CISSP® - Security Engineering

К сравнению
В избранное
Артикул:9061939
ВидеоУроки
CISSP® - Security Engineering
Вес
Формат
Год
Тип упаковки
Количество CD
Дополнительные услуги:
В наличии
340
11
Доставка по России
On-line оплата
Система скидок
Всегда на связи
Описание
Характеристики
Отзывы
CISSP® - Security Engineering

Год выпуска: 01/2016
Производитель: Pluralsight
производителя: pluralsight/courses/cissp-security-engineering
Автор: Evan Morgan
Продолжительность: 2:29
Тип раздаваемого материала: Видеоклипы
Язык: Английский
Описание: Deep dive into the Security Engineering domain of the Certified Information Systems Security Professional (CISSP®) certification, including Secure Design Principles and Processes, Fundamental Concepts of Security Models, Security Evaluation Models, Security Capabilities of Information Systems, Vulnerabilities in Security Architecture and Technology Components, Cryptography, and Site and Facility Secure Design

Содержание
Introduction

2m 17s
CISSP® - Security Engineering 0m 48s
What's Security Engineering and What's Next? 1m 29s
Secure Design Principles and Processes

43m 11s
Introduction to Secure Design Principles and Processes 1m 24s
Software/System Design Lifecycle 1m 57s
Requirements Phase 1m 6s
Design Phase 1m 49s
Implementation Phase 0m 50s
Integration and Testing Phase 1m 27s
Transition to Operations Phase 1m 19s
NIST Security Engineering Principles 1m 41s
Security Foundation Principles 3m 35s
Risk Based Principles 5m 58s
Ease of Use Principles 3m 41s
Increase Resilience Principles 7m 40s
Reduce Vulnerabilities Principles 5m 12s
Design with Network in Mind Principles 4m 27s
Summary and What’s Next 1m 0s
Fundamental Concepts of Security Models

19m 21s
Introduction to Fundamental Concepts of Security Models 1m 10s
Type of Security Models 0m 50s
Information Flow Security Model 1m 2s
Matrix-based Security Model 1m 15s
Multi-level Lattice Security Model 0m 42s
Non-interference Security Model 1m 13s
State Machine Security Model 1m 26s
Common Security Model Examples 0m 30s
Bell-LaPadula Confidentiality Security Model 3m 24s
Biba Integrity Security Model 2m 1s
Brewer-Nash (The Chinese Wall) Security Model 0m 32s
Clark Wilson Security Model 0m 38s
Graham-Denning Security Model 0m 41s
Security Architecture Frameworks 0m 45s
The Open Group Architecture Framework (TOGAF) 0m 57s
Zachman Framework 0m 39s
Sherwood Applied Business Security Architecture (SABSA) 0m 40s
Summary and What’s Next 0m 47s
Security Evaluation Models

22m 24s
Introduction to Security Evaluation Models 1m 9s
Certification and Accreditation 1m 4s
Product Evaluation Models 0m 43s
Trusted Computer System Evaluation Criteria (TCSEC) 4m 41s
Information Technology Security Evaluation Criteria (ITSEC) 3m 42s
The Common Criteria 1m 58s
Security Implementation Guidelines 1m 13s
ISO/IEC 27001 and 27002 Security Standards 2m 59s
Control Objects for Information and Related Technology (COBIT) 1m 49s
Payment Card Industry Data Security Standard (PCI-DSS) 2m 15s
Summary and What’s Next 0m 46s
Security Capabilities of Information Systems

8m 49s
Introduction to Security Capabilities of Information Systems 1m 0s
Access Control Mechanisms 0m 49s
Secure Memory Management 1m 31s
State and Layering 0m 51s
Cryptographic Protections 1m 14s
Host Firewalls and Intrusion Prevention 0m 36s
Auditing and Monitoring Controls 0m 57s
Virtualization 1m 7s
Summary and What’s Next 0m 41s
Vulnerabilities in Security Architecture and Technology Components

13m 52s
Introduction to Vulnerabilities in Security Architecture and Technology Components 1m 30s
Completely Secure Any System 1m 9s
Vulnerability Types 3m 2s
The CIA Triad 0m 45s
Security Architecture Vulnerabilities 2m 43s
Technology Component Vulnerabilities 3m 43s
Summary and What’s Next 0m 58s
Cryptography

