsoft Security Fundamentals: Microsoft Baseline Security Analyzer (mbsa) Travis Welton

After watching this video; you will be able to use MBSA.

73806
Microsoft Security Fundamentals: Mobility Device Security Travis Welton

Mobile device security poses the most challenges of all; as they can store a lot of data and are the least secure. In this video; Travis Welton discusses how to go about securing mobile devices.

73724
Microsoft Security Fundamentals: Multifactor Authentication Travis Welton

After watching this video; you will be able to recognize characteristics of authentication.

73734
Microsoft Security Fundamentals: Nap Requirements Travis Welton

After watching this video; you will be able to identify NAP requirements.

73770
Microsoft Security Fundamentals: Network Access Protection (nap) Purpose Travis Welton

After watching this video; you will be able to identify the purpose of NAP.

73769
Microsoft Security Fundamentals: Network Address Translation (nat) Travis Welton

After watching this video; you will be able to identify characteristics of NAT.

73777
Microsoft Security Fundamentals: Network Sniffing Travis Welton

After watching this video; you will be able to identify characteristics of utility network sniffing.

73784
Microsoft Security Fundamentals: Ntfs Vs. Fat Travis Welton

After watching this video; you will be able to distinguish between NTFS and FAT file systems permissions characteristics.

73743
Microsoft Security Fundamentals: Ownership And Delegation Travis Welton

After watching this video; you will be able to set ownership and delegation permission settings.

73746
Microsoft Security Fundamentals: Password Complexity; Length; And History Policies Travis Welton

After watching this video; you will be able to recognize password policy best practices.

73747
Microsoft Security Fundamentals: Password Reset Procedures Travis Welton

After watching this video; you will be able to identify best practices when establishing password reset procedures.

73739
Microsoft Security Fundamentals: Phishing And Pharming Travis Welton

After watching this video; you will be able to distinguish between phishing and pharming.

73795
Microsoft Security Fundamentals: Pointer (ptr) Records Travis Welton

After watching this video; you will be able to describe how PTR records function.

73798
Microsoft Security Fundamentals: Principle Of Least Privilege Travis Welton

The principle of least privilege is an important concept in IT security. In this video; Travis Welton discusses legislation that has led to an increased focus on the principle; explains the challenges involved in applying the principle; and outlines some of the methods for implementing it.

73717
Microsoft Security Fundamentals: Protocol Spoofing Travis Welton

After watching this video; you will be able to identify characteristics of protocol spoofing.

73783
Microsoft Security Fundamentals: Public Key Infrastructure (pki) Travis Welton

After watching this video; you will be able to identify characteristics of PKI.

73737
Microsoft Security Fundamentals: Radius Authentication Travis Welton

After watching this video; you will be able to recognize characteristics of RADIUS authentication.

73736
Microsoft Security Fundamentals: Lockout And Group Policies Travis Welton

After watching this video; you will be able to implement password policy settings.

73748
Microsoft Security Fundamentals: Copying And Moving Files Travis Welton

After watching this video; you will be able to distinguish NTFS permission behaviors when copying and moving files.

73741
Microsoft Security Fundamentals: Demilitarized Zones (dmzs) Travis Welton

After watching this video; you will be able to identify characteristics of DMZs.

73776
Microsoft Security Fundamentals: Disable Log On Locally Travis Welton

It is important to be aware of security fundamentals for Microsoft Windows environment. Administrators can prevent a user or group from accessing a local machine by using the Deny log on locally settings. In this video; Travis Welton demonstrates how to prevent a specific user from logging on to a local machine.

73725
Microsoft Security Fundamentals: Disabling Unsecure Authentication Protocols Travis Welton

After watching this video; you will be able to disable unsecure authentication protocols.

73803
Microsoft Security Fundamentals: Dns Security Extensions (dnssec) Travis Welton

After watching this video; you will be able to identify characteristics of DNSSec.

73782
Microsoft Security Fundamentals: Efs Travis Welton

After watching this video; you will be able to identify characteristics of EFS.

73753
Microsoft Security Fundamentals: Enabling And Securing Audit Information Travis Welton

After watching this video; you will be able to enable and secure audits and audit information.

73752
Microsoft Security Fundamentals: Encrypting Offline Files And Folders Travis Welton

After watching this video; you will be able to encrypt offline files and folders.

73791
Microsoft Security Fundamentals: Encryption Methods Travis Welton

After watching this video; you will be able to distinguish between different encryption methods.

73754
Microsoft Security Fundamentals: File And Registry Permissions Travis Welton

After watching this video; you will be able to distinguish between the types of permissions that can be applied.

73723
Microsoft Security Fundamentals: Firewall Overview Travis Welton

After watching this video; you will be able to identify the purpose of firewalls.

73760
Microsoft Security Fundamentals: Group Permissions Travis Welton

After watching this video; you will be able to set multiple groups with different permissions.

73745
Microsoft Security Fundamentals: Honeypots Travis Welton

After watching this video; you will be able to identify characteristics of honeypots.

73775
Microsoft Security Fundamentals: Inheritance Travis Welton

After watching this video; you will be able to enable and disable inheritance.

73744
Microsoft Security Fundamentals: Integrity Travis Welton

One of the core concepts central to IT security is integrity. In this video; Travis Welton discusses what integrity means in relation to information security and outlines the ways that data integrity can be protected.

73714
Microsoft Security Fundamentals: Internet Protocol Security (ipsec) In Network Isolation Travis Welton

After watching this video; you will be able to identify characteristics of IPSec.

73779
Microsoft Security Fundamentals: Keeping Os And Software Current Travis Welton

After watching this video; you will be able to use Windows Update/Windows Server Update Service.

73790
Microsoft Security Fundamentals: Keeping Servers Updated Travis Welton

After watching this video; you will be able to recognize the benefits of ensuring OS and applications are kept current.

73801
Microsoft Security Fundamentals: Keyloggers Travis Welton

With Microsoft Windows; it is vitally important to be aware of security. Keyloggers pose a threat because they are devices that capture keystroke input to procure sensitive information. In this video; Travis Welton demonstrates types of keyloggers and recommends measures to defend against them.

73726
Microsoft Security Fundamentals: Keys Travis Welton

It is important to be aware of security fundamentals in the Microsoft Windows environment. Using authentication and encryption is the best approach to securing a wireless local area network (WLAN). In this video; Travis Welton discusses key-based security methods; namely: Wired Equivalent Privacy (WEP); Wi-Fi Protected Access (WPA); and WPA Version 2 (WPA2).

73731
Microsoft Security Fundamentals: Active Directory Permissions Travis Welton

After watching this video; you will be able to identify characteristics of Active Directory permissions.

73740
Microsoft Security Fundamentals: Advantages And Disadvantages Of Security Types Travis Welton

It is important to be aware of security fundamentals in Microsoft Windows environment. Wireless security is a key component in data protection. In this video; Travis Welton discusses the advantages and disadvantages of various types of wireless security.

73730
Microsoft Security Fundamentals: Antispam Travis Welton

After watching this video; you will be able to identify characteristics of spam filtering.

73793
Microsoft Security Fundamentals: Anti-virus For Client Protection Travis Welton

After watching this video; you will be able to identify characteristics of viruses.

73788
Microsoft Security Fundamentals: Application-level Firewalls Travis Welton

After watching this video; you will be able to recognize characteristics of application-level firewalls.

73763
Microsoft Security Fundamentals: Assigning Hosts To Vlans Travis Welton

After watching this video; you will be able to distinguish between ways to assign hosts to VLANS.

73772
Microsoft Security Fundamentals: Attack Surface Travis Welton

Attackers can gain access to your system; network; or application through various methods. In this video; Travis Welton discusses various attack surfaces that need to be considered when dealing with system security.

73719
Microsoft Security Fundamentals: Auditing Best Practices Travis Welton

After watching this video; you will be able to recognize auditing best practices.

73751
Microsoft Security Fundamentals: Authentication Methods Travis Welton

After watching this video; you will be able to distinguish between different authentication methods.

73735
Microsoft Security Fundamentals: Availability Travis Welton

One of the core concepts central to IT security is data availability. In this video; Travis Welton discusses what availability means; and outlines threats to data availability; including accidental and deliberate threats.

73715
Microsoft Security Fundamentals: Browser Settings Travis Welton

With Microsoft Windows; it is vitally important to be aware of security fundamentals. When browsing the Internet; adequate data and user protection should be in place. In this video; Travis Welton demonstrates how to configure Internet security settings in Internet Explorer.

73727
Microsoft Security Fundamentals: Buffer Overflow Travis Welton

After watching this video; you will be able to recognize characteristics of buffer overflow.

73758
Microsoft Security Fundamentals: Certificate Properties And Services Travis Welton

After watching this video; you will be able to recognize certificate properties and services policy best practices.

73756
Microsoft Security Fundamentals: Circuit-level Firewalls Travis Welton

After watching this video; you will be able to recognize characteristics of circuit-level firewalls.

73762
Microsoft Security Fundamentals: Client Versus Server Protection Travis Welton

After watching this video; you will be able to identify the advantages and disadvantages of both client and server protection.

73796
Microsoft Security Fundamentals: Common Attack Methods Travis Welton

After watching this video; you will be able to recognize common password attack methods.

73749
Microsoft Security Fundamentals: Common Network Attack Methods Part One Travis Welton

After watching this video; you will be able to distinguish between common attack methods.

73785
Microsoft Security Fundamentals: Common Network Attack Methods Part Two Travis Welton

After watching this video; you will be able to identify characteristics of common attack methods.

73786
Microsoft Security Fundamentals: Computer Security Travis Welton

Considerations for computer security relate to safeguarding data on an organization’s actual desktop computers; servers; and laptops. The devices alone can be expensive regardless of the valuable data they may additionally contain. In this video; Travis Welton discusses how to secure physical computer systems.

73721
Microsoft Security Fundamentals: Confidentiality Travis Welton

Three concepts are central to IT security – confidentiality; integrity; and availability (CIA). In this video; Travis Welton discusses these principles; explains what’s meant by confidentiality and how it’s implemented; and outlines different confidentiality classifications.

73713
Csslp: Source Code And Versioning Glen E. Clarke

After watching this video; you will be able to identify source code and versioning best practices.

77473
Csslp: Standards Glen E. Clarke

After watching this video; you will be able to distinguish between testing standards for software quality assurance.

77512
Csslp: Supplier Prequalification Chuck Easttom

After watching this video; you will be able to identify best practices for supplier prequalification activities.

77545
Csslp: Supplier Sourcing Challenges Chuck Easttom

After watching this video; you will be able to distinguish between different security trade-offs in supplier sourcing.

77546
Csslp: System-of-systems Integration Chuck Easttom

After watching this video; you will be able to identify characteristics of system-of-systems integration.

77557
Csslp: Technical Controls Chuck Easttom

After watching this video; you will be able to identify technical controls for software development and testing.

77551
Csslp: Test Data Lifecycle Management Glen E. Clarke

After watching this video; you will be able to identify best practices in test data lifecycle management.

77523
Csslp: Testing Artifacts Glen E. Clarke

After watching this video; you will be able to recognize characteristics of testing artifacts.

77478
Csslp: The Privacy Principle Neil McIsaac

After watching this video; you will be able to recognize the characteristics of privacy.

77402
Csslp: Threat Modeling And Documentation Neil McIsaac

After watching this video; you will be able to recognize threat modeling techniques and purpose of documentation.

77427
Csslp: Tokenizing Glen E. Clarke

After watching this video; you will be able to recognize examples of tokenizing as a defensive coding practice.

77471
Csslp: Trusted Computing Neil McIsaac

After watching this video; you will be able to recognize characteristics of trusted computing.

77449
Csslp: Type Safety Glen E. Clarke

After watching this video; you will be able to distinguish between examples of static and dynamic type safety enforcement.

77468
Csslp: Validation And Verification Glen E. Clarke

After watching this video; you will be able to recognize characteristics of validation and verification.

77528
Csslp: Vendor Technical Integrity Controls Chuck Easttom

After watching this video; you will be able to identify best practices for vendor technical integrity controls.

77548
Csslp: Virtualization Neil McIsaac

After watching this video; you will be able to identify benefits of virtualization in secure software design.

77447
Csslp: Vulnerability Management; Tracking; And Resolution Chuck Easttom

After watching this video; you will be able to identify best practices for vulnerability management; tracking; and resolution activities.

77561
Csslp: Waterfall Neil McIsaac

After watching this video; you will be able to identify secure software concepts in the Waterfall methodology.

77408
Csslp: Weakest Link Neil McIsaac

After watching this video; you will be able to recognize the characteristics of weakest link.

77400
Csslp: Software Requirements Verification And Validation Chuck Easttom

After watching this video; you will be able to identify software requirements verification and validation .

77554
Csslp: Risk Acceptance Glen E. Clarke

After watching this video; you will be able to identify the characteristics of risk acceptance.

77526
Csslp: Risk Assessment For Code Reuse Neil McIsaac

After watching this video; you will be able to identify characteristics of risk assessment for code reuse.

77430
Csslp: Risk Management Neil McIsaac

After watching this video; you will be able to distinguish between the steps of the general risk management model.

77407
Csslp: Role And User Definitions Neil McIsaac

After watching this video; you will be able to identify characteristics of role and user definitions.

77418
Csslp: Safe Apis Glen E. Clarke

After watching this video; you will be able to distinguish between safe and unsafe API coding practices.

