01.01-cybersecurity.mp4
01:46
01.02-what_you_should_know.mp4
00:34
02.01-the_elcc_exam.mp4
02:19
02.02-careers_in_information_security.mp4
03:45
02.03-the_value_of_certification.mp4
03:13
02.04-(isc)2_code_of_ethics.mp4
01:44
03.01-confidentiality.mp4
04:17
03.02-integrity.mp4
03:03
03.03-availability.mp4
02:58
03.04-authentication_and_authorization.mp4
03:38
03.05-password_security.mp4
03:21
03.06-multifactor_authentication.mp4
04:21
03.07-non-repudiation.mp4
01:29
03.08-privacy.mp4
03:59
04.01-understanding_risks.mp4
02:55
04.02-risk_assessment.mp4
05:17
04.03-risk_treatment.mp4
04:19
04.04-selecting_security_controls.mp4
05:17
04.05-configuration_management.mp4
02:32
05.01-regulations_and_laws.mp4
02:00
05.02-security_policy_framework.mp4
03:50
05.03-best_practice_security_policies.mp4
03:16
06.01-business_continuity_planning.mp4
03:18
06.02-business_continuity_controls.mp4
03:40
06.03-high_availability_and_fault_tolerance.mp4
05:33
07.01-build_an_incident_response_program.mp4
04:21
07.02-create_an_incident_response_team.mp4
02:15
07.03-incident_communications_plan.mp4
02:35
07.04-incident_identification.mp4
04:00
08.01-disaster_recovery_planning.mp4
04:36
08.02-backups.mp4
04:17
08.03-disaster_recovery_sites.mp4
03:30
08.04-test_bcdr_plans.mp4
03:09
09.01-control_physical_access.mp4
02:54
09.02-design_for_physical_security.mp4
02:20
09.03-visitor_management.mp4
01:33
09.04-physical_security_personnel.mp4
02:16
10.01-account_and_privilege_management.mp4
02:48
10.02-account_monitoring.mp4
03:27
10.03-provisioning_and_deprovisioning.mp4
03:44
10.04-authorization.mp4
04:08
11.01-network_types.mp4
04:01
11.02-introducing_tcpip.mp4
06:08
11.03-ip_addresses_and_dhcp.mp4
04:06
11.04-network_ports.mp4
03:28
11.05-securing_wireless_networks.mp4
04:02
11.06-wireless_encryption.mp4
02:57
11.07-ping_and_traceroute.mp4
06:06
12.01-viruses_worms_and_trojans.mp4
04:14
12.02-botnets.mp4
02:56
12.03-eavesdropping_attacks.mp4
04:07
12.04-implementation_attacks.mp4
01:38
13.01-intrusion_detection_and_prevention.mp4
05:14
13.02-malware_prevention.mp4
03:15
13.03-port_scanners.mp4
02:59
13.04-vulnerability_scanners.mp4
02:11
14.01-data_center_protection.mp4
05:16
14.02-security_zones.mp4
03:54
14.03-routers_and_switches.mp4
02:56
14.04-vlans_and_network_segmentation.mp4
02:19
14.05-firewalls.mp4
06:20
14.06-vpns_and_vpn_concentrators.mp4
04:41
14.07-network_access_control.mp4
04:36
14.08-internet_of_things.mp4
03:06
14.09-securing_iot_devices.mp4
03:08
14.10-network_security_for_smart_devices.mp4
01:58
15.01-what_is_the_cloud.mp4
03:52
15.02-cloud_service_categories.mp4
03:04
15.03-cloud_deployment_models.mp4
02:58
15.04-managed_security_service_providers.mp4
02:36
15.05-manage_vendor_relationships.mp4
04:20
15.06-vendor_agreements.mp4
04:17
16.01-understanding_encryption.mp4
03:11
16.02-symmetric_vs._asymmetric_cryptography.mp4
03:50
16.03-hash_functions.mp4
07:34
16.04-the_data_lifecycle.mp4
04:42
16.05-data_classification.mp4
02:41
16.06-logging_and_monitoring.mp4
03:34
17.01-social_engineering.mp4
05:36
17.02-impersonation_attacks.mp4
05:06
17.03-security_awareness_training.mp4
04:41
18.01-get_ready_for_the_exam.mp4
00:44