28m 14s
Introduction to Cryptography 1m 0s
Cryptography Is Typically Bypassed, Not Penetrated 1m 6s
Basic Concept of Cryptography 4m 46s
Cryptography Isn’t New! 2m 25s
The CIA Triad 1m 12s
Key Length 1m 1s
Cipher Types 0m 58s
Forms of Cryptography 1m 12s
Symmetric Cryptography 1m 6s
Data Encryption Standard (DES) 2m 36s
Double DES (2DES) 0m 28s
Triple DES (3DES) 0m 34s
Advanced Encryption Standard (Rijndael) 0m 50s
Asymmetric Cryptography 2m 41s
Hashing Functions 1m 8s
Hashing Attacks 1m 8s
Methods of Cryptanalytic Attacks 1m 27s
Cryptographic Lifecycle 0m 52s
Cryptography Law 0m 51s
Summary and What’s Next 0m 44s
Site and Facility Secure Design

11m 34s
Introduction to Site and Facility Secure Design 1m 0s
Physical Security Control Design 1m 37s
Crime Prevention Through Environmental Design 1m 12s
Physical Security Requirements and Resources 1m 57s
Key Facility Protection Points 0m 20s
Facility Access 1m 30s
Support Equipment Rooms 0m 58s
Server and Technology Component Rooms 0m 42s
Restricted Work Areas 1m 23s
Summary and What’s Next 0m 52s

Файлы примеров: присутствуют
Формат видео: MP4
Видео: AVC, 1280x720, 16:9, 15fps, 212kbps
Аудио: AAC, 44.1kHz, 68.7kbps, stereo
Характеристики
Вес
Формат
Год
Тип упаковки
Количество CD
Отзывов ещё нет — ваш может стать первым.
Все отзывы 0
общий рейтинг
Похожие товары
ВидеоУроки
SecurityTube Metasploit Framework Expert (SMFE) Course Material
SecurityTube Metasploit Framework Expert (SMFE) Course Material
4.1
Отзывов ещё нет
350
В наличии
ВидеоУроки
Router Hacking Series
Router Hacking Series
4.2
Отзывов ещё нет
340
В наличии
ВидеоУроки
Scenario Based Hacking and Penetration Testing
Scenario Based Hacking and Penetration Testing
4.4
Отзывов ещё нет
340
В наличии
ВидеоУроки
iOS Application Penetration Testing Ethical Hacking Domain
iOS Application Penetration Testing Ethical Hacking Domain
4.6
Отзывов ещё нет
350
В наличии
ВидеоУроки
Infrastructure Services for CCNP Routing & Switching 300-115 SWITCH
Infrastructure Services for CCNP Routing & Switching 300-115 SWITCH
4.4
Отзывов ещё нет
340
В наличии
ВидеоУроки
CISSP®: Security Assessment and Testing
CISSP®: Security Assessment and Testing
4.6
Отзывов ещё нет
340
В наличии
ВидеоУроки
ISE BYOD for CCNP Security (300-208) SISAS
ISE BYOD for CCNP Security (300-208) SISAS
4.4
Отзывов ещё нет
340
В наличии
ВидеоУроки
Advanced Persistent Threats: The Big Picture
Advanced Persistent Threats: The Big Picture
4.7
Отзывов ещё нет
340
В наличии
C этим товаром также покупают
Фильм
Прокачай нормальность (2019)
Прокачай нормальность (2019)
4.0
Отзывов ещё нет
250
В наличии
Фильм
Apache bleibt gleich (2022)
Apache bleibt gleich (2022)
4.9
Отзывов ещё нет
250
В наличии
Фильм
Голос волка (2018)
Голос волка (2018)
4.2
Отзывов ещё нет
250
В наличии
Фильм
Подземелья Чикен Карри-24. Черный Геленбург (2024)
Подземелья Чикен Карри-24. Черный Геленбург (2024)
4.4
Отзывов ещё нет
250
В наличии
Фильм
Новая религия (2022)
Новая религия (2022)
4.2
Отзывов ещё нет
250
В наличии
Фильм
Рождественский выбор (ТВ, 2020)
Рождественский выбор (ТВ, 2020)
4.0
Отзывов ещё нет
250
В наличии
Фильм
Mouthpiece (2018)
Mouthpiece (2018)
4.2
Отзывов ещё нет
250
В наличии
Фильм
Lucky Man (2022)
Lucky Man (2022)
4.0
Отзывов ещё нет
250
В наличии