77467
Csslp: Sandboxing Glen E. Clarke

After watching this video; you will be able to recognize characteristics of sandboxing as a defensive coding practice.

77472
Csslp: Scanning Glen E. Clarke

After watching this video; you will be able to recognize characteristics of scanning.

77515
Csslp: Security Design Principles Neil McIsaac

After watching this video; you will be able to recognize security design principle best practices.

77432
Csslp: Security Testing Glen E. Clarke

After watching this video; you will be able to distinguish between white; gray; and black-box testing.

77481
Csslp: Security Testing Controls Chuck Easttom

After watching this video; you will be able to list the eight steps to create a formal set of security testing controls.

77553
Csslp: Separation Of Duties Neil McIsaac

After watching this video; you will be able to recognize the characteristics of separation of duties.

77392
Csslp: Sequencing And Timing Requirements Neil McIsaac

After watching this video; you will be able to identify best practices for sequencing and timing.

77422
Csslp: Service-level Agreements Chuck Easttom

After watching this video; you will be able to distinguish between the two rules SLAs should provide.

77550
Csslp: Service-oriented Architecture Neil McIsaac

After watching this video; you will be able to recognize best practices for securing service-oriented architecture.

77436
Csslp: Session Management Glen E. Clarke

After watching this video; you will be able to recognize examples of using session management as a defensive coding practice.

77465
Csslp: Simulation Testing Glen E. Clarke

After watching this video; you will be able to recognize characteristics of simulation testing.

77516
Csslp: Software Authenticity And Integrity Chuck Easttom

After watching this video; you will be able to identify software authenticity and integrity best practices during software delivery; operations and maintenance.

77558
Csslp: Software Disposal Execution Glen E. Clarke

After watching this video; you will be able to identify key activities during software disposal execution.

77540
Csslp: Software Disposal Planning Glen E. Clarke

After watching this video; you will be able to identify the components of an effective software disposal plan.

77539
Csslp: Rich Internet Applications Neil McIsaac

After watching this video; you will be able to recognize best practices for securing rich Internet applications.

77437
Csslp: Open Design Neil McIsaac

After watching this video; you will be able to recognize the characteristics of open design.

77397
Csslp: Operating Systems Neil McIsaac

After watching this video; you will be able to recognize characteristics of operating systems.

77452
Csslp: Operations Requirements Neil McIsaac

After watching this video; you will be able to identify characteristics of operations requirements.

77424
Csslp: Output Sanitization Glen E. Clarke

After watching this video; you will be able to recognize examples of using output sanitization as a defensive coding practice.

77461
Csslp: Owasp Top 10 Glen E. Clarke

After watching this video; you will be able to locate and list the OWASP "Top 10".

77456
Csslp: Peer-based Code Review Glen E. Clarke

After watching this video; you will be able to recognize characteristics of peer-based code reviews.

77475
Csslp: Penetration Glen E. Clarke

After watching this video; you will be able to identify the four steps in the penetration process.

77513
Csslp: Pervasive And Ubiquitous Computing Neil McIsaac

After watching this video; you will be able to recognize best practices for securing pervasive and ubiquitous computing.

77438
Csslp: Post-release Plan Glen E. Clarke

After watching this video; you will be able to identify characteristics of a post-release plan.

77527
Csslp: Pre-release Testing Process Glen E. Clarke

After watching this video; you will be able to identify the characteristics of the pre-release testing process.

77524
Csslp: Privacy Considerations Neil McIsaac

After watching this video; you will be able to distinguish between different privacy considerations.

77403
Csslp: Problem Management Glen E. Clarke

After watching this video; you will be able to recognize characteristics of problem management.

77536
Csslp: Product Deployment And Sustainment Controls Chuck Easttom

After watching this video; you will be able to recognize best practices when integrating product deployment and sustainment controls.

77559
Csslp: Programmatic Security Glen E. Clarke

After watching this video; you will be able to recognize characteristics of programmatic security.

77455
Csslp: Programming Language Environment Neil McIsaac

After watching this video; you will be able to distinguish between compilers; interpreters and hybrid source codes.

77451
Csslp: Psychological Acceptability Neil McIsaac

After watching this video; you will be able to recognize the characteristics of psychological acceptability.

77399
Csslp: Publishing And Dissemination Controls Chuck Easttom

After watching this video; you will be able to distinguish between licenses; encryption; and authentication as publishing and dissemination controls.

77556
Csslp: Regression Testing Glen E. Clarke

After watching this video; you will be able to recognize characteristics of regression testing.

77519
Csslp: Regulations And Compliance Neil McIsaac

After watching this video; you will be able to recognize characteristics of regulations and compliance.

77404
Csslp: Release Management Glen E. Clarke

After watching this video; you will be able to recognize characteristics of release management activities.

77533
Csslp: Interconnectivity Neil McIsaac

After watching this video; you will be able to distinguish between interconnectivity activities best practices.

77433
Csslp: Interfaces Neil McIsaac

After watching this video; you will be able to identify interfaces best practices.

77434
Csslp: Internal Requirements Neil McIsaac

After watching this video; you will be able to identify typical internal security requirements.

77410
Csslp: Labeling Neil McIsaac

After watching this video; you will be able to distinguish between the different impact level definitions.

77415
Csslp: Least Common Mechanism Neil McIsaac

After watching this video; you will be able to recognize the characteristics of least common mechanism.

77398
Csslp: Least Privilege Neil McIsaac

After watching this video; you will be able to identify the characteristics of least privilege.

77391
Csslp: Legal Neil McIsaac

After watching this video; you will be able to distinguish between legal issues to keep in mind during the software lifecycle.

77405
Csslp: Legal Compliance Chuck Easttom

After watching this video; you will be able to recognize characteristics of legal compliance.

77544
Csslp: Leveraging Existing Components Neil McIsaac

After watching this video; you will be able to recognize the characteristics of leveraging existing components.

77401
Csslp: Logging Neil McIsaac

After watching this video; you will be able to recognize characteristics of logging.

77445
Csslp: Logging And Auditing Glen E. Clarke

After watching this video; you will be able to recognize examples of using logging and auditing as a defensive coding practice.

77464
Csslp: Managed Services Controls Chuck Easttom

After watching this video; you will be able to identify best secure control practices for managed services from a supplier.

77549
Csslp: Management Requirements Neil McIsaac

After watching this video; you will be able to identify characteristics of management requirements.

77425
Csslp: Memory Management Glen E. Clarke

After watching this video; you will be able to recognize characteristics of memory management as a defensive coding practice.

77469
Csslp: Mobile Applications Neil McIsaac

After watching this video; you will be able to recognize best practices for securing mobile applications.

77441
Csslp: Monitoring Glen E. Clarke

After watching this video; you will be able to recognize characteristics of monitoring during operations and maintenance.

77534
Csslp: Monitoring And Incident Management Chuck Easttom

After watching this video; you will be able to identify monitoring and incident management best practices.

77560
Csslp: Nonfunctional Testing Glen E. Clarke

After watching this video; you will be able to distinguish between nonfunctional testing methods.

77480
Csslp: Non-repudiation Neil McIsaac

After watching this video; you will be able to recognize the characteristics of non-repudiation.

77390
Csslp: Objects; Activities; And Actions Neil McIsaac

After watching this video; you will be able to distinguish between objects; activities; and actions.

77420
Csslp: Digital Rights Management (drm) Neil McIsaac

After watching this video; you will be able to recognize types of REL in DRM.

77448
Csslp: Distributed Computing Neil McIsaac

After watching this video; you will be able to distinguish between the different architectural forms and supporting elements of secured distributed computing.

77435
Csslp: Economy Of Mechanism Neil McIsaac

After watching this video; you will be able to recognize the characteristics of economy of mechanism.

77395
Csslp: Embedded Systems Neil McIsaac

After watching this video; you will be able to distinguish between control systems and firmware.

77453
Csslp: Environment Glen E. Clarke

After watching this video; you will be able to identify environment best practices for ensuring secure software testing .

77482
Csslp: Error Handling Glen E. Clarke

After watching this video; you will be able to recognize examples of using error handling as a defensive coding practice.

77462
Csslp: Exception Management Glen E. Clarke

After watching this video; you will be able to recognize examples of using exception management as a defensive coding practice.

77466
Csslp: External Requirements Neil McIsaac

After watching this video; you will be able to identify typical external security requirements.

77411
Csslp: Fail-safe Neil McIsaac

After watching this video; you will be able to recognize the characteristics of fail-safe.

77394
Csslp: Failure Testing Glen E. Clarke

After watching this video; you will be able to recognize characteristics of testing for failure.

77517
Csslp: Flow Control Neil McIsaac

After watching this video; you will be able to distinguish between flow control methods.

77444
Csslp: Functional Testing Glen E. Clarke

After watching this video; you will be able to identify characteristics of functional testing.

77479
Csslp: Fuzzing Glen E. Clarke

After watching this video; you will be able to recognize characteristics of the fuzzing method.

77514
Csslp: Impact Assessment Glen E. Clarke

After watching this video; you will be able to recognize characteristics of impact assessment.

77521
Csslp: Incident Management Glen E. Clarke

After watching this video; you will be able to distinguish between the different activities of incident management.

77535
Csslp: Independent Testing Glen E. Clarke

After watching this video; you will be able to recognize characteristics of independent testing.

77529
Csslp: Input Validation Glen E. Clarke

After watching this video; you will be able to recognize examples of using input validation as a defensive coding practice.

77463
Csslp: Integrating With Existing Architectures Neil McIsaac

After watching this video; you will be able to recognize best security practices when integrating with existing architectures.

77439
Csslp: Integrity Neil McIsaac

After watching this video; you will be able to identify the characteristics of integrity.

77386
Csslp: Intellectual Property Chuck Easttom

After watching this video; you will be able to identify best practices for preventing intellectual property theft.

77543
Csslp: Cryptology Glen E. Clarke

After watching this video; you will be able to recognize examples of using cryptology as a defensive coding practice.

77460
Csslp: Cwe Glen E. Clarke

After watching this video; you will be able to locate and list the CWE list of software weaknesses.

77457
Csslp: Data Classification (part 1) Neil McIsaac

After watching this video; you will be able to identify data state categories.

77412
Csslp: Data Classification (part 2) Neil McIsaac

After watching this video; you will be able to identify data usage categories.

77413
Csslp: Data Lifecycle Neil McIsaac

After watching this video; you will be able to distinguish between generation; retention; and disposal.

77417
Csslp: Data Loss Prevention Neil McIsaac

After watching this video; you will be able to recognize characteristics of data loss prevention.

77446
Csslp: Data Ownership Neil McIsaac

After watching this video; you will be able to distinguish between the data owner and data custodian roles.

77414
Csslp: Data Types Neil McIsaac

After watching this video; you will be able to distinguish between structured and unstructured data.

77416
Csslp: Database Security Neil McIsaac

After watching this video; you will be able to distinguish between database security techniques.

77450
Csslp: Declarative Security Neil McIsaac

After watching this video; you will be able to recognize characteristics of declarative security.

77454
Csslp: Defense In Depth Neil McIsaac

After watching this video; you will be able to recognize the characteristics of defense in depth.

77393
Csslp: Deployment Environment Neil McIsaac

After watching this video; you will be able to identify the role of the deployment environment within functional requirements.

77419
Csslp: Deployment Requirements Neil McIsaac

After watching this video; you will be able to identify characteristics of software deployment requirements.

77423
Csslp: Design And Architecture Technical Review Neil McIsaac

After watching this video; you will be able to identify characteristics of design and architecture technical review.

77429
Csslp: Contracts Chuck Easttom

After watching this video; you will be able to identify contracts best practices during supplier transitioning.

77563
Csslp: Contractual Integrity Controls Chuck Easttom

After watching this video; you will be able to identify best practices for contractual integrity controls.

77547
Csslp: Control Identification And Prioritization Neil McIsaac

After watching this video; you will be able to identify characteristics of control identification and prioritization.

77428
Csslp: Corrective Action Glen E. Clarke

After watching this video; you will be able to recognize options for addressing bugs.

77522
Csslp: Credential Management Neil McIsaac

After watching this video; you will be able to recognize characteristics of credential management.

77443
Csslp: Cryptographic Validation Glen E. Clarke

After watching this video; you will be able to recognize characteristics of cryptographic validation.

77518
Csslp: Backup; Recovery; And Archiving Glen E. Clarke

After watching this video; you will be able to recognize characteristics of backup; recovery; and archiving.

77538
Csslp: Bootstrapping Glen E. Clarke

After watching this video; you will be able to identify the role of bootstrapping in deployment activities.

77530
Csslp: Bug Tracking Glen E. Clarke

After watching this video; you will be able to distinguish between bug tracking states.

77483
Csslp: Build Environment Glen E. Clarke

After watching this video; you will be able to identify build-environment best practices.

77474
Csslp: Chain Of Custody Chuck Easttom

After watching this video; you will be able to identify chain of custody best practices.

77555
Csslp: Change Management Glen E. Clarke

After watching this video; you will be able to recognize characteristics of change management.

77537
Csslp: Cloud Architectures Neil McIsaac

After watching this video; you will be able to recognize best practices for securing cloud architectures.

77440
Csslp: Code Analysis Glen E. Clarke

After watching this video; you will be able to distinguish between static and dynamic code analysis.

77476
Csslp: Code Escrow And Data Exports Chuck Easttom

After watching this video; you will be able to identify the purpose of code escrow during supplier transitioning.

