Companies Home Search Profile

MGT414 SANS Training Program for the CISSP Certification

Focused View

25:13:45

179 View
    1. Welcome to Your SANS OnDemand Course
  • 1.mp4
    00:01
  • 2.mp4
    00:01
  • 3.mp4
    00:01
  • 4.mp4
    00:01
  • 5.mp4
    00:01
  • 6.mp4
    00:01
  • 7.mp4
    00:01
  • 8.mp4
    10:36
    1. Overview
  • 1.mp4
    00:36
  • 2.mp4
    00:01
  • 3.mp4
    03:47
  • 4.mp4
    02:34
  • 5.mp4
    02:52
  • 6.mp4
    03:24
  • 7.mp4
    01:07
  • 8.mp4
    04:03
  • 9.mp4
    01:21
  • 10.mp4
    02:27
  • 11.mp4
    01:31
  • 12.mp4
    00:20
  • 13.mp4
    02:33
  • 14.mp4
    00:07
  • 15.mp4
    00:30
  • 16.mp4
    00:08
  • 17.mp4
    01:41
  • 18.mp4
    02:05
  • 19.mp4
    00:33
  • 20.mp4
    01:46
  • 21.mp4
    00:58
  • 22.mp4
    01:11
  • 23.mp4
    00:51
  • 24.mp4
    01:01
  • 25.mp4
    00:22
  • 26.mp4
    00:40
  • 27.mp4
    01:18
    2. Cornerstone security principles
  • 1.mp4
    00:01
  • 2.mp4
    00:23
  • 3.mp4
    08:26
  • 4.mp4
    00:01
  • 5.mp4
    00:01
  • 6.mp4
    00:01
  • 7.mp4
    00:54
  • 8.mp4
    00:26
  • 9.mp4
    02:03
  • 10.mp4
    01:06
  • 11.mp4
    03:24
  • 12.mp4
    02:46
  • 13.mp4
    02:40
  • 14.mp4
    07:27
  • 15.mp4
    03:12
  • 16.mp4
    06:54
  • 17.mp4
    00:29
    3. Risk management
  • 1.mp4
    03:30
  • 2.mp4
    00:28
  • 3.mp4
    03:21
  • 4.mp4
    00:22
  • 5.mp4
    07:09
  • 6.mp4
    01:53
  • 7.mp4
    01:07
  • 8.mp4
    00:14
  • 9.mp4
    03:32
  • 10.mp4
    05:24
  • 11.mp4
    00:24
  • 12.mp4
    00:31
  • 13.mp4
    00:40
  • 14.mp4
    00:22
  • 15.mp4
    00:34
  • 16.mp4
    01:21
  • 17.mp4
    08:36
  • 18.mp4
    00:30
  • 19.mp4
    00:28
  • 20.mp4
    04:45
  • 21.mp4
    00:38
  • 22.mp4
    00:13
  • 23.mp4
    00:17
  • 24.mp4
    00:14
  • 25.mp4
    00:31
  • 26.mp4
    00:38
  • 27.mp4
    00:49
  • 28.mp4
    00:20
  • 29.mp4
    03:58
  • 30.mp4
    01:11
  • 31.mp4
    01:14
  • 32.mp4
    00:29
  • 33.mp4
    05:47
  • 34.mp4
    01:56
  • 35.mp4
    00:10
    4. Risk and acquisition
  • 1.mp4
    00:04
  • 2.mp4
    00:14
  • 3.mp4
    00:20
  • 4.mp4
    04:48
  • 5.mp4
    00:08
  • 6.mp4
    00:55
  • 7.mp4
    00:58
  • 8.mp4
    01:11
  • 9.mp4
    00:31
  • 10.mp4
    00:28
  • 11.mp4
    00:14
  • 12.mp4
    00:20
  • 13.mp4
    00:18
  • 14.mp4
    01:53
  • 15.mp4
    00:17
  • 16.mp4
    01:11
  • 17.mp4
    00:18
  • 18.mp4
    00:47
  • 19.mp4
    00:28
  • 20.mp4
    01:47
  • 21.mp4
    00:35
    5. Threat modeling
  • 1.mp4
    00:04
  • 2.mp4
    00:30
  • 3.mp4
    00:12
  • 4.mp4
    00:17
  • 5.mp4
    00:30
  • 6.mp4
    04:48
  • 7.mp4
    00:21
  • 8.mp4
    00:20
  • 9.mp4
    00:26
  • 10.mp4
    00:18
  • 11.mp4
    00:38
  • 12.mp4
    01:31
  • 13.mp4
    03:30
  • 14.mp4
    03:56
  • 15.mp4
    01:52
  • 16.mp4
    00:31
  • 17.mp4
    01:27
  • 18.mp4
    04:46
  • 19.mp4
    01:16
  • 20.mp4
    00:20
  • 21.mp4
    01:00
  • 22.mp4
