Pluralsight - CISSP - Security Engineeringseeders: 0
leechers: 1
Pluralsight - CISSP - Security Engineering (Size: 290.52 MB)
DescriptionDeep dive into the Security Engineering domain of the Certified Information Systems Security Professional (CISSP®) certification, including Secure Design Principles and Processes, Fundamental Concepts of Security Models, Security Evaluation Models, Security Capabilities of Information Systems, Vulnerabilities in Security Architecture and Technology Components, Cryptography, and Site and Facility Secure Design Introduction 2m 17s CISSP® - Security Engineering 0m 48s What's Security Engineering and What's Next? 1m 29s Secure Design Principles and Processes 43m 11s Introduction to Secure Design Principles and Processes 1m 24s Software/System Design Lifecycle 1m 57s Requirements Phase 1m 6s Design Phase 1m 49s Implementation Phase 0m 50s Integration and Testing Phase 1m 27s Transition to Operations Phase 1m 19s NIST Security Engineering Principles 1m 41s Security Foundation Principles 3m 35s Risk Based Principles 5m 58s Ease of Use Principles 3m 41s Increase Resilience Principles 7m 40s Reduce Vulnerabilities Principles 5m 12s Design with Network in Mind Principles 4m 27s Summary and What’s Next 1m 0s Fundamental Concepts of Security Models 19m 21s Introduction to Fundamental Concepts of Security Models 1m 10s Type of Security Models 0m 50s Information Flow Security Model 1m 2s Matrix-based Security Model 1m 15s Multi-level Lattice Security Model 0m 42s Non-interference Security Model 1m 13s State Machine Security Model 1m 26s Common Security Model Examples 0m 30s Bell-LaPadula Confidentiality Security Model 3m 24s Biba Integrity Security Model 2m 1s Brewer-Nash (The Chinese Wall) Security Model 0m 32s Clark Wilson Security Model 0m 38s Graham-Denning Security Model 0m 41s Security Architecture Frameworks 0m 45s The Open Group Architecture Framework (TOGAF) 0m 57s Zachman Framework 0m 39s Sherwood Applied Business Security Architecture (SABSA) 0m 40s Summary and What’s Next 0m 47s Security Evaluation Models 22m 24s Introduction to Security Evaluation Models 1m 9s Certification and Accreditation 1m 4s Product Evaluation Models 0m 43s Trusted Computer System Evaluation Criteria (TCSEC) 4m 41s Information Technology Security Evaluation Criteria (ITSEC) 3m 42s The Common Criteria 1m 58s Security Implementation Guidelines 1m 13s ISO/IEC 27001 and 27002 Security Standards 2m 59s Control Objects for Information and Related Technology (COBIT) 1m 49s Payment Card Industry Data Security Standard (PCI-DSS) 2m 15s Summary and What’s Next 0m 46s Security Capabilities of Information Systems 8m 49s Introduction to Security Capabilities of Information Systems 1m 0s Access Control Mechanisms 0m 49s Secure Memory Management 1m 31s State and Layering 0m 51s Cryptographic Protections 1m 14s Host Firewalls and Intrusion Prevention 0m 36s Auditing and Monitoring Controls 0m 57s Virtualization 1m 7s Summary and What’s Next 0m 41s Vulnerabilities in Security Architecture and Technology Components 13m 52s Introduction to Vulnerabilities in Security Architecture and Technology Components 1m 30s Completely Secure Any System 1m 9s Vulnerability Types 3m 2s The CIA Triad 0m 45s Security Architecture Vulnerabilities 2m 43s Technology Component Vulnerabilities 3m 43s Summary and What’s Next 0m 58s Cryptography 28m 14s Introduction to Cryptography 1m 0s Cryptography Is Typically Bypassed, Not Penetrated 1m 6s Basic Concept of Cryptography 4m 46s Cryptography Isn’t New! 2m 25s The CIA Triad 1m 12s Key Length 1m 1s Cipher Types 0m 58s Forms of Cryptography 1m 12s Symmetric Cryptography 1m 6s Data Encryption Standard (DES) 2m 36s Double DES (2DES) 0m 28s Triple DES (3DES) 0m 34s Advanced Encryption Standard (Rijndael) 0m 50s Asymmetric Cryptography 2m 41s Hashing Functions 1m 8s Hashing Attacks 1m 8s Methods of Cryptanalytic Attacks 1m 27s Cryptographic Lifecycle 0m 52s Cryptography Law 0m 51s Summary and What’s Next 0m 44s Site and Facility Secure Design 11m 34s Introduction to Site and Facility Secure Design 1m 0s Physical Security Control Design 1m 37s Crime Prevention Through Environmental Design 1m 12s Physical Security Requirements and Resources 1m 57s Key Facility Protection Points 0m 20s Facility Access 1m 30s Support Equipment Rooms 0m 58s Server and Technology Component Rooms 0m 42s Restricted Work Areas 1m 23s Summary and What’s Next 0m 52s Sharing Widget |