77562
Csslp: Code Reuse Plan Best Practice Chuck Easttom

After watching this video; you will be able to identify best practices for creating a practical reuse plan.

77542
Csslp: Code Testing And Verification Chuck Easttom

After watching this video; you will be able to identify code testing and verification options for software development and testing.

77552
Csslp: Complete Mediation Neil McIsaac

After watching this video; you will be able to recognize the characteristics of complete mediation.

77396
Csslp: Completion Criteria Glen E. Clarke

After watching this video; you will be able to list the six generic criteria for judging the suitability of a product.

77525
Csslp: Concurrency Glen E. Clarke

After watching this video; you will be able to recognize examples of using concurrency as a defensive coding practice.

77458
Csslp: Confidentiality Neil McIsaac

After watching this video; you will be able to recognize the characteristics of confidentiality.

77385
Csslp: Configuration Glen E. Clarke

After watching this video; you will be able to recognize examples of using configuration as a defensive coding practice.

77459
Csslp: Configuration Management Process Glen E. Clarke

After watching this video; you will be able to distinguish between the six configuration management process activities.

77532
Csslp: Configuration Management Roles And Plan Glen E. Clarke

After watching this video; you will be able to recognize characteristics of configuration management roles and plan.

77531
Csslp: Configuration Parameter Management Glen E. Clarke

After watching this video; you will be able to recognize characteristics of configuration parameter management as a defensive coding practice.

77470
Csslp: Continuous Testing Glen E. Clarke

After watching this video; you will be able to recognize characteristics of continuous testing.

77520
Comptia Casp Cas-002: User Policies Dan LaChance

In this video; Dan LeChance explains how to use user policies to create a secure network environment; specifically policies related to incident response and forensic tasks.

67932
Comptia Casp Cas-002: Virtual And Cloud Storage Steven Crawford

In this video; Steven Crawford defines how virtual and cloud storage works in CompTIA CASP CAS-002.

67826
Comptia Casp Cas-002: Virtual Private Networks Glen E. Clarke

The CompTIA CASP CAS-200 certification covers how you apply advanced level security skills; including the implementation of various network types. In this video; Glen E. Clarke demonstrates how Virtual Private Networks (VPNs) are used to secure an environment.

67836
Comptia Casp Cas-002: Vm Escape Glen E. Clarke

In this video; Glen E. Clarke discusses virtual machine environment security requirements.

67877
Comptia Casp Cas-002: Vulnerabilities Associated With Virtual Machines

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how the vulnerabilities associated with virtual machines (VMs) will affect network security.

67995
Comptia Casp Cas-002: Web And Nextgen Firewalls Glen E. Clarke

Preparing for the CompTIA CASP CAS-002 exam; you need to know about the application and protocol-aware technologies that are leveraged in networking environments. In this video; Glen Clarke discusses the Web Application Firewall (WAF); NextGen firewall; and Passive Vulnerability Scanner technologies.

67845
Comptia Casp Cas-002: Web Application Security Design Considerations Dan LaChance

In this video; Dan LaChance discusses how web application security design is used to secure network environments in CompTIA CASP CAS-002.

67883
Comptia Casp Cas-002: Web Services Security Dan Lachance

In this video; Dan LaChance discusses how web services security affects network security in CompTIA CASP CAS-002.

67896
Comptia Casp Cas-002: Wild Cards; Ocsp; And Crl Steven Crawford

In this video; Steven Crawford discusses wild cards; OCSP; and CRL in CompTIA CASP CAS-002.

67818
Comptia Casp Cas-002: Zero Day Mitigation And Emergent Threats Steven Crawford

In this video; Steven Crawford; discusses how zero-day and emergent threats can affect network security

67950
Csslp: Accounting Neil McIsaac

After watching this video; you will be able to identify the role of accounting in assuring security .

77389
Csslp: Agile Neil McIsaac

After watching this video; you will be able to identify secure software concepts in the Agile methodology.

77409
Csslp: Anti-tampering Techniques Glen E. Clarke

After watching this video; you will be able to list the steps for code signing.

77477
Csslp: Applicable Methods To Address Core Security Concepts Neil McIsaac

After watching this video; you will be able to distinguish between applicable methods to address core security concepts.

77431
Csslp: Attack Surface Evaluation Neil McIsaac

After watching this video; you will be able to measure and minimize attack surface.

77426
Csslp: Attack Surface Validation Glen E. Clarke

After watching this video; you will be able to recognize characteristics of attack surface validation for software testing.

77484
Csslp: Authentication And Authorization Part 1 Neil McIsaac

After watching this video; you will be able to recognize the characteristics of authentication and authorization.

77388
Csslp: Authentication And Authorization Part 2 Neil McIsaac

After watching this video; you will be able to recognize the characteristics of authentication and authorization.

78944
Csslp: Authentication And Identity Management Neil McIsaac

After watching this video; you will be able to distinguish between characteristics of authentication and identity management.

77442
Csslp: Availability Neil McIsaac

After watching this video; you will be able to identify the characteristics of availability.

77387
Comptia Casp Cas-002: Standards Dan LaChance

In this video; Dan LaChance discusses how standards are used to secure a network environment in CompTIA CASP CAS-002.

67992
Comptia Casp Cas-002: Steganography Steven Crawford

Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines steganography.

67820
Comptia Casp Cas-002: Storage Integration

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how storage integration can be used to aid in securing a network environment.

68004
Comptia Casp Cas-002: Storage Of Sensitive Data Dan LaChance

In this video; Dan LaChance explains the importance of proper storage of sensitive data in network environments in CompTIA CASP CAS-002.

67892
Comptia Casp Cas-002: Strength Vs. Performance Vs. Feasibility To Implement Vs. Interoperability Steven Crawford

Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines strength vs. performance vs. feasibility to implement vs. interoperability.

67823
Comptia Casp Cas-002: System Specific Risk Analysis Glen E. Clarke

When preparing for the CompTIA CASP CAS-002 certification; you need to understand system specific risk analysis. This involves identifying all assets; identifying the threats against those assets; prioritizing the threats; and finally developing mitigation plans for those threats. In this video; Glen E. Clarke demonstrates how to approach a system specific risk analysis.

67916
Comptia Casp Cas-002: System; Audit; And Review Logs

In this video; Glen E. Clarke discusses the importance of logging and auditing when performing incident response.

67943
Comptia Casp Cas-002: Telephony Dan LaChance

In this video; Dan LaChance discusses how telephony must be secured in CompTIA CASP CAS-002.

67981
Comptia Casp Cas-002: Testing And Agile; Waterfall; And Spiral Methodologies Dan LaChance

In this video; Dan LaChance discusses how testing and agile; waterfall; and spiral methodologies are used when securing a networked environment in CompTIA CASP CAS-002.

67988
Comptia Casp Cas-002: The Cia Triad And Non-repudiation Steven Crawford

Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines the CIA triad and non-repudiation.

67816
Comptia Casp Cas-002: The Virtual Desktop Infrastructure Glen E. Clarke

In this video; Glen E. Clarke discusses the security challenges associated with Virtual Desktop Infrastructure.

67880
Comptia Casp Cas-002: Third Party Information Security Glen E. Clarke

When preparing for the CompTIA CASP CAS-002 examination; you’re expected to know about allowing third-party providers access to company data. In this video; Glen E. Clarke discusses security considerations when allowing third-party providers access to company data.

67909
Comptia Casp Cas-002: Tpm; Vtpm; And Hsm Glen E. Clarke

In this video; Glen E. Clarke explains how Hardware Security Modules and Trusted Platform Modules are used to secure network environments.

67882
Comptia Casp Cas-002: Training And Awareness And Employment Termination

The security policy should include specifications on how employees are hired and terminated and trained. In this video; Glen E. Clarke discusses training and awareness policies and employment policies.

67934
Comptia Casp Cas-002: Transport And Data At Rest Encryption Steven Crawford

Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines how to use transport and data at rest encryption.

67813
Comptia Casp Cas-002: Transport Encryption Glen E. Clarke

You can use transport encryption to ensure secure communication with remote systems. In this video; Glen E. Clarke discusses the concept of transport encryption and its advantages.

67839
Comptia Casp Cas-002: Trend Data And Cyber Defense Steven Crawford

In this video; Steven Crawford explains how to use trend data analysis to anticipate the cyber defense aids you may need.

67959
Comptia Casp Cas-002: Trusted Os Glen E. Clarke

In this video; Glen E. Clarke explains how and when a trusted OS configuration would be used to secure a networked environment in CompTIA CASP CAS-002.

67862
Comptia Casp Cas-002: Unified Threat Management Glen E. Clarke

When preparing for the CompTIA CASP CAS-002 examination; you’re expected to know about the security devices and technologies required for Unified Threat Management (UTM). In this video; Glen E. Clarke discusses the concept of UTM; its components; and how UTM can help to secure a network infrastructure.

67842
Comptia Casp Cas-002: Usability; Maintainability; Availability; And Recovery Steven Crawford

In this video; Steven Crawford explains how the usability; maintainability; availability; and recoverability of security devices should be considered.

67963
Comptia Casp Cas-002: Sandboxing And Content Filtering In Cloud Environments Glen E. Clarke

In this video; Glen E. Clarke discusses some cloud-based security features.

67872
Comptia Casp Cas-002: Scada And Industrial Control Systems Glen E. Clarke

The CompTIA CASP CAS-002 certification covers the Supervisory Control and Data Acquisition (SCADA) system which is a system that communicates with other systems for monitoring purposes of remote equipment. SCADA is one type of Industrial Control System (ICS). In this video; Glen Clarke discusses the features of SCADA and where it’s typically used.

67860
Comptia Casp Cas-002: Secure Boot And Measured Launch Glen E. Clarke

In this video; Glen E. Clarke discusses ways of securing the boot environment.

67874
Comptia Casp Cas-002: Secure Coding Standards Dan LaChance

In this video; Dan LaChance explains secure coding standards and how they can be used to increase network security in CompTIA CASP CAS-002.

67898
Comptia Casp Cas-002: Secure Data Flows To Meet Changing Business Needs Dan LaChance

In this video; Dan LaChance explains how secure data flows can be used to meet changing business needs in CompTIA CASP CAS-002.

67991
Comptia Casp Cas-002: Secure Infrastructure Design

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how a secure infrastructure design is used when creating network security plans.

68003
Comptia Casp Cas-002: Secure Use Of On-demand Cloud Computing

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes secure on-demand cloud computing.

67996
Comptia Casp Cas-002: Securing Virtual Environments

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes securing virtual environments.

67999
Comptia Casp Cas-002: Securing Virtualized Servers Dan LaChance

In this video; Dan LeChance discusses securing virtualized servers in network environments in CompTIA CASP CAS-002.

67871
Comptia Casp Cas-002: Security Concerns Of Integrating Diverse Industries Glen E. Clarke

When preparing for the CompTIA CASP CAS-002; you need to interpret business and industry influences and understand associated security risks; such as the security concerns of integrating industries. As different industries have different functionalities and security focuses; when integrating it is essential to ensure rules and policies are merged. In this video; Glen E. Clarke discusses the security issues around this.

67908
Comptia Casp Cas-002: Security Group Policy Implementations Glen E. Clarke

In this video; Glen E. Clarke reviews how security group policy implementations are used to secure network environments in CompTIA CASP CAS-002.

67866
Comptia Casp Cas-002: Security Requirements Traceability Matrix Dan LaChance

In this video; Dan LaChance discusses how to use the Security Requirements Traceability Matrix in CompTIA CASP CAS-002.

67987
Comptia Casp Cas-002: Security Zones Glen E. Clarke

When preparing for the CompTIA CASP CAS-002 examination; you’re expected to know how security zones are used to secure network environments. In this video; Glen E. Clarke discusses security zones; how they operate to control communication between different zones; as well as separate critical assets to secure a network environment.

67855
Comptia Casp Cas-002: Session Management And Input Validation Dan LaChance

In this video; Dan LaChance discusses how session management and input validation can be used to ensure network security in CompTIA CASP CAS-002.

67889
Comptia Casp Cas-002: Snapshots Steven Crawford

Snapshots are an effective and viable backup option from an enterprise security perspective. In this video; Steven Crawford discusses the use of snapshots.

67832
Comptia Casp Cas-002: Soap Dan LaChance

In this video; Dan LaChance discusses how SOAP issues can affect network security in CompTIA CASP CAS-002.

67904
Comptia Casp Cas-002: Software-defined Network Glen E. Clarke

The CompTIA CASP CAS-002 certification covers software-defined networking. You need to be familiar with the Control plane and the Data plane; and how these components communicate using the OpenFlow protocol. In this video; Glen Clarke discusses software-defined networking.

67854
Comptia Casp Cas-002: Sql Injection Dan LaChance

SQL injection attacks can destroy databases. In this video; Dan LaChance explains how SQL injections compromise network security in CompTIA CASP CAS-002.

67888
Comptia Casp Cas-002: Ssl; Ssh; S/mime Steven Crawford

Secure Socket Layer; Secure Shell; and Secure MIME are important protocols in the world of Internet security. In this video; Steven Crawford discusses SSL; SSH; and S/MIME protocols.

67825
Comptia Casp Cas-002: Standard Operating Environment Configuration Baselines Glen E. Clarke

In this video; Glen E. Clarke explains how Standard Operating Environment configuration baselines are used to secure network environments in CompTIA CASP CAS-002.