    00:50
  • 23.mp4
    00:19
  • 24.mp4
    00:46
  • 25.mp4
    00:14
  • 26.mp4
    00:23
  • 27.mp4
    02:29
  • 28.mp4
    04:35
  • 29.mp4
    00:34
  • 30.mp4
    01:44
  • 31.mp4
    02:12
    6. Legal compliance and privacy
  • 1.mp4
    00:05
  • 2.mp4
    00:16
  • 3.mp4
    03:53
  • 4.mp4
    00:48
  • 5.mp4
    01:29
  • 6.mp4
    01:01
  • 7.mp4
    02:14
  • 8.mp4
    01:35
  • 9.mp4
    01:01
  • 10.mp4
    00:10
  • 11.mp4
    04:32
  • 12.mp4
    01:20
  • 13.mp4
    01:51
  • 14.mp4
    03:06
  • 15.mp4
    00:28
  • 16.mp4
    01:50
  • 17.mp4
    01:40
  • 18.mp4
    00:10
  • 19.mp4
    01:06
  • 20.mp4
    00:43
  • 21.mp4
    03:22
  • 22.mp4
    02:44
  • 23.mp4
    00:12
  • 24.mp4
    00:20
  • 25.mp4
    00:23
  • 26.mp4
    00:24
  • 27.mp4
    00:16
  • 28.mp4
    01:58
  • 29.mp4
    00:28
  • 30.mp4
    03:15
    7. Professional ethics
  • 1.mp4
    00:04
  • 2.mp4
    00:52
  • 3.mp4
    00:39
  • 4.mp4
    00:41
  • 5.mp4
    05:26
  • 6.mp4
    01:31
  • 7.mp4
    00:44
  • 8.mp4
    00:37
  • 9.mp4
    00:19
  • 10.mp4
    01:38
  • 11.mp4
    00:21
  • 12.mp4
    02:44
    8. Security policies procedures and other key documents
  • 1.mp4
    00:01
  • 2.mp4
    00:29
  • 3.mp4
    00:29
  • 4.mp4
    00:11
  • 5.mp4
    00:15
  • 6.mp4
    02:05
  • 7.mp4
    00:51
  • 8.mp4
    00:10
  • 9.mp4
    00:17
  • 10.mp4
    01:26
  • 11.mp4
    01:30
  • 12.mp4
    00:56
  • 13.mp4
    00:30
    9. Personnel security issues security education training and awareness
  • 1.mp4
    00:09
  • 2.mp4
    00:05
  • 3.mp4
    05:21
  • 4.mp4
    03:07
  • 5.mp4
    00:09
  • 6.mp4
    02:34
  • 7.mp4
    00:16
  • 8.mp4
    00:16
  • 9.mp4
    00:16
  • 10.mp4
    00:17
  • 11.mp4
    02:01
  • 12.mp4
    00:10
  • 13.mp4
    00:30
  • 14.mp4
    00:09
  • 15.mp4
    03:19
  • 16.mp4
    00:06
  • 17.mp4
    00:11
  • 18.mp4
    20:01
    10. Quiz
  • 1.mp4
    00:01
    11. Student Course Evaluation Section 1
  • 1.mp4
    00:01
    1. Classify Information and Supporting Assets
  • 1.mp4
    00:01
  • 2.mp4
    02:58
  • 3.mp4
    00:08
  • 4.mp4
    05:35
  • 5.mp4
    00:38
  • 6.mp4
    04:03
  • 7.mp4
    01:36
  • 8.mp4
    00:23
  • 9.mp4
    02:34
    2. Data Privacy and Ownership
  • 1.mp4
    00:05
  • 2.mp4
    07:28
  • 3.mp4
    00:47
  • 4.mp4
    01:21
  • 5.mp4
    00:22
  • 6.mp4
    00:17
  • 7.mp4
    00:20
  • 8.mp4
    01:21
  • 9.mp4
    02:55
  • 10.mp4
    01:59
  • 11.mp4
    00:52
  • 12.mp4
    05:26
  • 13.mp4
    00:55
  • 14.mp4
    00:18
    3. Data Remanence and Retention
  • 1.mp4
    00:05
  • 2.mp4
    00:44
  • 3.mp4
    05:35
  • 4.mp4
    00:16
  • 5.mp4
    00:36
  • 6.mp4
    00:18
  • 7.mp4
    00:36
  • 8.mp4
    00:09
  • 9.mp4
    00:59
  • 10.mp4
    00:34
  • 11.mp4
    01:26
  • 12.mp4
    00:14
  • 13.mp4
    00:41
  • 14.mp4
    02:19
  • 15.mp4
    00:25
    4. Baselines and Best Practices
  • 1.mp4
    00:04
  • 2.mp4
    00:10
