01 - Course Overview.mp4
01:48
02 - Introduction.mp4
01:24
03 - The Security Cycle and Standard Operating Procedures.mp4
01:50
04 - Interoperability Agreements and SLAs.mp4
01:39
05 - Business Partner Agreement (BPA).mp4
00:31
06 - Memorandum of Understanding (MOU).mp4
01:33
07 - Interconnection Security Agreement (ISA).mp4
01:22
08 - Importance of Policies in Reducing Risk.mp4
01:35
09 - Mandatory Vacations.mp4
02:18
10 - Separation of Duties.mp4
00:58
11 - Job Rotation.mp4
01:26
12 - Clean Desk, Background Checks, Exit Interviews.mp4
04:06
13 - Data Ownership and User Types.mp4
02:01
14 - Executive Users.mp4
03:07
15 - Social Media Networks _ Applications.mp4
01:35
16 - Personal Email.mp4
01:49
17 - Introduction.mp4
01:15
18 - Module Goal.mp4
00:52
19 - Risk Calculation, MTBF, MTTF, and MTTR.mp4
01:19
20 - BIA Key Terminology, WRT, and MTD.mp4
05:16
21 - Mission Essential Functions.mp4
02:04
22 - Identification of Critical Systems.mp4
02:28
23 - Single Point of Failure.mp4
02:17
24 - Determining Impact.mp4
01:18
25 - Privacy Impact and Threshold Assessments.mp4
03:37
26 - Introduction.mp4
01:30
27 - Threat Assessment.mp4
01:56
28 - Risk Calculation.mp4
01:28
29 - Likelihood of Threat.mp4
00:47
30 - Impact of Threat.mp4
00:39
31 - Qualitative and Quantitative Analysis.mp4
02:43
32 - Loss Calculation Terms and Example.mp4
02:44
33 - Testing.mp4
01:18
34 - Managing Risk.mp4
03:22
35 - Risk Avoidance.mp4
00:56
36 - Change Management.mp4
06:21
37 - Incident Management.mp4
02:20
38 - Module Review.mp4
01:04
39 - Introduction.mp4
00:44
40 - Who Should Watch and Why Should You Care.mp4
02:54
41 - Incident Types and Category Definitions.mp4
04:03
42 - Team Models.mp4
01:16
43 - Staffing Model.mp4
01:15
44 - Outsourcing Considerations.mp4
01:56
45 - Incident Notification and Escalation.mp4
01:57
46 - Notifying Outside Agencies and Communication.mp4
01:30
47 - Exercises.mp4
01:34
48 - Incident Response Process.mp4
01:47
49 - Preparation.mp4
01:34
50 - Detection and Analysis.mp4
03:08
51 - Stopping the Spread, Eradication, and Recovery.mp4
02:40
52 - Module Review.mp4
00:57
53 - Introduction.mp4
00:39
54 - Computer Forensics.mp4
02:32
55 - Order of Volatility.mp4
05:07
56 - Chain of Custody.mp4
02:37
57 - Legal Hold.mp4
01:23
58 - First Responder Best Practices.mp4
05:01
59 - Capture a System Image.mp4
03:35
60 - Network Traffic and Logs.mp4
03:58
61 - Capture Video.mp4
00:59
62 - Record Time Offset.mp4
02:31
63 - Take Hashes.mp4
01:59
64 - Screenshots.mp4
01:05
65 - Witnesses.mp4
01:59
66 - Preservation.mp4
01:36
67 - Recovery.mp4
01:28
68 - Strategic Intelligence_Counterintelligence Gathering.mp4
01:29
69 - Track Man House and Expense.mp4
02:30
70 - Module Review.mp4
00:33
71 - Introduction.mp4
00:45
72 - Backup Plans _ Policies.mp4
01:07
73 - Backup Execution _ Frequency.mp4
01:12
74 - Cold Site, Hot Site, and Warm Site.mp4
02:52
75 - Order or Restoration.mp4
01:42
76 - Backup Types and Incremental vs. Differential.mp4
03:16
77 - Geographic Considerations.mp4
02:42
78 - Business Continuity Planning and Testing.mp4
02:32
79 - Risk Assessment and Continuity of Operations.mp4
02:06
80 - Disaster Recovery.mp4
03:27
81 - IT Contingency Planning.mp4
02:34
82 - Succession Planning.mp4
01:24
83 - Tabletop Exercises.mp4
02:27
84 - Module Overview.mp4
00:31
85 - Introduction.mp4
00:32
86 - Module Goal.mp4
00:51
87 - Threat Types.mp4
01:00
88 - Types of Access Controls.mp4
00:49
89 - Deterrent.mp4
00:29
90 - Preventive.mp4
00:37
91 - Detective.mp4
00:34
92 - Corrective_Recovery and Compensating.mp4
01:26
93 - Security Countermeasures and Module Review.mp4
00:46
94 - Introduction.mp4
00:37
95 - Why Should You Care.mp4
01:47
96 - Non-digital Data Destruction and Burning.mp4
01:30
97 - Shredding.mp4
00:52
98 - Pulping.mp4
00:41
99 - Pulverizing.mp4
00:40
100 - Degaussing.mp4
01:34
101 - Purgin.mp4
00:42
102 - Wiping vs. Deleting.mp4
02:33
103 - Data Classification, PII, and PHI.mp4
02:49
104 - Data Owner.mp4
00:39
105 - Data Steward_Custodian.mp4
01:25
106 - Privacy Officer.mp4
00:35
107 - Data Retention.mp4
01:39
108 - Legal and Compliance.mp4
02:34
comptia-security-plus-risk-management.zip