67865
Comptia Casp Cas-002: Policies; Processes; And Procedures For Change

In this video; Glen E. Clarke discusses the need to update policies and processes or procedures regularly.

67926
Comptia Casp Cas-002: Privacy Principles And Pii

In this video; Glen E. Clarke discusses privacy principles and personally identifiable information.

67931
Comptia Casp Cas-002: Privilege Elevation And Data Remnants Glen E. Clarke

In this video; Glen E. Clarke discusses privilege elevation and data remnants as challenges to network security.

67879
Comptia Casp Cas-002: Prototypes And Testing Steven Crawford

In this video; Steven Crawford discusses how prototypes and testing are used to create network security in CompTIA CASP CAS-002.

67956
Comptia Casp Cas-002: Pseudo Number Generation And Perfect Forward Secrecy Steven Crawford

Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines pseudo number generation and perfect forward secrecy.

67812
Comptia Casp Cas-002: Ra; Soa; And Bia

In this video; Glen E. Clarke discusses the business documents that should be in place in an organization to support its security goals.

67928
Comptia Casp Cas-002: Race Conditions; Resource Exhaustion; And Geo-tagging Dan LaChance

In this video; Dan LaChance discusses how race conditions; resource exhaustion; and geo-tagging can affect network security in CompTIA CASP CAS-002.

67894
Comptia Casp Cas-002: Radius

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes the Remote Authentication Dial In User Service (RADIUS) trust model and how it can be used to help create a secure network environment.

68012
Comptia Casp Cas-002: Reconnaissance; Fingerprinting; And Social Engineering Steven Crawford

In this video; Steven Crawford explains how penetration testing methods should be used to help secure network environments.

67972
Comptia Casp Cas-002: Remote Desktop Protocol And Virtual Network Computing Glen E. Clarke

Remote connection software allows you to access a system from the internet and remotely administer the computer. In this video; Glen E. Clarke discusses the use of Remote Desktop Protocol or RDP and Virtual Network Computing or VNC remote connections software.

67837
Comptia Casp Cas-002: Remote Desktop Services And App-v   Glen E. Clarke

In this video; Glen E. Clarke discusses security features that address challenges associated with two Windows remote technologies: Remote Desktop Services (RDS) and App-V.

67881
Comptia Casp Cas-002: Resources Provisioning And De-provisioning

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how provisioning and de-provisioning of resources affect network security.

67998
Comptia Casp Cas-002: Response And Disclosure

When a data breach occurs; it is essential that the response be swift and efficient; and then the breach must be disclosed. In this video; Glen E. Clarke discusses response and disclosure in data breach situations.

67941
Comptia Casp Cas-002: Return On Investment And Total Cost Of Ownership Glen E. Clarke

The CompTIA CASP CAS-200 certification covers the use of metrics to assess organizational risk as part of assessing the advanced level security skills and knowledge of IT practitioners. In this video; Glen E. Clarke demonstrates how to use two metrics to analyze risk: Return on Investment (ROI) and Total Cost of Ownership (TCO).

67919
Comptia Casp Cas-002: Reverse Engineering Solutions Steven Crawford

In this video; Steven Crawford explains how to deconstruct existing security solutions to improve enterprise security.

67961
Comptia Casp Cas-002: Rfps; Rfqs; Fris; And Agreements Steven Crawford

Clear and precise documentation is crucial to secure application development. In this video; Steven Crawford; discusses the role RFPs; RFQs; FRIs; and agreements that play in network security in CompTIA CASP CAS-002.

67954
Comptia Casp Cas-002: Risk Appetite Strategies Glen E. Clarke

In preparing for the CompTIA CASP CAS-200 certification; you need to perform a risk analysis and interpret the results successfully. In this video; Glen E. Clarke discusses how to handle potential risks to assets if risks have been identified within an organization.

67920
Comptia Casp Cas-002: Risk Management Glen E. Clarke

When preparing for the CompTIA CASP CAS-002 certification; you need to know about risk management. In this video; Glen E. Clarke discusses the risk management process; how to identify threats; and how to ensure improved asset protection.

67906
Comptia Casp Cas-002: Risk Management Processes Glen E. Clarke

When preparing for the CompTIA CASP CAS-002 examination; you’re expected to understand the internal and external influences that could impact the security of a business. In this video; Glen E. Clarke discusses some of the key internal and external influences that could affect an organization’s security.

67921
Comptia Casp Cas-002: Sales Staff And Programmers Dan LaChance

In this video; Dan LaChance discusses the role of sales staff and programmers in network security implementations in CompTIA CASP CAS-002.

67973
Comptia Casp Cas-002: Metrics Collection And Analysis Steven Crawford

In this video; Steven Crawford explains how to ensure the right security metrics are collected and analyzed.

67958
Comptia Casp Cas-002: Mitigation

In this video; Glen E. Clarke discusses mitigation techniques used for data breaches.

67939
Comptia Casp Cas-002: Multipath And Offsite Or Multisite Replication Steven Crawford

In this video; Steven Crawford discusses multipath and offsite or multisite replication in CompTIA CASP CAS-002.

67831
Comptia Casp Cas-002: Nas; San; And Vsan Steven Crawford

In CompTIA CASP CAS-002; you can use different storage devices like Network Attached Storage or NAS; Storage Area Network or SAN; and Virtual Storage Area Network or vSAN for various purposes. In this video; Steven Crawford discusses the NAS; SAN; and vSAN storage options.

67828
Comptia Casp Cas-002: Network Access Control Glen E. Clarke

When preparing for the CompTIA CASP CAS-002 examination; you’re expected to know about network security feature – Network Access Control (NAC) which measures the configuration of connecting clients against a health policy. It then only allows the connection if the client is healthy. In this video; Glen Clarke discusses the features of NAC and the health policy.

67856
Comptia Casp Cas-002: Network Analysis Tools Steven Crawford

In this video; Steven Crawford explains how network analysis tools are used to secure your environment.

67966
Comptia Casp Cas-002: Network Authentication Methods And 802.1x Glen E. Clarke

The CompTIA CASP CAS-002 exam covers advanced levels of security. This includes network authentication and authentication protocols. In this video; Glen E. Clarke discusses the various methods of network authentication; such as passwords; PINs; and smartcards; and the types of authentication protocols which accompany these types.

67840
Comptia Casp Cas-002: Network Management And Monitoring Tools Glen E. Clarke

The CompTIA CASP CAS-002 exam covers the use of network management and monitoring tools in securing network; as well as the types of activities you should monitor. In this video; Glen Clarke discusses the network management and monitoring tools.

67852
Comptia Casp Cas-002: Network Secure Segmentation And Delegation

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how network secure segmentation and delegation can affect network security.

68001
Comptia Casp Cas-002: Networking And Security Components Glen E. Clarke

The CompTIA CASP CAS-002 exam covers how common security components can be used in conjunction to secure a network environment. In this video; Glen E. Clarke discusses how the security features of network switches; wireless controllers; routers; and proxy servers are used collectively to add to the security of an environment.

67847
Comptia Casp Cas-002: Nfs And Cifs Steven Crawford

NAS devices use standard file sharing protocols like network file system and common Internet file system in a file sharing environment. In this video; Steven Crawford explains NFS and CIFS.

67830
Comptia Casp Cas-002: Nips And Nids Glen E. Clarke

Network Intrusion Detection Systems; or NIDS; identify suspicious activities in a network or a system; Network Intrusion Prevention Systems; or NIPS; take corrective action to block that suspicious traffic. In this video; Glen E. Clarke discusses network security with NIPS and NIDS.

67843
Comptia Casp Cas-002: Object Tracking And Containment Technologies Dan LaChance

In this video; Dan LaChance discusses how object tracking and containment technologies are used when securing a network environment in CompTIA CASP CAS-002.

67990
Comptia Casp Cas-002: Ola; Nda; And Bpa

In this video; Glen E. Clarke discusses the three business documents that should be in place to support security in an organization.

67930
Comptia Casp Cas-002: Order Of Volatility

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Glen E. Clarke describes how the Order of Volatility will allow you to recover from security incidents.

67947
Comptia Casp Cas-002: Over-the-air Technologies Dan LaChance

In this video; Dan LaChance discusses how over-the-air technologies can be secured in a network environment in CompTIA CASP CAS-002.

67983
Comptia Casp Cas-002: Passive Reconnaissance And Intelligence Gathering Tools Steven Crawford

In this video; Steven Crawford explains how you can use passive intelligence gathering to make your system less vulnerable to attackers.

67968
Comptia Casp Cas-002: Penetration Testing Steven Crawford

In this video; Steven Crawford explains how to use penetration testing to enhance network security.

67970
Comptia Casp Cas-002: Performance; Latency; Scalability; And Capability Steven Crawford

In this video; Steven Crawford explains how features of network security must meet the business needs of the enterprise.

67962
Comptia Casp Cas-002: Peripheral Restrictions Dan LaChance

In this video; Dan LeChance explains how peripheral restrictions are used to secure network environments in CompTIA CASP CAS-002.

67870
Comptia Casp Cas-002: Issuance And Object Support Steven Crawford

Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines issuance; key escrow; and object support.

67819
Comptia Casp Cas-002: It Governance Glen E. Clarke

When preparing for the CompTIA CASP CAS-002 certification; you need to apply IT governance as part of your advanced level security skills. In this video; Glen E. Clarke discusses the role of IT dovernance when securing information within an organization.

67925
Comptia Casp Cas-002: Java Applets Dan LaChance

Although they have the ability to run cross platform; java applets have a number of security issues. In this video; Dan LaChance discusses how Java applet issues can affect network security in CompTIA CASP CAS-002.

67900
Comptia Casp Cas-002: Javascript And State Management Dan LaChance

In this video; Dan LaChance discusses how JavaScript and state management can affect network security in CompTIA CASP CAS-002.

67905
Comptia Casp Cas-002: Judgment Calls Steven Crawford

In this video; Steven Crawford discusses how security professionals can improve their ability to make good judgment calls.

67965
Comptia Casp Cas-002: Key Stretching And Hashing Steven Crawford

In this video; Steven Crawford discusses key stretching and hashing in CompTIA CASP CAS-002.

67811
Comptia Casp Cas-002: Legal Compliance And Advocacy

In this video; Glen E. Clarke discusses legal compliance when creating and managing security policies.

67927
Comptia Casp Cas-002: Lessons Learned And After-action Reports Steven Crawford

In this video; Steven Crawford discusses the value of after-action reports for enhancing enterprise security.

67964
Comptia Casp Cas-002: Lightweight Direct Access Protocol

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how the Lightweight Direct Access Protocol (LDAP) trust model can be used to help create a secure network environment.

68013
Comptia Casp Cas-002: Likelihood Of Threat Glen E. Clarke

In preparing for the CompTIA CASP CAS-002 exam; you need to understand how to perform a threat assessment. In this video; Glen E. Clarke discusses the process of identifying the likelihood of a threat on the assets of an organization.

67918
Comptia Casp Cas-002: Live Vm Migration Glen E. Clarke

In this video; Glen E. Clarke discusses the security challenges presented by live VM migration.

67878
Comptia Casp Cas-002: Logical And Physical Deployment Diagrams

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how logical and physical deployment diagrams are used to create secure network environments.

68002
Comptia Casp Cas-002: Lun Masking And Hba Allocation Steven Crawford

RAID is a data storage concept that involves a group of disks working as one disk for fault tolerance and better performance. In this video; Steven Crawford explains how to use RAID striping and mirroring.

67834
Comptia Casp Cas-002: Magnitude Of Impact Glen E. Clarke

The CompTIA CASP CAS-002 exam covers an advanced level security skills and knowledge of IT practitioners. In this video; Glen E. Clarke discusses the process of identifying the magnitude of impact a threat can have on IT assets within an organization and explores the formulas that are used to perform a Quantitative Risk Analysis.

67917
Comptia Casp Cas-002: Management And Data Interfaces Glen E. Clarke

In this video; Glen E. Clarke discusses the use of ACLs; VLANs; and authentication servers in providing additional security for network device management in CompTIA CASP CAS-002.

67869
Comptia Casp Cas-002: Management And Finance Dan LaChance

In this video; Dan LaChance discusses the role of management and finance in network security implementations in CompTIA CASP CAS-002.

67975
Comptia Casp Cas-002: Memory Leaks & Buffer And Integer Overflows Dan LaChance

In this video; Dan LaChance discusses how memory leaks; buffer overflows; and integer overflows can damage network security in CompTIA CASP CAS-002.

67893
Comptia Casp Cas-002: Mergers; Acquisitions; And Divestitures

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how mergers; acquisitions; and divestitures can affect network security.

68000
Comptia Casp Cas-002: Mesh Networks Glen E. Clarke

The CompTIA CASP CAS-002 certification covers mesh networking and 80?.1x authentication. Mesh networking includes mush and partial-mesh networks. In this video; Glen Clarke discusses the characteristics of mesh networking and the function of 802.1x authentication for a supplicant accessing a network.

67841
Comptia Casp Cas-002: Iscsi And Fcoe Steven Crawford

Internet Small Computer System Interface or iSCSI is a networking standard that is used to connect remote data storage locations. In this video; Steven Crawford discusses iSCSI and Fiber Channel over Ethernet; or FCoE.

67829
Comptia Casp Cas-002: Fuzzing And Fault Injection Dan LaChance

Fuzzing is a very important part of the system development life cycle. In this video; Dan LaChance explains how fuzzing and fault injection are issues that must be dealt with in network security in CompTIA CASP CAS-002.