  • 3.mp4
    00:18
  • 4.mp4
    03:00
  • 5.mp4
    01:32
  • 6.mp4
    05:39
  • 7.mp4
    00:51
  • 8.mp4
    00:36
  • 9.mp4
    00:11
  • 10.mp4
    03:17
  • 11.mp4
    00:48
  • 12.mp4
    00:26
  • 13.mp4
    01:15
  • 14.mp4
    04:38
  • 15.mp4
    00:26
  • 16.mp4
    00:24
  • 17.mp4
    13:14
    5. Quiz
  • 1.mp4
    00:01
    6. Student Course Evaluation Section 2
  • 1.mp4
    00:01
    1. Security Model Fundamentals
  • 1.mp4
    00:07
  • 2.mp4
    04:00
  • 3.mp4
    00:43
  • 4.mp4
    01:38
  • 5.mp4
    04:18
  • 6.mp4
    00:24
  • 7.mp4
    00:40
  • 8.mp4
    02:45
  • 9.mp4
    03:58
  • 10.mp4
    03:10
  • 11.mp4
    05:38
  • 12.mp4
    04:09
  • 13.mp4
    03:02
  • 14.mp4
    00:14
  • 15.mp4
    00:32
  • 16.mp4
    01:00
    2. Security Evaluation Models
  • 1.mp4
    00:01
  • 2.mp4
    00:09
  • 3.mp4
    04:07
  • 4.mp4
    01:14
  • 5.mp4
    03:47
  • 6.mp4
    02:53
    3. Security Capabilities
  • 1.mp4
    00:01
  • 2.mp4
    00:32
  • 3.mp4
    00:37
  • 4.mp4
    04:00
  • 5.mp4
    01:43
  • 6.mp4
    02:07
  • 7.mp4
    05:42
  • 8.mp4
    02:49
  • 9.mp4
    03:48
  • 10.mp4
    00:17
  • 11.mp4
    00:41
  • 12.mp4
    02:18
  • 13.mp4
    03:23
  • 14.mp4
    00:48
  • 15.mp4
    02:25
  • 16.mp4
    00:42
  • 17.mp4
    00:12
  • 18.mp4
    00:23
  • 19.mp4
    00:13
  • 20.mp4
    02:16
  • 21.mp4
    10:31
  • 22.mp4
    00:30
  • 23.mp4
    00:40
  • 24.mp4
    01:19
    4. Databases Applets and Web Vulnerabilities
  • 1.mp4
    00:01
  • 2.mp4
    00:14
  • 3.mp4
    00:22
  • 4.mp4
    04:43
  • 5.mp4
    01:06
  • 6.mp4
    02:42
  • 7.mp4
    01:17
  • 8.mp4
    00:13
  • 9.mp4
    03:10
  • 10.mp4
    00:35
  • 11.mp4
    00:27
  • 12.mp4
    00:11
  • 13.mp4
    00:07
  • 14.mp4
    00:47
  • 15.mp4
    05:03
  • 16.mp4
    01:13
  • 17.mp4
    00:35
  • 18.mp4
    00:22
  • 19.mp4
    00:58
  • 20.mp4
    00:56
  • 21.mp4
    00:19
  • 22.mp4
    04:01
  • 23.mp4
    06:01
  • 24.mp4
    04:20
  • 25.mp4
    00:09
  • 26.mp4
    00:09
  • 27.mp4
    07:36
    5. Thin Clients and Mobile Systems
  • 1.mp4
    00:01
  • 2.mp4
    00:16
  • 3.mp4
    01:20
  • 4.mp4
    02:47
  • 5.mp4
    00:17
  • 6.mp4
    03:30
  • 7.mp4
    01:31
  • 8.mp4
    02:09
  • 9.mp4
    00:25
  • 10.mp4
    01:05
  • 11.mp4
    00:09
  • 12.mp4
    02:16
    6. Internet of Things and SCADA
  • 1.mp4
    00:01
  • 2.mp4
    00:34
  • 3.mp4
    00:50
  • 4.mp4
    00:28
  • 5.mp4
    00:28
  • 6.mp4
    02:32
  • 7.mp4
    01:08
  • 8.mp4
    01:29
    7. Distributed Systems
  • 1.mp4
    00:01
  • 2.mp4
    01:24
  • 3.mp4
    00:17
  • 4.mp4
    00:11
  • 5.mp4
    00:18
  • 6.mp4
    00:46
    8. Cryptography
  • 1.mp4
    00:04
  • 2.mp4
    00:14
  • 3.mp4
    00:29
  • 4.mp4
    01:15
  • 5.mp4
    01:04
  • 6.mp4
    00:20
  • 7.mp4
    03:40
  • 8.mp4
    00:31
  • 9.mp4
    01:04
  • 10.mp4
    01:11
  • 11.mp4
    00:31
  • 12.mp4
    00:37
  • 13.mp4
    05:01