67891
Comptia Casp Cas-002: Hash Matching In Cloud Environments Glen E. Clarke

In this video; Glen E. Clarke discusses the benefits of cloud-based hashing.

67873
Comptia Casp Cas-002: Host Based Firewalls And Log Monitoring Glen E. Clarke

The CompTIA CASP CAS-002 exam covers how to select and troubleshoot security controls for hosts; including host-based firewalls and log monitoring. Host-based firewalls control communication to a specific system; while log monitoring systems collect and analyze data as well as notifying users of suspicious activity. In this video; Glen E. Clarke discusses how these can be used to improve security.

67864
Comptia Casp Cas-002: Html5 Dan LaChance

In this video; Dan LaChance discusses how HTML5 issues can affect network security in CompTIA CASP CAS-002.

67903
Comptia Casp Cas-002: Human Resources And Emergency Response Dan LaChance

In this video; Dan LaChance discusses the role of human resources and emergency response in network security implementations in CompTIA CASP CAS-002.

67976
Comptia Casp Cas-002: Hvac Controllers And Sensors Glen E. Clarke

The CompTIA CASP CAS-002 certification covers the Heating; Ventilation and Air Conditioning (HVAC) system which is vital in preventing assets overheating. Proper temperature is key to maintaining the availability of information. In this video; Glen Clarke discusses the features of the HVAC system as well as how layout of server racks can influence temperature control.

67857
Comptia Casp Cas-002: Ia; Isa; Mou; And Sla

In this video; Glen E. Clarke discusses the business documents that should be in place to support the security of your organization.

67929
Comptia Casp Cas-002: Impact Of De-perimeterization Glen E. Clarke

The CompTIA CASP CAS-002 exam covers how constant changing network boundaries impact network security. In this video; Glen E. Clarke discusses network security considerations inherent to an environment where the network boundaries are constantly changing.

67910
Comptia Casp Cas-002: Implications Of Cryptographic Methods And Design Steven Crawford

Cryptography not only protects data being stolen or altered; it can also be used for user authentication. In this video; Steven Crawford explains the implications of cryptographic methods and design in CompTIA CASP CAS-002.

67822
Comptia Casp Cas-002: Incident Response And Forensic Tasks

In this video; Glen E. Clarke explains how to use user policies to create a secure network environment; specifically policies related to incident response and forensic tasks.

67933
Comptia Casp Cas-002: Industry-accepted Application Security Frameworks Dan LaChance

Application security frameworks alleviate the overhead associated with regular tasks performed in application security. In this video; Dan LaChance explains the benefits of accepted application security frameworks in CompTIA CASP CAS-002.

67895
Comptia Casp Cas-002: Ine; Siem; And Hsm Glen E. Clarke

When preparing for the CompTIA CASP CAS-002 exam; you need to know about security technologies that are used to create secure networks. In this video; Glen Clarke discusses the Inline Network Encryptor (INE) device; the Security Information and Event Management (SIEM) software; and the Hardware Security Modules (HSM) device.

67844
Comptia Casp Cas-002: Information Classification Glen E. Clarke

The CompTIA CASP CAS-002 certification assesses your ability to execute risk mitigation planning; strategies and control; including information classification. Information classification is used to place value on types of information so that appropriate protection mechanisms can be assigned. The two major types of classification are governmental and commercial. In this video; Glen E. Clarke discusses information classification techniques and their uses.

67912
Comptia Casp Cas-002: Insecure Direct Object References   Dan LaChance

In this video; Dan LaChance explains how insecure direct object references can compromise network security in CompTIA CASP CAS-002.

67884
Comptia Casp Cas-002: Integrity Measurement Architecture Glen E. Clarke

In this video; Glen E. Clarke discusses how IMA contributes to securing network environments.

67876
Comptia Casp Cas-002: Internal And External Influences Glen E. Clarke

When preparing for the CompTIA CASP CAS-002 examination; you’re expected to understand the internal and external influences that could impact the security of a business. In this video; Glen E. Clarke discusses some of the key internal and external influences that could affect an organization’s security.

67911
Comptia Casp Cas-002: Internal And External Violations

When security incidents occur; part of providing an appropriate level of analysis is considering the impact of internal and external violations on network security. In this video; Glen E. Clarke discusses how internal and external violations affect network security.

67942
Comptia Casp Cas-002: Interoperability Issues

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how interoperability issues affect network security.

67993
Comptia Casp Cas-002: Ip Video And A/v Controls Glen E. Clarke

When preparing for the CompTIA CASP CAS-002 examination; you’re expected to know that networking environments may have IP video equipment and Audio/Visual (A/V) controls connected to them. In this video; Glen Clarke discusses the different types of video equipment available for connection to the network; and the features of each.

67859
Comptia Casp Cas-002: Ipv6 And Associated Transitional Technologies   Glen E. Clarke

In preparation for the CompTIA CASP CAS-002 examination; you should understand the reasons for IPv6 replacing IPv4 and the functioning of IPv6. In this video; Glen Clarke uses discusses the reasons for the transition from IPv4 to IPv6 and highlights ways to make IPv6 addresses more efficient.

67838
Comptia Casp Cas-002: Dedicated Interfaces And Out-of-band Nics Glen E. Clarke

In this video; Glen E. Clarke discusses how dedicated interfaces and out-of-band NICs are used to secure network environments in CompTIA CASP CAS-002.

67868
Comptia Casp Cas-002: Deduplication And Dynamic Disk Pools Steven Crawford

Tiered storage is the hierarchy of storage categories for storing different types of data in different storage. In this video; Steven Crawford discusses tiered storage.

67833
Comptia Casp Cas-002: Desktop Sharing; Remote Assistance; And Presence Dan LaChance

In this video; Dan LaChance discusses how desktop sharing; remote assistance; and presence affect network security in CompTIA CASP CAS-002.

67980
Comptia Casp Cas-002: Detection And Collection

In this video; Glen E. Clarke discusses detection and collection with e-discovery.

67938
Comptia Casp Cas-002: Device Tracking Technologies Dan LaChance

In this video; Dan LaChance discusses how device tracking technologies are used when securing a network environment in CompTIA CASP CAS-002.

67989
Comptia Casp Cas-002: Dns; Cmdb; And Cms

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how Domain Name System (DNS); Configuration Management Database (CMDB); and Content Management System (CMS) are used to aid in creating a secure network environment.

68007
Comptia Casp Cas-002: Drm; Watermarking; And Gpg Steven Crawford

Digital Rights Management or DRM helps to control the illegal duplication of software and digital content. The use of watermarking involves embedding information in digital files in the form of a label. GPG enables you to sign your data transmissions. In this video; Steven Crawford discusses the cryptographic techniques of DRM; watermarking; and GPG.

67824
Comptia Casp Cas-002: Encryption Types Dan LaChance

When preparing for the CompTIA CASP CAS-002 exam; you need to know about the different types of encryption methods available. In this video; Dan LeChance demonstrates Full Disk Encryption using BitLocker and how to encrypt individual files using the Encrypted File System (EFS).

67835
Comptia Casp Cas-002: Endpoint Security Software Glen E. Clarke

The CompTIA CASP CAS-002 exam covers a range of security controls; including endpoint security software. Endpoint security software is software placed at endpoints of a communication channel to secure them; thereby increasing the security posture of the whole network. In this video; Glen E. Clarke discusses the use of endpoint security software and provides several examples.

67861
Comptia Casp Cas-002: End-user Cloud Storage And Business Integration Steven Crawford

In this video; Steven Crawford discusses how end-user cloud storage and business integration can affect network security

67951
Comptia Casp Cas-002: Entropy; Diffusion; And Confusion Steven Crawford

Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines Entropy; Diffusion; and Confusion.

67815
Comptia Casp Cas-002: Error & Exception Handling And Privilege Escalation Dan LaChance

Proper error and exception handling routines are essential to organizational security. In this video; Dan LaChance explains how error and exception handling; along with privilege escalation; are issues that must be dealt with in network security in CompTIA CASP CAS-002.

67890
Comptia Casp Cas-002: Esb; Soa; And Directory Services

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how enterprise application integration enablers help to secure a network environment.

68006
Comptia Casp Cas-002: Existing Security Controls Steven Crawford

In this video; Steven Crawford discusses the methods to evaluate existing security controls.

67960
Comptia Casp Cas-002: Exploitation Tools Steven Crawford

In this video; Steven Crawford explains how exploitation tools can be used for penetration testing.

67967
Comptia Casp Cas-002: Extreme Planning And Worst Case Scenarios Glen E. Clarke

The CompTIA CASP CAS-002 exam covers extreme planning and worst case scenarios in risk management planning. Considering worst case scenarios are essential for disaster planning and developing associated mitigation techniques. In this video; Glen E. Clarke discusses how extreme planning should be approached.

67915
Comptia Casp Cas-002: Facilities And Physical Security Managers Dan LaChance

In this video; Dan LaChance discusses the role of facilities and physical security managers in network security implementations in CompTIA CASP CAS-002.

67977
Comptia Casp Cas-002: Federation

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how federation can help in creating a secure network environment.

68011
Comptia Casp Cas-002: Flash Dan LaChance

In this video; Dan LaChance explains how Flash issues can affect network security in CompTIA CASP CAS-002.

67901
Comptia Casp Cas-002: Forensic Analysis Of A Compromised System

In this video; Glen E. Clarke discusses forensic analysis of a compromised system.

67945
Comptia Casp Cas-002: Collaboration Sites Dan LaChance

In this video; Dan LaChance discusses the need for security when working with collaboration sites in CompTIA CASP CAS-002.

67982
Comptia Casp Cas-002: Command Shell Restrictions Glen E. Clarke

A restricted shell is one in which certain commands that would otherwise be available are disabled. In this video; Glen E. Clarke explains how command shell restrictions are used to secure network environments in CompTIA CASP CAS-002.

67867
Comptia Casp Cas-002: Commissioning; Reuse; And Disposal Dan LaChance

In this video; Dan LaChance discusses how commissioning; reuse; and disposal affect network security in CompTIA CASP CAS-002.

67985
Comptia Casp Cas-002: Complex Network Security Solutions For Data Flow Glen E. Clarke

The CompTIA CASP CAS-002 exam covers complex network security solutions for data flow. This includes two common traffic analysis techniques – SSL Inspection and Network Flow Data. In this video; Glen Clarke discusses the SSL Inspection and Network Flow Data techniques.

67849
Comptia Casp Cas-002: Computer Emergency Response Team Steven Crawford

In this video; Steven Crawford discusses the roles; responsibilities; and reporting requirements of Computer Emergency Response Teams (CERTs).

67952
Comptia Casp Cas-002: Conferencing And Messaging Solutions Dan LaChance

In this video; Dan LaChance discusses how conferencing and messaging solutions are used to secure network environments in CompTIA CASP CAS-002.

67979
Comptia Casp Cas-002: Continuity Of Operation Plan

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Glen E. Clarke discusses the importance of having a Continuity of Operation Plan in place in the event that security incidents occur.

67946
Comptia Casp Cas-002: Continuous Improvement And Monitoring Glen E. Clarke

When preparing for the CompTIA CASP CAS-002 certification; you need to be able to monitor; manage; and improve IT systems within an organization. In this video; Glen E. Clarke discusses the continuous improvement and continuous monitoring of an IT system within an organization.

67923
Comptia Casp Cas-002: Conventions; Threat Actors; & Threat Intelligence Steven Crawford

In this video; Steven Crawford considers how conventions; threats actors; and threat intelligence are used to create network security in CompTIA CASP CAS-002.

67953
Comptia Casp Cas-002: Crm; Erp; And Grc

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how Customer Relationship Management (CRM); Enterprise Resource Planning (ERP); and Governance; Risk Management; and Compliance (GRC) are used to aid in creating a secure network environment.

68005
Comptia Casp Cas-002: Cross-site Request Forgery Dan LaChance

In this video; Dan LaChance explains how cross-site request forgery can compromise network security in CompTIA CASP CAS-002.

67886
Comptia Casp Cas-002: Cross-site Scripting Dan LaChance

Cross-site scripting is a very common application-layer web attack. In this video; Dan LaChance explains how cross-site scripting can compromise network security in CompTIA CASP CAS-002.

67885
Comptia Casp Cas-002: Cryptographic Applications Implementations And Key Escrow Steven Crawford

With Key Escrow when you encrypt something with a secret key; you will store or place another copy of that key in Escrow. In the event that you lose your secret key; the data can be encrypted with the key that you have escrowed somewhere else. In this video; Steven Crawford discusses the implementation of cryptographic applications and Key Escrow.

67821
Comptia Casp Cas-002: Data Aggregation And Isolation

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how data aggregation and isolation are used to aid in securing a network environment.

67997
Comptia Casp Cas-002: Data Loss Prevention And Patch Management Glen E. Clarke

In preparing for the CompTIA CASP CAS-002 exam; you need to implement Data Loss Prevention (DLP) solutions and patch management. DLP solutions are designed to prevent users from sending sensitive data outside an organization. Patch management ensures that systems are kept updated. In this video; Glen E. Clarke discusses the features and uses of these processes.

67863
Comptia Casp Cas-002: Data Recovery And Reconstitution

In this video; Glen E. Clarke discusses data recovery and reconstitution in data breach situations.