  • 14.mp4
    00:11
  • 15.mp4
    00:17
  • 16.mp4
    03:13
  • 17.mp4
    00:30
  • 18.mp4
    01:13
  • 19.mp4
    01:09
  • 20.mp4
    06:09
  • 21.mp4
    00:46
  • 22.mp4
    00:40
  • 23.mp4
    01:53
  • 24.mp4
    02:13
  • 25.mp4
    04:12
  • 26.mp4
    01:11
  • 27.mp4
    01:05
  • 28.mp4
    01:31
  • 29.mp4
    00:18
  • 30.mp4
    00:21
  • 31.mp4
    03:07
  • 32.mp4
    04:10
  • 33.mp4
    02:23
  • 34.mp4
    01:35
  • 35.mp4
    00:48
  • 36.mp4
    00:12
  • 37.mp4
    00:14
  • 38.mp4
    07:11
  • 39.mp4
    01:08
  • 40.mp4
    00:22
  • 41.mp4
    01:01
  • 42.mp4
    01:09
  • 43.mp4
    00:23
  • 44.mp4
    00:06
  • 45.mp4
    01:06
  • 46.mp4
    02:47
  • 47.mp4
    01:38
  • 48.mp4
    00:18
  • 49.mp4
    05:42
  • 50.mp4
    00:13
  • 51.mp4
    00:36
  • 52.mp4
    02:07
  • 53.mp4
    01:13
  • 54.mp4
    00:15
  • 55.mp4
    00:44
  • 56.mp4
    05:29
  • 57.mp4
    00:16
  • 58.mp4
    00:26
  • 59.mp4
    00:44
  • 60.mp4
    00:13
  • 61.mp4
    01:23
  • 62.mp4
    05:23
  • 63.mp4
    04:12
  • 64.mp4
    02:25
  • 65.mp4
    00:08
  • 66.mp4
    05:52
  • 67.mp4
    00:39
  • 68.mp4
    00:13
  • 69.mp4
    01:43
  • 70.mp4
    00:38
  • 71.mp4
    00:11
  • 72.mp4
    01:17
  • 73.mp4
    01:05
  • 74.mp4
    05:07
  • 75.mp4
    01:18
  • 76.mp4
    01:05
  • 77.mp4
    00:14
  • 78.mp4
    00:22
  • 79.mp4
    06:41
  • 80.mp4
    05:36
  • 81.mp4
    00:25
  • 82.mp4
    00:11
  • 83.mp4
    01:13
  • 84.mp4
    00:21
    9. Site and Facility Design
  • 1.mp4
    00:05
  • 2.mp4
    00:23
  • 3.mp4
    02:52
  • 4.mp4
    00:10
  • 5.mp4
    01:25
  • 6.mp4
    00:46
  • 7.mp4
    00:43
  • 8.mp4
    00:13
  • 9.mp4
    02:29
  • 10.mp4
    03:07
  • 11.mp4
    01:02
  • 12.mp4
    00:17
  • 13.mp4
    01:07
  • 14.mp4
    00:33
  • 15.mp4
    01:54
  • 16.mp4
    00:28
  • 17.mp4
    01:45
  • 18.mp4
    03:04
  • 19.mp4
    02:12
  • 20.mp4
    00:18
  • 21.mp4
    04:00
  • 22.mp4
    01:29
    10. Physical Security
  • 1.mp4
    00:01
  • 2.mp4
    00:13
  • 3.mp4
    00:13
  • 4.mp4
    00:54
  • 5.mp4
    00:40
  • 6.mp4
    00:17
  • 7.mp4
    00:32
  • 8.mp4
    00:06
  • 9.mp4
    00:19
  • 10.mp4
    00:24
  • 11.mp4
    01:08
  • 12.mp4
    00:13
  • 13.mp4
    01:27
  • 14.mp4
    00:25
  • 15.mp4
    00:47
  • 16.mp4
    02:22
  • 17.mp4
    00:41
  • 18.mp4
    02:30
  • 19.mp4
    00:12
  • 20.mp4
    00:14
  • 21.mp4
    00:12
  • 22.mp4
    02:53
  • 23.mp4
    00:35
  • 24.mp4
    03:55
  • 25.mp4
    00:12
  • 26.mp4
    00:47
  • 27.mp4
    01:02
  • 28.mp4
    01:12
  • 29.mp4
    00:30
  • 30.mp4
    01:12
  • 31.mp4
    01:26
  • 32.mp4
    06:21
    11. Quiz
  • 1.mp4
    00:01
    12. Student Course Evaluation Section 3
  • 1.mp4
    00:01
    1. Network Architecture Design Principles
  • 1.mp4
    00:18
  • 2.mp4
    02:14
  • 3.mp4
    00:01
  • 4.mp4
    00:29
  • 5.mp4
    01:13
  • 6.mp4
    01:55
  • 7.mp4
    00:19
  • 8.mp4
    00:53
  • 9.mp4
    00:21
  • 10.mp4
    00:15
  • 11.mp4
    02:25
  • 12.mp4
    02:22
  • 13.mp4
    00:31
  • 14.mp4
    00:24
  • 15.mp4
    01:40
  • 16.mp4
    02:47
  • 17.mp4
    03:03
  • 18.mp4
    01:55
  • 19.mp4
    05:35
  • 20.mp4
    01:39
  • 21.mp4
    00:29
  • 22.mp4
    00:32
  • 23.mp4
    01:30
  • 24.mp4
    00:27
  • 25.mp4
    02:19
  • 26.mp4
    04:41
  • 27.mp4
    06:05
  • 28.mp4
    02:27
  • 29.mp4
    01:48
  • 30.mp4
    04:00
  • 31.mp4
    00:13
  • 32.mp4
    00:37
  • 33.mp4
    00:31
  • 34.mp4
    01:36
  • 35.mp4
    01:29
  • 36.mp4
    00:45
  • 37.mp4
    05:31
  • 38.mp4
    01:30
  • 39.mp4
    00:40
  • 40.mp4
    00:46
  • 41.mp4
    00:15
  • 42.mp4
    00:31
  • 43.mp4
    04:14
  • 44.mp4
    00:13
  • 45.mp4
    00:18
  • 46.mp4
    00:10
  • 47.mp4
    01:03
  • 48.mp4
    01:50
  • 49.mp4
    00:35
  • 50.mp4
    00:32
    2. Storage Voice and Wireless Protocols
  • 1.mp4
    00:01
  • 2.mp4
    01:53
  • 3.mp4
    00:51
  • 4.mp4
    00:09
  • 5.mp4
    01:03
  • 6.mp4
    00:47
  • 7.mp4
    02:51
  • 8.mp4
    00:42
  • 9.mp4
    00:21
  • 10.mp4
    00:08
  • 11.mp4
    02:20
  • 12.mp4
    00:04
  • 13.mp4
    00:58
  • 14.mp4
    00:14
  • 15.mp4
    00:50
  • 16.mp4
    02:21
  • 17.mp4
    00:16
  • 18.mp4
    00:21
  • 19.mp4
    04:11
  • 20.mp4
    00:22
  • 21.mp4
    02:10
  • 22.mp4
    00:23
  • 23.mp4
    00:16
  • 24.mp4
    02:02
  • 25.mp4
    01:03
  • 26.mp4
    00:30
  • 27.mp4
    02:10
    3. Secure Network Components
  • 1.mp4
    00:05
  • 2.mp4
    00:31
  • 3.mp4
    00:44
  • 4.mp4
    01:32
  • 5.mp4
    00:11
  • 6.mp4
    07:34
  • 7.mp4
    00:38
  • 8.mp4
    00:12
  • 9.mp4
    00:11
  • 10.mp4
    02:13
  • 11.mp4
    01:16
  • 12.mp4
    00:36
  • 13.mp4
    01:07
  • 14.mp4
    01:25
  • 15.mp4
    00:37
  • 16.mp4
    00:22
  • 17.mp4
    00:13
  • 18.mp4
    00:27
  • 19.mp4
    00:45
  • 20.mp4
    01:51
  • 21.mp4
    02:13
  • 22.mp4
    00:44
  • 23.mp4
    00:47
  • 24.mp4
    00:55
  • 25.mp4
    01:00
  • 26.mp4
    03:59
  • 27.mp4
    01:10
  • 28.mp4
    01:33
  • 29.mp4
    01:29
  • 30.mp4
    00:05
  • 31.mp4
    03:02
  • 32.mp4
    00:27
  • 33.mp4
    00:41
  • 34.mp4
    01:32
  • 35.mp4
    05:39
  • 36.mp4
    00:21
  • 37.mp4
    00:45
  • 38.mp4
    03:27
  • 39.mp4
    03:11
  • 40.mp4
    01:19
  • 41.mp4
    00:58
  • 42.mp4
    01:13
  • 43.mp4
    00:13
  • 44.mp4
    00:55
  • 45.mp4
    00:39
    4. Routing
  • 1.mp4
    00:03
  • 2.mp4
    01:37
  • 3.mp4
    00:25
  • 4.mp4
    04:34
  • 5.mp4
    01:46
  • 6.mp4
    01:53
  • 7.mp4
    05:35
  • 8.mp4
    01:16
  • 9.mp4
    09:56
  • 10.mp4
    00:13
  • 11.mp4
    03:42
  • 12.mp4
    00:55
    5. Remote Access and Secure Communications Channels
  • 1.mp4
    00:04
  • 2.mp4
    00:20
  • 3.mp4
    00:28
  • 4.mp4
    05:40
  • 5.mp4
    00:37
  • 6.mp4
    00:20
  • 7.mp4
    00:47
  • 8.mp4
    00:17
  • 9.mp4
    01:20