67940
Comptia Casp Cas-002: Data Retention; Legal Holds; And Data Recovery

It is important from both a functional and a legal perspective that organizational communications be secured and preserved. In this video; Glen E. Clarke explains how data retention; legal holds; and data recovery are used to help secure a network environment.

67936
Comptia Casp Cas-002: Data Warehousing And Archiving Steven Crawford

Data warehousing is used to make large amounts of data available to users within an organization. In this video; Steven Crawford discusses data warehousing and data archiving.

67827
Comptia Casp Cas-002: Database Activity Monitor Glen E. Clarke

The CompTIA CASP CAS-002 certification includes knowledge of the security components in a network. These include intrusion detection systems; such as the Database Activity Monitor (DAM); which is designed to monitor database activity. In this video; Glen Clarke demonstrates database activity monitors.

67846
Comptia Casp Cas-002: Database And Network Administrators Dan LaChance

In this video; Dan LaChance discusses the role of database and network administrators in network security implementations in CompTIA CASP CAS-002.

67974
Comptia Casp Cas-002: Auditing And Continuous Monitoring

It is critical that your security policy contains additional policies related to the level of monitoring and auditing that should occur within the organization. In this video; Glen E. Clarke discusses auditing and continuous monitoring policies.

67935
Comptia Casp Cas-002: Baselining Of Networking And Security Components Glen E. Clarke

When preparing for the CompTIA CASP CAS-002 examination; you will be expected to know the importance of baselining and monitoring a system; in order to ensure high availability and redundancy. In this video; Glen Clarke demonstrates baselining of networking and security components.

67851
Comptia Casp Cas-002: Benchmarks And Baselines Steven Crawford

In this video; Steven Crawford explains how to use network traffic analysis to create benchmarks to monitor and improve network security.

67955
Comptia Casp Cas-002: Best Practices & New Technologies For Security Systems Steven Crawford

In this video; Steven Crawford discusses policy-based; technology-based; and research-based best practices for securing systems.

67948
Comptia Casp Cas-002: Bios And Unified Extensible Firmware Interface Glen E. Clarke

In this video; Glen E. Clarke introduces the Unified Extensible Firmware Interface (UEFI).

67875
Comptia Casp Cas-002: Black Box; White Box; And Gray Box Testing Steven Crawford

In this video; Steven Crawford discusses the different methods of penetration testing.

67971
Comptia Casp Cas-002: Building Automation; Physical; And Industrial Controls Glen E. Clarke

The CompTIA CASP CAS-002 exam covers physical security features; such as Building Automation System (BAS); physical access controls; and industrial controls. These are key components of a highly secure environment. In this video; Glen Clarke discusses the features of these controls; and provides examples of how they may best be used to provide additional security measures.

67858
Comptia Casp Cas-002: Business Continuity Planning Glen E. Clarke

In preparing for the CompTIA CASP CAS-002 certification; you need to perform business continuity planning; which consists of six phases. In this video; Glen E. Clarke demonstrates the need for business continuity planning and he explains the each of the phases that are involved in the recovery of a business after a disaster.

67924
Comptia Casp Cas-002: Chain Of Custody

In this video; Glen E. Clarke discusses the use of the chain of custody during incident response.

67944
Comptia Casp Cas-002: Chain Of Trust And Root Of Trust Steven Crawford

Root of trust and chain of trust are important concepts in the world of modern network security. In this video; Steven Crawford discusses the modern network security concepts of chain of trust and root of trust.

67817
Comptia Casp Cas-002: Change Management; Operations; And Maintenance Dan LaChance

In this video; Dan LaChance discusses how change management; operations; and maintenance are used to secure network environments in CompTIA CASP CAS-002.

67984
Comptia Casp Cas-002: Cia Aggregate Scores Glen E. Clarke

In preparing for the CompTIA CASP CAS-002 exam; you need to understand how to analyze confidentiality; integrity; and availability (CIA) aggregate scores. CIA aggregate scores help identify the value and associated type of security controls to be placed on assets. In this video; Glen E. Clarke demonstrates how to interpret CIA aggregate scores for security purposes.

67914
Comptia Casp Cas-002: Cia Decisions; Requirements; And Policies Glen E. Clarke

The CompTIA CASP CAS-002 exam covers how to execute risk management strategies and controls. Confidentiality; integrity; and availability (CIA) decisions; requirements and policies are a key aspect of this. CIA is the foundation of security and maintaining CIA is the ultimate goal of information security. In this video; Glen E. Clarke discusses CIA implementation and the controls to facilitate CIA.

67913
Comptia Casp Cas-002: Clickjacking Dan LaChance

Click jacking occurs when an attacker overlays content over a valid webpage invoking completely different code. In this video; Dan la Chance discusses how click jacking can compromise network security in CompTIA CASP CAS-002.

67887
Comptia Casp Cas-002: Client-side Attacks; Vulnerabilities; And Threats Steven Crawford

In this video; Steven Crawford explains how complex network security solutions for data flow are used to secure network environments in CompTIA CASP CAS-002.

67949
Comptia Casp Cas-002: Client-side Processing Vs. Server-side Processing Dan LaChance

In this video; Dan LaChance discusses how client-side processing affects network security in comparison to server-side processing in CompTIA CASP CAS-002.

67897
Comptia Casp Cas-002: Cloud And Virtualization Considerations And Options

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how cloud and virtualized environments affect network security.

67994
Comptia Casp Cas-002: Cloud Managed Networks Glen E. Clarke

In preparing for the CompTIA CASP CAS-002 exam; you need to know about cloud-managed networks and the benefits they have to offer. This includes low cost; high availability; scalability; and low maintenance. In this video; Glen Clarke discusses cloud managed networks and their advantages.

67853
Comptia Casp Cas-002: Code Signing And Digital Signatures Steven Crawford

Cryptography is used to secure messages and hide information from those who would seek to steal it. It endorses unique concepts and techniques to manage security implications associated with enterprise storage. In this video; Steven Crawford defines code signing and digital signatures.

67814
Comptia Casp Cas-002: Collaboration And Guidance Dan LaChance

In this video; Dan LaChance discusses how different business units must collaborate and use security guidance in CompTIA CASP CAS-002.

67978
Cissp: Validating Assessment And Test Strategies Dan Lachance

After watching this video; you will be able to identify best practices when validating assessment and test strategies.

79322
Cissp: Valuating Assets Dan Lachance

After watching this video; you will be able to specify the purpose of valuating assets.

79183
Cissp: Vendor; Consultant; And Contractor Controls Dan Lachance

After watching this video; you will be able to identify best security control practices when partnering with vendors; consultants; and contractors.

79172
Cissp: Versioning And Baselining Dan Lachance

After watching this video; you will be able to describe the role of versioning and baselining in change management.

79393
Cissp: Virtualized Networks Dan Lachance

After watching this video; you will be able to describe the concept of virtualized networks.

79289
Cissp: Voice Dan Lachance

After watching this video; you will be able to describe security options for voice channel in converged and non-converged networks.

79284
Cissp: Vulnerability Assessment Dan Lachance

After watching this video; you will be able to perform a vulnerability assessment.

79323
Cissp: Vulnerability Management Systems Dan Lachance

After watching this video; you will be able to select appropriate vulnerability management systems.

79390
Cissp: Whitelisting And Blacklisting Dan Lachance

After watching this video; you will be able to identify best practices for using whitelisting and blacklisting as a preventative measure.

79378
Cissp: Wireless Networks Dan Lachance

After watching this video; you will be able to describe wireless networking and the options for securing wireless networks.

79277
Comptia Casp Cas-002: Access Control Lists Glen E. Clarke

When preparing for the CompTIA CASP CAS-002 examination; you’re expected to know about Access Control Lists (ACLs); which form a part of network security. An ACL can exist within a file system and network devices such as routers; switches; and wireless access points. In this video; Glen Clarke discusses ACLs and how they determine what traffic passes through a router.

67850
Comptia Casp Cas-002: Active Directory

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how the Active Directory trust model can be used to help create a secure network environment.

68014
Comptia Casp Cas-002: Activex Dan LaChance

In this video; Dan LaChance discusses how ActiveX issues can affect network security in CompTIA CASP CAS-002.

67899
Comptia Casp Cas-002: Advanced Authentication

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how advanced authentication can help in creating a secure network environment.

68008
Comptia Casp Cas-002: Advanced Authorization

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how advanced authorization is used to help create a secure network environment.

68009
Comptia Casp Cas-002: Advanced Configuration Of Network Devices Glen E. Clarke

The CompTIA CASP CAS-002 exam covers common advanced security configuration settings; and security features provided by network devices. In this video; Glen Clarke provides discusses security features; such as transport security; trunk security; route protection; security features on switches and routers; and wireless access points and port forwarding.

67848
Comptia Casp Cas-002: Ajax Dan LaChance

AJAX is a new way to use existing programming standards. In this video; Dan LaChance reviews how Ajax issues can affect network security in CompTIA CASP CAS-002.

67902
Comptia Casp Cas-002: Assessment; Sandboxing; And Debugging Steven Crawford

In this video; Steven Crawford explains some testing methods that can be used to secure your network.

67969
Comptia Casp Cas-002: Asset Control & Data Ownership And Handling

In this video; Glen E. Clarke discusses how asset control; data ownership; and data handling contribute to incident response and recovery procedures.

67937
Comptia Casp Cas-002: Attestation And Identity Propagation

The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. In this video; Dan LaChance describes how attestation and identity propagation can help in creating a secure network environment.

68010
Cissp: Trusted Platform Module (tpm) Dan Lachance

After watching this video; you will be able to identify characteristics of TPM as a security capability within information systems.

79239
Cissp: Unauthorized Physical Access Attacks Dan Lachance

After watching this video; you will be able to describe unauthorized physical access attacks.

79313
Cissp: User Accountability And Session Management Dan Lachance

After watching this video; you will be able to identify areas of accountability with respect to authentication; including session management tasks; such as locking workstations and setting screensaver timeouts.

79303
Cissp: User Role And Responsibilities Dan Lachance

After watching this video; you will be able to identify the role of user in asset security.

79205
Cissp: Using Asset Management For Resource Protection Dan Lachance

After watching this video; you will be able to use hardware and software asset management as a resource protection technique.

79369
Cissp: Using Firewalls As A Preventative Measure Dan Lachance

After watching this video; you will be able to describe best practices for operating and maintaining firewalls as a preventative measure.

79376
Cissp: Using Media Management For Resource Protection Dan Lachance

After watching this video; you will be able to use media management as a resource protection technique.

79368
Cissp: Using Organizational Processes Dan Lachance

After watching this video; you will be able to use organizational processes as a method to apply security governance principles.

79149
Cissp: Using Security Roles And Responsibilities Dan Lachance

After watching this video; you will be able to use security roles and responsibilities as a method to apply security governance principles.

79150
Cissp: Utilities And Hvac Considerations Dan Lachance

After watching this video; you will be able to identify best practices for safely and securely integrating utilities and HVAC systems in the physical environment.

79270
Cissp: The Emo Management Team Dan Lachance

After watching this video; you will be able to identify the key responsibilities of the EMO management team.

79412
Cissp: The Project Scope And Plan Dan Lachance

After watching this video; you will be able to develop and document a project scope and plan.

79167
Cissp: The Systems Development Life Cycle Dan Lachance

After watching this video; you will be able to distinguish between the basic phases of the SDLC.

79420
Cissp: Third-party Assessment And Monitoring Dan Lachance

After watching this video; you will be able to recognize third-party assessment and monitoring techniques for risk mitigation.

79192
Cissp: Third-party Audits Dan Lachance

After watching this video; you will be able to identify best practices for performing third-party audits.

79439
Cissp: Third-party Security Services Dan Lachance

After watching this video; you will be able to identify best practices for using third-party security services as a preventative measure.

79379
Cissp: Training And Awareness Dan Lachance

After watching this video; you will be able to use training and awareness data for security assessment and testing.

79338
Cissp: Trans-border Data Flow Dan Lachance

After watching this video; you will be able to identify characteristics of trans-border data flow issues that pertain to information security.

79159
Cissp: Transmission Media Dan Lachance

After watching this video; you will be able to describe the security characteristic of different choices of network media.

79280
Cissp: Travel Security Policies Dan Lachance

After watching this video; you will be able to identify travel security best practices to incorporate in security policies.

79418
Cissp: Site And Facility Security Assessments Dan Lachance

After watching this video; you will be able to identify elements of site and facility security assessments.

79263
Cissp: Social Engineering Attacks Dan Lachance

After watching this video; you will be able to describe social engineering attacks related to access control.

79312
Cissp: Software Assurance Best Practices Dan Lachance

After watching this video; you will be able to identify the general questions that should be answered as part of an effective software assurance policy.

79436
Cissp: Software Assurance Phases Dan Lachance

After watching this video; you will be able to distinguish between the three major phases of SwA.

79435
Cissp: Software Development Lifecycle Operations Security Dan Lachance

After watching this video; you will be able to identify secure operations and maintenance best practices during the software development lifecycle.

79424
Cissp: Software Environment Security Dan Lachance

After watching this video; you will be able to distinguish between security controls and best practices for the software environment.

79427
Cissp: Software Security Acceptance Testing Dan Lachance

After watching this video; you will be able to describe acceptance testing best practices when assessing the effectiveness of software security.

79434
Cissp: Software Security Risk Analysis And Mitigation Dan Lachance

After watching this video; you will be able to describe risk analysis and mitigation best practices when assessing the effectiveness of software security.