  • 10.mp4
    02:52
    6. Network Authentication
  • 1.mp4
    00:01
  • 2.mp4
    00:24
  • 3.mp4
    00:07
  • 4.mp4
    00:40
  • 5.mp4
    01:01
  • 6.mp4
    00:34
  • 7.mp4
    00:22
  • 8.mp4
    01:11
  • 9.mp4
    00:36
  • 10.mp4
    00:53
  • 11.mp4
    00:42
  • 12.mp4
    02:16
  • 13.mp4
    02:25
  • 14.mp4
    01:21
  • 15.mp4
    03:27
  • 16.mp4
    10:41
    7. Quiz
  • 1.mp4
    00:01
    8. Student Course Evaluation Section 4
  • 1.mp4
    00:01
    1. Identification and Authentication
  • 1.mp4
    00:06
  • 2.mp4
    01:42
  • 3.mp4
    00:17
  • 4.mp4
    00:21
  • 5.mp4
    02:01
  • 6.mp4
    00:36
  • 7.mp4
    00:18
  • 8.mp4
    00:21
  • 9.mp4
    02:46
  • 10.mp4
    03:38
  • 11.mp4
    00:10
  • 12.mp4
    00:11
  • 13.mp4
    01:35
  • 14.mp4
    00:07
  • 15.mp4
    02:23
  • 16.mp4
    01:34
  • 17.mp4
    01:20
  • 18.mp4
    00:06
  • 19.mp4
    00:10
  • 20.mp4
    02:13
  • 21.mp4
    02:12
  • 22.mp4
    02:14
  • 23.mp4
    00:16
  • 24.mp4
    01:34
  • 25.mp4
    00:22
    2. Biometrics and Single SignOn
  • 1.mp4
    00:01
  • 2.mp4
    04:18
  • 3.mp4
    00:09
  • 4.mp4
    03:01
  • 5.mp4
    00:53
  • 6.mp4
    01:53
  • 7.mp4
    03:03
  • 8.mp4
    00:49
  • 9.mp4
    00:18
  • 10.mp4
    00:24
  • 11.mp4
    06:08
  • 12.mp4
    00:42
  • 13.mp4
    01:22
  • 14.mp4
    00:19
  • 15.mp4
    00:38
    3. Federated and Cloud Identity
  • 1.mp4
    00:01
  • 2.mp4
    00:21
  • 3.mp4
    00:16
  • 4.mp4
    00:36
  • 5.mp4
    00:27
  • 6.mp4
    00:22
  • 7.mp4
    00:26
  • 8.mp4
    01:06
  • 9.mp4
    00:22
    4. Implement and Manage Authorization Mechanisms
  • 1.mp4
    00:01
  • 2.mp4
    00:53
  • 3.mp4
    01:30
  • 4.mp4
    00:22
  • 5.mp4
    00:23
  • 6.mp4
    02:27
  • 7.mp4
    00:13
  • 8.mp4
    00:50
  • 9.mp4
    03:35
  • 10.mp4
    04:33
  • 11.mp4
    03:51
  • 12.mp4
    00:22
  • 13.mp4
    03:01
  • 14.mp4
    00:56
  • 15.mp4
    01:00
  • 16.mp4
    00:44
  • 17.mp4
    00:36
  • 18.mp4
    00:55
  • 19.mp4
    00:22
    5. Quiz
  • 1.mp4
    00:01
    6. Student Course Evaluation Section 5
  • 1.mp4
    00:01
    1. Security Assessment Strategies
  • 1.mp4
    00:06
  • 2.mp4
    01:13
  • 3.mp4
    04:53
  • 4.mp4
    01:19
  • 5.mp4
    01:11
  • 6.mp4
    05:11
    2. Technical Security Testing
  • 1.mp4
    00:04
  • 2.mp4
    00:12
  • 3.mp4
    00:37
  • 4.mp4
    00:52
  • 5.mp4
    00:57
  • 6.mp4
    01:49
  • 7.mp4
    01:00
  • 8.mp4
    00:22
  • 9.mp4
    00:15
  • 10.mp4
    00:29
  • 11.mp4
    00:08
  • 12.mp4
    05:31
  • 13.mp4
    00:10
  • 14.mp4
    00:13
  • 15.mp4
    03:32
  • 16.mp4
    00:48
  • 17.mp4
    00:05
  • 18.mp4
    05:51
  • 19.mp4
    00:08
  • 20.mp4
    00:52
  • 21.mp4
    00:18
  • 22.mp4
    00:16
  • 23.mp4
    00:27
  • 24.mp4
    00:22
  • 25.mp4
    00:30
  • 26.mp4
    03:41
  • 27.mp4
    01:47
  • 28.mp4
    00:44
    3. Security Audits and Key Security Processes
  • 1.mp4