79433
Cissp: Source-code Level Security Vulnerabilities Dan Lachance

After watching this video; you will be able to identify source-code level security vulnerabilities and methods to mitigate risk from them.

79428
Cissp: Spoofing And Vulnerability Attacks Dan Lachance

After watching this video; you will be able to describe spoofing and vulnerability attacks and identify mitigation strategies.

79292
Cissp: Standards Selection Dan Lachance

After watching this video; you will be able to use standards selection to determine appropriate security controls.

79216
Cissp: Storing Media Dan Lachance

After watching this video; you will be able to establish best practices for storing media.

79219
Cissp: Symmetric Cryptography Dan Lachance

After watching this video; you will be able to identify characteristics of symmetric cryptography.

79253
Cissp: Synthetic Transactions Dan Lachance

After watching this video; you will be able to use synthetic transactions as a security control testing technique.

79326
Cissp: System Resilience And Fault Tolerance Requirements Dan Lachance

After watching this video; you will be able to identify best practices for ensuring system resilience and fault tolerance.

79399
Cissp: Systems Security Evaluation Models Dan Lachance

After watching this video; you will be able to distinguish between security evaluation models.

79236
Cissp: Test Coverage Analysis Dan Lachance

After watching this video; you will be able to perform test coverage analysis as part of security control testing.

79329
Cissp: The (isc)2 Code Of Professional Ethics Dan Lachance

After watching this video; you will be able to follow the (ISC)2 Code of Professional Ethics.

79162
Cissp: The Change Management Process Dan Lachance

After watching this video; you will be able to distinguish between the different phases of a change management process.

79392
Cissp: Site And Facility Planning Considerations Dan Lachance

After watching this video; you will be able to identify site and facility design considerations.

79264
Cissp: Securing Physical Assets Dan Lachance

After watching this video; you will be able to describe best practices for securing physical assets.

79358
Cissp: Securing Virtual Assets Dan Lachance

After watching this video; you will be able to describe best practices for securing virtual assets.

79359
Cissp: Security And Patch Information Sources Dan Lachance

After watching this video; you will be able to identify best practices for vetting information required for patch and vulnerability management activities.

79384
Cissp: Security Controls And Metrics Dan Lachance

After watching this video; you will be able to define security controls and metrics as part of a risk management framework.

79334
Cissp: Security Impact Analysis Dan Lachance

After watching this video; you will be able to describe the role of a security impact analysis in change management.

79394
Cissp: Security In Iterative Development Methodologies Dan Lachance

After watching this video; you will be able to describe characteristics of iterative development methodologies and their role in software development security.

79422
Cissp: Security In Non-iterative Development Methodologies Dan Lachance

After watching this video; you will be able to describe characteristics of non-iterative development methodologies and their role in software development security.

79421
Cissp: Security Information And Event Management Dan Lachance

After watching this video; you will be able to describe characteristics of SIEM.

79353
Cissp: Security Investigations Overview Dan Lachance

After watching this video; you will be able to identify characteristics of security investigations.

79342
Cissp: Security Policy Dan Lachance

After watching this video; you will be able to identify best practices for developing and implementing a documented security policy.

79164
Cissp: Security Procedures Dan Lachance

After watching this video; you will be able to identify best practices for developing and implementing documented security procedures.

79166
Cissp: Security Professional Role And Responsibilities Dan Lachance

After watching this video; you will be able to identify the role of security professionals in asset security.

79202
Cissp: Security Standards And Guidelines Dan Lachance

After watching this video; you will be able to identify best practices for developing and implementing documented security standards and guidelines.

79165
Cissp: Security Threats Dan Lachance

After watching this video; you will be able to identify categories of threats that organizations face.

79266
Cissp: Selecting Controls And Countermeasures Dan Lachance

After watching this video; you will be able to identify best practices for selecting controls and countermeasures based on security evaluation models.

79237
Cissp: Selecting Countermeasures Dan Lachance

After watching this video; you will be able to select risk countermeasures.

79178
Cissp: Senior Manager Role And Responsibilities Dan Lachance

After watching this video; you will be able to identify the role of senior managers in asset security.

79201
Cissp: Service-level Agreements In Security Operations Dan Lachance

After watching this video; you will be able to describe the role of service-level agreements in security operations.

79367
Cissp: Service-level Requirements Dan Lachance

After watching this video; you will be able to use an SLA to define appropriate service-level requirements.

79194
Cissp: Securing Networks And Hardware Dan Lachance

After watching this video; you will be able to describe security of networks and hardware network design security considerations.

79279
Cissp: Regulatory Investigation Requirements Dan Lachance

After watching this video; you will be able to identify requirements for regulatory investigations.

79350
Cissp: Remediating Threats Using Technologies Dan Lachance

After watching this video; you will be able to distinguish between different technologies and processes that can be used to remediate threats.

79190
Cissp: Remote Access And Connections Dan Lachance

After watching this video; you will be able to describe remote access options and security considerations for the network.

79286
Cissp: Remote Management And User Technologies Dan Lachance

After watching this video; you will be able to identify remote management and users technologies used in network environments.

79287
Cissp: Reporting Dan Lachance

After watching this video; you will be able to identify best practices for reporting risk management activities and findings.

79184
Cissp: Reporting Test Outputs Dan Lachance

After watching this video; you will be able to identify best practices for reporting security assessment and testing results.

79437
Cissp: Resource Security Through Configuration Management Dan Lachance

After watching this video; you will be able to identify best practices for using configuration management as a technique to secure resources.

79357
Cissp: Restricted And Work Area Security Dan Lachance

After watching this video; you will be able to identify best practices for securing restricted work areas.

79269
Cissp: Reviewing Is Training Information For Relevancy Dan Lachance

After watching this video; you will be able to identify best practices for conducting periodic reviews for content relevancy.

79196
Cissp: Revoking Access Dan Lachance

After watching this video; you will be able to describe the identity access lifecycle revoking access stage.

79318
Cissp: Risk Control Types Dan Lachance

After watching this video; you will be able to distinguish between preventive; detective; and corrective risk control types.

79180
Cissp: Risk Frameworks Dan Lachance

After watching this video; you will be able to identify appropriate risk frameworks.

79186
Cissp: Role-based Access Control Dan Lachance

After watching this video; you will be able to describe the functioning of role-based access control systems.

79309
Cissp: Rule-based Access Control Dan Lachance

After watching this video; you will be able to describe the functioning of rule-based access control systems.

79310
Cissp: Sandboxing Dan Lachance

After watching this video; you will be able to identify best practices for using sandboxing as a preventative measure.

79380
Cissp: Scoping And Tailoring Dan Lachance

After watching this video; you will be able to use scoping and tailoring to determine appropriate security controls.

79215
Cissp: Securing Applications Dan Lachance

After watching this video; you will be able to identify best practices for securing applications.

79361
Cissp: Securing Asset Inventory Dan Lachance

After watching this video; you will be able to identify best practices for securing asset inventory.

79356
Cissp: Securing Cloud Assets Dan Lachance

After watching this video; you will be able to describe best practices for securing cloud assets.

79360
Cissp: Recovery Site Strategies Dan Lachance

After watching this video; you will be able to distinguish between recovery site options.

79397
Cissp: Parallel Testing Dan Lachance

After watching this video; you will be able to identify best practices for performing a parallel test of a recovery plan.

79409
Cissp: Patch Installation And Deployment Dan Lachance

After watching this video; you will be able to describe best practices for patch installation and deployment.

79387
Cissp: Patch Management Audit And Assessment Dan Lachance

After watching this video; you will be able to describe best practices for auditing and assessing patch management activities.

79388
Cissp: Patch Management Consistency And Compliance Dan Lachance

After watching this video; you will be able to describe best practices for ensuring patch management consistency and compliance.

79389
Cissp: Patch Prioritization And Scheduling Dan Lachance

After watching this video; you will be able to describe best practices for patch prioritization and scheduling activities.

79385
Cissp: Patch Testing Dan Lachance

After watching this video; you will be able to describe best practices for patch testing activities.

79386
Cissp: Penetration Testing Dan Lachance

After watching this video; you will be able to use penetration testing as a method for conducting security control testing.

79324
Cissp: Performing Reduction Analysis Dan Lachance

After watching this video; you will be able to identify best practices when performing a reduction analysis.

79189
Cissp: Perimeter Security Controls Dan Lachance

After watching this video; you will be able to identify appropriate perimeter security controls.

79415
Cissp: Personnel Asset Retention Dan Lachance

After watching this video; you will be able to identify best practices to appropriately retain personnel assets.

79213
Cissp: Personnel Security Compliance Policies Dan Lachance

After watching this video; you will be able to identify best practices for establishing personnel security compliance policies.

79173
Cissp: Personnel Security Privacy Policies Dan Lachance

After watching this video; you will be able to identify best practices for implementing personnel security policies.

79174
Cissp: Physical Protection Programs Dan Lachance

After watching this video; you will be able to describe the role of physical protection programs in operational security.

79413
Cissp: Privacy Dan Lachance

After watching this video; you will be able to identify characteristics of privacy issues that pertain to information security.

79160
Cissp: Privacy Requirements Compliance Dan Lachance

After watching this video; you will be able to apply privacy requirement compliance in information system security practices.

79155
Cissp: Provisioning Access Dan Lachance

After watching this video; you will be able to describe the identity access lifecycle provisioning stage.

79317
Cissp: Public Key Infrastructure (pki) Dan Lachance

After watching this video; you will be able to identify characteristics of PKI.

79256
Cissp: Recovery Plan Read-through Dan Lachance

After watching this video; you will be able to identify best practices when performing a recovery plan read-through.

79407
Cissp: Recovery Plan Walkthrough Dan Lachance

After watching this video; you will be able to identify best practices for performing recovery plan walkthroughs.

79408
Cissp: Overview Of Patch And Vulnerability Management Dan Lachance

After watching this video; you will be able to identify the role of patch and vulnerability management in security operations.

79383
Cissp: Misuse Case Testing Dan Lachance

After watching this video; you will be able to use misuse case testing as a security control testing technique.

79328
Cissp: Mitigating Access Control Attacks Dan Lachance

After watching this video; you will be able to describe mitigation strategies for access control attacks.

79315
Cissp: Monitoring And Privacy Policies Dan Lachance

After watching this video; you will be able to identify best practices for incorporating monitoring and privacy considerations in security policies.

79417
Cissp: Monitoring Special Privileges Dan Lachance

After watching this video; you will be able to describe best practices for monitoring special privileges in security operations.

79364
Cissp: Multifactor Authentication Dan Lachance

After watching this video; you will be able to describe authentication factors and the use of multifactor authentication in authentication systems.

79302
Cissp: Multilayer Protocols Dan Lachance

After watching this video; you will be able to describe common protocols and their layer in the relevant models.

79275
Cissp: Multi-level Security Models Dan Lachance

After watching this video; you will be able to identify characteristics of multi-level security models.

79234
Cissp: Multimedia Collaboration Dan Lachance

After watching this video; you will be able to identify options for securing multimedia channels in the network.

79285
Cissp: Multiple Processing Sites Dan Lachance

After watching this video; you will be able to identify characteristics of multiple processing sites.

79398
Cissp: Network Access Control Devices Dan Lachance

After watching this video; you will be able to describe network access control and the components of a NAC system.

79281
Cissp: Network Models Dan Lachance

After watching this video; you will be able to describe the TCP/IP and the OSI network models.

79273
Cissp: Network Security And Vulnerability Management Dan Lachance

After watching this video; you will be able to describe network security management techniques.

79290
Cissp: Nonrepudiation Dan Lachance

After watching this video; you will be able to identify the role of nonrepudiation when applying cryptography.

79260
Cissp: Operational Investigation Requirements Dan Lachance

After watching this video; you will be able to identify requirements for operational investigations.

79347
Cissp: Organizational Code Of Ethics Dan Lachance

After watching this video; you will be able to support an organization’s code of ethics.

79163
Cissp: Outsourcing Considerations Dan Lachance

After watching this video; you will be able to identify best practices for ensuring risk considerations are applied when outsourcing hardware; software and services.

79191
Cissp: Overview Of Change Management In Security Operations Dan Lachance

After watching this video; you will be able to identify the role of change management in security operations.

79391
Cissp: Overview Of Cryptography Dan Lachance

After watching this video; you will be able to describe cryptography features and history.

79341
Cissp: Overview Of Disaster Recovery Dan Lachance

After watching this video; you will be able to identify the role of disaster recovery in security operations.

79400
Cissp: Minimum Security Requirements Dan Lachance

After watching this video; you will be able to identify best practices when establishing minimum security requirements for acquisition activities.

79193
Cissp: Internal Security Controls Dan Lachance

After watching this video; you will be able to identify appropriate internal security measures.

79416
Cissp: Intrusion Detection And Prevention Dan Lachance

After watching this video; you will be able to describe intrusion detection and prevention best practices.

79352
Cissp: Intrusion Detection And Prevention Systems Dan Lachance

After watching this video; you will be able to distinguish between different intrusion detection and prevention systems.

79377
Cissp: Investigation Reporting And Documenting Dan Lachance

After watching this video; you will be able to describe best practices for reporting and documenting investigation activities.

79344
Cissp: Investigative Techniques Dan Lachance

After watching this video; you will be able to distinguish between different investigative techniques.