    00:05
  • 2.mp4
    01:11
  • 3.mp4
    05:02
  • 4.mp4
    00:34
  • 5.mp4
    00:11
  • 6.mp4
    02:45
  • 7.mp4
    00:58
  • 8.mp4
    01:52
  • 9.mp4
    00:21
  • 10.mp4
    13:28
    4. Quiz
  • 1.mp4
    00:01
    5. Student Course Evaluation Section 6
  • 1.mp4
    00:01
    1. Secure Resource Provisioning
  • 1.mp4
    00:06
  • 2.mp4
    03:23
  • 3.mp4
    00:15
  • 4.mp4
    00:11
  • 5.mp4
    02:14
  • 6.mp4
    00:13
  • 7.mp4
    01:49
  • 8.mp4
    00:14
  • 9.mp4
    00:23
  • 10.mp4
    08:01
  • 11.mp4
    00:11
  • 12.mp4
    00:14
  • 13.mp4
    00:17
  • 14.mp4
    00:16
  • 15.mp4
    01:07
  • 16.mp4
    00:28
  • 17.mp4
    04:25
  • 18.mp4
    00:21
  • 19.mp4
    00:30
  • 20.mp4
    03:16
  • 21.mp4
    00:08
  • 22.mp4
    00:28
  • 23.mp4
    00:14
  • 24.mp4
    00:17
  • 25.mp4
    00:21
  • 26.mp4
    00:44
  • 27.mp4
    03:55
  • 28.mp4
    00:27
  • 29.mp4
    00:48
  • 30.mp4
    01:28
  • 31.mp4
    00:39
  • 32.mp4
    00:14
  • 33.mp4
    00:33
  • 34.mp4
    00:28
  • 35.mp4
    00:27
  • 36.mp4
    00:57
    2. Change Patch and Vulnerability Management
  • 1.mp4
    00:01
  • 2.mp4
    00:12
  • 3.mp4
    00:29
  • 4.mp4
    08:35
  • 5.mp4
    00:15
  • 6.mp4
    07:22
  • 7.mp4
    00:38
  • 8.mp4
    01:47
  • 9.mp4
    00:11
    3. Preventive Measures
  • 1.mp4
    00:04
  • 2.mp4
    00:05
  • 3.mp4
    00:09
  • 4.mp4
    00:37
  • 5.mp4
    00:09
  • 6.mp4
    00:42
  • 7.mp4
    00:32
  • 8.mp4
    00:46
  • 9.mp4
    01:02
  • 10.mp4
    05:13
  • 11.mp4
    00:34
  • 12.mp4
    00:23
  • 13.mp4
    02:45
  • 14.mp4
    00:41
  • 15.mp4
    00:28
  • 16.mp4
    01:25
  • 17.mp4
    01:24
  • 18.mp4
    01:58
  • 19.mp4
    04:30
  • 20.mp4
    01:44
  • 21.mp4
    00:27
  • 22.mp4
    00:55
  • 23.mp4
    01:36
  • 24.mp4
    02:17
    4. Detection Logging and Monitoring
  • 1.mp4
    00:05
  • 2.mp4
    00:27
  • 3.mp4
    06:11
  • 4.mp4
    00:31
  • 5.mp4
    00:43
  • 6.mp4
    03:26
  • 7.mp4
    01:01
  • 8.mp4
    03:34
  • 9.mp4
    03:49
  • 10.mp4
    05:54
  • 11.mp4
    03:13
  • 12.mp4
    01:29
  • 13.mp4
    02:12
  • 14.mp4
    02:08
  • 15.mp4
    00:20
  • 16.mp4
    07:25
    5. Incident Response
  • 1.mp4
    00:01
  • 2.mp4
    00:07
  • 3.mp4
    01:05
  • 4.mp4
    09:03
  • 5.mp4
    00:47
  • 6.mp4
    00:26
  • 7.mp4
    00:23
  • 8.mp4
    00:52
  • 9.mp4
    01:05
  • 10.mp4
    00:29
  • 11.mp4
    00:58
  • 12.mp4
    00:53
  • 13.mp4
    03:08
  • 14.mp4
    05:16
  • 15.mp4
    00:57
  • 16.mp4
    03:27
  • 17.mp4
    00:56
  • 18.mp4
    00:42
  • 19.mp4
    04:10
  • 20.mp4
    00:17
  • 21.mp4
    00:42
  • 22.mp4
    00:13
    6. Investigations and eDiscovery
  • 1.mp4
    00:01
  • 2.mp4
    00:28
  • 3.mp4
    00:45
  • 4.mp4
    00:09
  • 5.mp4
    00:29
  • 6.mp4
    00:38
  • 7.mp4
    00:25
  • 8.mp4
    00:36
  • 9.mp4
    00:57
  • 10.mp4
    00:15
  • 11.mp4
    00:30
  • 12.mp4
    00:18
  • 13.mp4
    01:06