79345
Cissp: Ip Networks Dan Lachance

After watching this video; you will be able to describe the IP protocol.

79274
Cissp: Job Rotation Dan Lachance

After watching this video; you will be able to describe best practices for using job rotation in security operations.

79365
Cissp: Key Management Practices Dan Lachance

After watching this video; you will be able to identify best practices for key management.

79257
Cissp: Key Performance And Risk Indicators Dan Lachance

After watching this video; you will be able to use key performance and risk indicators data for security assessment and testing.

79336
Cissp: Large-scale Parallel Data Systems Vulnerabilities Dan Lachance

After watching this video; you will be able to identify best practices for assessing and mitigating large-scale parallel data systems vulnerabilities.

79245
Cissp: Legislative And Regulatory Compliance Dan Lachance

After watching this video; you will be able to apply legislative and regulatory compliance requirements to information system security practices.

79154
Cissp: Leveraging Existing Components Dan Lachance

After watching this video; you will be able to apply the secure design principle of leveraging existing components when implementing and managing engineering processes.

79231
Cissp: Licensing And Intellectual Property Dan Lachance

After watching this video; you will be able to identify characteristics of licensing and intellectual property that pertain to information security.

79157
Cissp: Log Reviews Dan Lachance

After watching this video; you will be able to use log reviews as part of security control testing.

79325
Cissp: Malicious Code Attacks Dan Lachance

After watching this video; you will be able to describe the use of malicious code or malware in access control attacks.

79314
Cissp: Marking And Labeling Media Dan Lachance

After watching this video; you will be able to establish best practices for marking and labeling media.

79218
Cissp: Maturity Models Dan Lachance

After watching this video; you will be able to identify characteristics of capability maturity models and their role in software development lifecycle security.

79423
Cissp: Measuring And Monitoring Risk Dan Lachance

After watching this video; you will be able to identify best practices for measuring and monitoring risk.

79182
Cissp: Media Asset Retention Dan Lachance

After watching this video; you will be able to identify best practices to appropriately retain media assets.

79211
Cissp: Memory And Virtualization Dan Lachance

After watching this video; you will be able to distinguish between memory protection and virtualization security capabilities within information systems.

79238
Cissp: Identity Management Implementation Dan Lachance

After watching this video; you will be able to identify implementations of identity management.

79301
Cissp: Identity Providers Dan Lachance

After watching this video; you will be able to identify on-premises identity providers.

79307
Cissp: Identity Registration And Proofing Dan Lachance

After watching this video; you will be able to describe systems for registering identity and assuring identity with a level of certainty.

79304
Cissp: Implementing A Classification Scheme Dan Lachance

After watching this video; you will be able to identify the seven phases of implementing a classification scheme.

79198
Cissp: Implementing Iscm Dan Lachance

After watching this video; you will be able to implement an Information Systems Continuous Monitoring strategy.

79333
Cissp: Implementing Risk Countermeasures And Controls Dan Lachance

After watching this video; you will be able to implement risk countermeasures and controls.

79179
Cissp: Import/export Controls Dan Lachance

After watching this video; you will be able to identify characteristics of import and export controls that pertain to information security.

79158
Cissp: Incident Detection Dan Lachance

After watching this video; you will be able to identify best practices for incident detection.

79370
Cissp: Incident Recovery Dan Lachance

After watching this video; you will be able to identify best practices for incident recovery.

79373
Cissp: Incident Remediation And Lessons Learned Dan Lachance

After watching this video; you will be able to identify best practices for incident remediation.

79374
Cissp: Incident Reporting Dan Lachance

After watching this video; you will be able to identify best practices for incident reporting.

79372
Cissp: Incident Response And Mitigation Dan Lachance

After watching this video; you will be able to identify best practices for incident response and mitigation.

79371
Cissp: Industrial Control Systems Vulnerabilities Dan Lachance

After watching this video; you will be able to identify best practices for assessing and mitigating industrial control systems vulnerabilities.

79248
Cissp: Information Lifecycle And Security Operations Dan Lachance

After watching this video; you will be able to describe the role of the information lifecycle in security operations.

79366
Cissp: Integrated Product Team Dan Lachance

After watching this video; you will be able to describe the purpose and best practices of IPTs and their role in secure software development.

79426
Cissp: Integrity Dan Lachance

After watching this video; you will be able to identify the role of integrity when applying cryptography.

79261
Cissp: Integrity Security Models Dan Lachance

After watching this video; you will be able to identify characteristics of integrity security models.

79233
Cissp: Interface Testing Dan Lachance

After watching this video; you will be able to use interface testing as a security control testing technique.

79330
Cissp: Interfaces Dan Lachance

After watching this video; you will be able to identify characteristics of interfaces as a security capability within information systems.

79240
Cissp: Internal Audits Dan Lachance

After watching this video; you will be able to identify best practices for performing internal audits.

79438
Cissp: Elliptic Curve Cryptography Dan Lachance

After watching this video; you will be able to identify characteristics of elliptic curve cryptography.

79255
Cissp: Employment Agreements And Policies Dan Lachance

After watching this video; you will be able to identify best security practices for employment agreements and policies.

79170
Cissp: Employment Candidate Screening Dan Lachance

After watching this video; you will be able to identify best security practices for screening employee candidates.

79169
Cissp: Employment Termination Processes Dan Lachance

After watching this video; you will be able to identify best security practices for employment termination processes.

79171
Cissp: Endpoint Security Dan Lachance

After watching this video; you will be able to describe local on-device security for network end systems.

79282
Cissp: Evaluating Systems Security Dan Lachance

After watching this video; you will be able to identify characteristics of systems security evaluation.

79235
Cissp: Evidence Collection And Handling Dan Lachance

After watching this video; you will be able to describe best practices for evidence collection and handling.

79343
Cissp: Facility Security Considerations Dan Lachance

After watching this video; you will be able to identify considerations when planning facility security for an organization.

79267
Cissp: Fault Tolerance Dan Lachance

After watching this video; you will be able to identify characteristics of fault tolerance as a security capability within information systems.

79241
Cissp: Fire Issues Dan Lachance

After watching this video; you will be able to identify best practices for preventing; detecting; and suppressing fires and fire-related security risks and damage.

79272
Cissp: Full-interruption Testing Dan Lachance

After watching this video; you will be able to identify best practices for performing full-interruption testing of a recovery plan.

79410
Cissp: Government Classification Levels Dan Lachance

After watching this video; you will be able to distinguish between the five typical government/military classification levels.

79199
Cissp: Hardware Asset Retention Dan Lachance

After watching this video; you will be able to identify best practices to appropriately retain hardware assets.

79212
Cissp: Honeypots And Honeynets Dan Lachance

After watching this video; you will be able to identify best practices for using honeypots and honeynets as a preventative measure.

79381
Cissp: Identifying Threats And Vulnerabilities Dan Lachance

After watching this video; you will be able to identify security threats and vulnerabilities.

79175
Cissp: Identifying Threats Through Threat Modeling Dan Lachance

After watching this video; you will be able to identify threats using threat modeling techniques.

79187
Cissp: Identity Access Lifecycle Dan Lachance

After watching this video; you will be able to describe the identity access lifecycle.

79316
Cissp: Identity Access Regulatory Considerations Dan Lachance

After watching this video; you will be able to describe regulatory considerations for identity and access control systems.

79319
Cissp: Identity And Access Management Best Practice Dan Lachance

After watching this video; you will be able to identify best practice for identity and access management.

79320
Cissp: Electronic Discovery Investigation Requirements Dan Lachance

After watching this video; you will be able to identify requirements for e-Discovery investigations.

79351
Cissp: Determining And Diagramming Potential Attacks Dan Lachance

After watching this video; you will be able to use threat trees to diagram potential attacks.

79188
Cissp: Determining Is Training And Education Requirements Dan Lachance

After watching this video; you will be able to specify appropriate information system training; education and awareness levels for an organization.

79195
Cissp: Developing A Recovery Strategy Dan Lachance

After watching this video; you will be able to identify best practices for developing a recovery strategy.

79395
Cissp: Development Lifecycle Change Management Security Dan Lachance

After watching this video; you will be able to identify secure change management best practices during the software development lifecycle.

79425
Cissp: Digital Forensics Dan Lachance

After watching this video; you will be able to identify characteristics of digital forensics and their role in security investigations.

79346
Cissp: Digital Rights Management Dan Lachance

After watching this video; you will be able to identify best practices for managing digital rights.

79259
Cissp: Digital Signatures Dan Lachance

After watching this video; you will be able to use digital signatures for sending and receiving data.

79258
Cissp: Disaster Recovery And Business Continuity Dan Lachance

After watching this video; you will be able to use disaster recovery and business continuity data for security assessment and testing.

79339
Cissp: Disaster Recovery Assessment Dan Lachance

After watching this video; you will be able to identify best practices for ensuring appropriate event assessment during disaster recovery activities.

79404
Cissp: Disaster Recovery Communications Dan Lachance

After watching this video; you will be able to identify best practices for ensuring adequate communications during disaster recovery activities.

79403
Cissp: Disaster Recovery Personnel Dan Lachance

After watching this video; you will be able to identify best practices for ensuring adequate personnel practices during disaster recovery activities.

79402
Cissp: Disaster Recovery Response Dan Lachance

After watching this video; you will be able to identify best practices for ensuring adequate response during disaster recovery activities.

79401
Cissp: Disaster Recovery Restoration Dan Lachance

After watching this video; you will be able to identify best practices for ensuring restoration during disaster recovery activities.

79405
Cissp: Disaster Recovery Training And Awareness Dan Lachance

After watching this video; you will be able to identify best practices for incorporating disaster recovery training and awareness in security operations.

79406
Cissp: Discretionary And Mandatory Access Controls Dan Lachance

After watching this video; you will be able to identify discretionary and mandatory access controls.

79311
Cissp: Distributed Systems Vulnerabilities Dan Lachance

After watching this video; you will be able to identify best practices for assessing and mitigating distributed systems vulnerabilities.

79246
Cissp: Due Care Dan Lachance

After watching this video; you will be able to apply due care.

79152
Cissp: Due Diligence Dan Lachance

After watching this video; you will be able to apply due diligence.

79153
Cissp: Duress Considerations Dan Lachance

After watching this video; you will be able to describe challenges and best practices for incorporating duress considerations in security policies.

79419
Cissp: Egress Monitoring Dan Lachance

After watching this video; you will be able to describe characteristics of egress monitoring.

79355
Cissp: Crime Prevention Through Environmental Design Dan Lachance

After watching this video; you will be able to describe crime prevention through environmental design when assessing sites and facilities.

79265
Cissp: Criminal Investigation Requirements Dan Lachance

After watching this video; you will be able to identify requirements for criminal investigations.

79348
Cissp: Critical Building Components Dan Lachance

After watching this video; you will be able to identify the critical building components that should be physically located away from main entrances; vehicular circulation; parking; and maintenance areas.

79414
Cissp: Cryptanalytic Attack Methods Dan Lachance

After watching this video; you will be able to distinguish between cryptanalytic attack methods.

79262
Cissp: Cryptographic Life Cycle Dan Lachance

After watching this video; you will be able to recognize characteristics of the cryptographic life cycle.

79252
Cissp: Cryptographic Systems Vulnerabilities Dan Lachance

After watching this video; you will be able to identify best practices for assessing and mitigating cryptographic systems vulnerabilities.

79247
Cissp: Cryptography Dan Lachance

After watching this video; you will be able to use cryptography for determining appropriate security controls.

79217
Cissp: Data Breaches Dan Lachance

After watching this video; you will be able to identify best practices for addressing data breaches that pertain to information security.

79161
Cissp: Data Classification Criteria Dan Lachance

After watching this video; you will be able to distinguish between data classification categories.

79197
Cissp: Data Custodian Role And Responsibilities Dan Lachance

After watching this video; you will be able to identify the role of data custodians in asset security.

79204
Cissp: Data Networks And Communications Dan Lachance

After watching this video; you will be able to identify network types and describe data communication on a network.

79288
Cissp: Data Owner Role And Responsibilities Dan Lachance

After watching this video; you will be able to identify the role of data owners in asset security.

79203
Cissp: Data Owners Role In Privacy Protection Dan Lachance

After watching this video; you will be able to specify data owner best practices to ensure privacy protection.

79207
Cissp: Data Processors And Privacy Protection Dan Lachance

After watching this video; you will be able to specify data processor best practices to ensure privacy protection.

79208
Cissp: Data Remnants And Privacy Protection Dan Lachance

After watching this video; you will be able to specify data remanence best practices to ensure privacy protection.

79209
Cissp: Database Security Vulnerabilities Dan Lachance

After watching this video; you will be able to identify best practices for assessing and mitigating database security vulnerabilities.

79244
Cissp: Delegated Identity Dan Lachance

After watching this video; you will be able to describe delegated identity in the context of authentication systems.

79308
Cissp: Denial Of Service Attacks Dan Lachance

After watching this video; you will be able to describe distributed denial of service attacks and identify mitigation strategies.

79291
Cissp: Designing Assessment And Test Strategies Dan Lachance

After watching this video; you will be able to identify best practices when designing assessment and test strategies.

79321
Cissp: Destruction Of Sensitive Information Dan Lachance

After watching this video; you will be able to establish best practices for destruction of sensitive information.

79220
Cissp: Collection Limitations And Privacy Protection Dan Lachance

After watching this video; you will be able to identify data collection best practices to ensure privacy protection.

79210