  • 14.mp4
    01:00
  • 15.mp4
    00:12
  • 16.mp4
    00:20
  • 17.mp4
    01:11
  • 18.mp4
    00:14
  • 19.mp4
    00:12
    7. Resiliency Disaster Recovery and Business Continuity
  • 1.mp4
    00:01
  • 2.mp4
    00:46
  • 3.mp4
    03:50
  • 4.mp4
    00:27
  • 5.mp4
    01:15
  • 6.mp4
    00:31
  • 7.mp4
    00:18
  • 8.mp4
    00:14
  • 9.mp4
    01:20
  • 10.mp4
    00:23
  • 11.mp4
    00:50
  • 12.mp4
    00:10
  • 13.mp4
    00:40
  • 14.mp4
    00:24
  • 15.mp4
    02:23
  • 16.mp4
    00:12
  • 17.mp4
    00:17
  • 18.mp4
    00:15
  • 19.mp4
    00:32
  • 20.mp4
    03:04
  • 21.mp4
    01:51
  • 22.mp4
    01:13
  • 23.mp4
    00:37
  • 24.mp4
    00:12
  • 25.mp4
    00:28
  • 26.mp4
    00:08
  • 27.mp4
    00:13
  • 28.mp4
    01:01
  • 29.mp4
    02:07
  • 30.mp4
    00:36
  • 31.mp4
    01:06
  • 32.mp4
    00:50
  • 33.mp4
    00:33
  • 34.mp4
    01:45
  • 35.mp4
    00:19
  • 36.mp4
    00:46
  • 37.mp4
    02:03
  • 38.mp4
    00:47
  • 39.mp4
    03:35
  • 40.mp4
    01:15
  • 41.mp4
    02:31
  • 42.mp4
    03:57
  • 43.mp4
    00:13
  • 44.mp4
    00:21
  • 45.mp4
    00:14
  • 46.mp4
    00:26
  • 47.mp4
    01:00
    8. Quiz
  • 1.mp4
    00:01
    9. Student Course Evaluation Section 7
  • 1.mp4
    00:01
    1. Software and Security Development Lifecycle
  • 1.mp4
    00:07
  • 2.mp4
    02:24
  • 3.mp4
    03:52
  • 4.mp4
    00:34
  • 5.mp4
    11:20
  • 6.mp4
    00:40
  • 7.mp4
    00:08
  • 8.mp4
    00:52
  • 9.mp4
    05:07
  • 10.mp4
    01:12
  • 11.mp4
    02:45
  • 12.mp4
    00:15
  • 13.mp4
    01:33
  • 14.mp4
    02:02
  • 15.mp4
    02:26
  • 16.mp4
    00:47
  • 17.mp4
    02:40
  • 18.mp4
    00:15
  • 19.mp4
    01:09
  • 20.mp4
    03:27
  • 21.mp4
    00:16
    2. Software Environment and Security Controls
  • 1.mp4
    00:01
  • 2.mp4
    00:10
  • 3.mp4
    02:38
  • 4.mp4
    00:41
  • 5.mp4
    00:09
  • 6.mp4
    05:07
  • 7.mp4
    08:25
  • 8.mp4
    00:27
  • 9.mp4
    00:11
  • 10.mp4
    00:51
  • 11.mp4
    00:13
  • 12.mp4
    01:03
  • 13.mp4
    00:37
  • 14.mp4
    02:05
  • 15.mp4
    01:01
  • 16.mp4
    00:36
  • 17.mp4
    01:04
  • 18.mp4
    00:09
  • 19.mp4
    00:36
  • 20.mp4
    00:21
  • 21.mp4
    01:54
  • 22.mp4
    00:19
  • 23.mp4
    01:04
  • 24.mp4
    00:20
  • 25.mp4
    00:19
  • 26.mp4
    00:14
  • 27.mp4
    00:06
    3. Software Security Testing
  • 1.mp4
    00:04
  • 2.mp4
    00:09
  • 3.mp4
    00:28
  • 4.mp4
    00:20
  • 5.mp4
    00:17
  • 6.mp4
    28:49
    4. Quiz
  • 1.mp4
    00:01
    5. Student Course Evaluation Section 8
  • 1.mp4
    00:01

More details


User Reviews
Rating
0
0
0
0
0
average 0
Total votes0
Focused display
The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing.
  • language english
  • Training sessions 1019
  • duration 25:13:45
  • Release Date 2023/06/16

Courses related to CISSP - Certified Information Systems Security Professional

Courses related to Cyber Security