Pluralsight - CISSP - Security Engineering

seeders: 0
leechers: 1
Added on March 17, 2016 by bardin Other > Tutorials
Torrent verified.



Pluralsight - CISSP - Security Engineering (Size: 290.52 MB)
 01_01-CISSP Security Engineering.mp41.65 MB
 01_02-Whats Security Engineering and Whats Next.mp43.4 MB
 02_01-Introduction to Secure Design Principles and Processes.mp42.17 MB
 02_02-SoftwareSystem Design Lifecycle.mp42.8 MB
 02_03-Requirements Phase.mp41.75 MB
 02_04-Design Phase.mp43.7 MB
 02_05-Implementation Phase.mp41.12 MB
 02_06-Integration and Testing Phase.mp42.95 MB
 02_07-Transition to Operations Phase.mp42.2 MB
 02_08-NIST Security Engineering Principles.mp42.35 MB
 02_09-Security Foundation Principles.mp44.76 MB
 02_10-Risk Based Principles.mp47.57 MB
 03_01-Introduction to Fundamental Concepts of Security Models.mp41.96 MB
 03_02-Type of Security Models.mp41.11 MB
 03_03-Information Flow Security Model.mp42.39 MB
 03_04-Matrixbased Security Model.mp42.01 MB
 03_05-Multilevel Lattice Security Model.mp41.43 MB
 03_06-Noninterference Security Model.mp42.58 MB
 03_07-State Machine Security Model.mp43.64 MB
 03_08-Common Security Model Examples.mp4512.1 KB
 03_09-BellLaPadula Confidentiality Security Model.mp46.42 MB
 03_10-Biba Integrity Security Model.mp43.5 MB
 04_01-Introduction to Security Evaluation Models.mp42.03 MB
 04_02-Certification and Accreditation.mp43.38 MB
 04_03-Product Evaluation Models.mp4656.07 KB
 04_04-Trusted Computer System Evaluation Criteria TCSEC.mp413.06 MB
 04_05-Information Technology Security Evaluation Criteria ITSEC.mp412.73 MB
 04_06-The Common Criteria.mp44.84 MB
 04_07-Security Implementation Guidelines.mp41.5 MB
 04_08-ISOIEC 27001 and 27002 Security Standards.mp47.38 MB
 04_09-Control Objects for Information and Related Technology COBIT.mp42.83 MB
 04_10-Payment Card Industry Data Security Standard PCIDSS.mp47.66 MB
 04_11-Summary and Whats Next.mp41.61 MB
 05_01-Introduction to Security Capabilities of Information Systems.mp41.5 MB
 05_02-Access Control Mechanisms.mp41.37 MB
 05_03-Secure Memory Management.mp43.81 MB
 05_04-State and Layering.mp42.37 MB
 05_05-Cryptographic Protections.mp42.66 MB
 05_06-Host Firewalls and Intrusion Prevention.mp4956.22 KB
 05_07-Auditing and Monitoring Controls.mp42.14 MB
 05_08-Virtualization.mp42.82 MB
 05_09-Summary and Whats Next.mp41.12 MB
 06_01-Introduction to Vulnerabilities in Security Architecture and Technology Components.mp42.64 MB
 06_02-Completely Secure Any System.mp42.38 MB
 06_03-Vulnerability Types.mp48.76 MB
 06_04-The CIA Triad.mp41.78 MB
 06_05-Security Architecture Vulnerabilities.mp45.92 MB
 06_06-Technology Component Vulnerabilities.mp44.11 MB
 06_07-Summary and Whats Next.mp41.95 MB
 07_01-Introduction to Cryptography.mp41.57 MB
 07_02-Cryptography Is Typically Bypassed, Not Penetrated.mp41.74 MB
 07_03-Basic Concept of Cryptography.mp45.19 MB
 07_04-Cryptography Isnt New.mp44.94 MB
 07_05-The CIA Triad.mp43.04 MB
 07_06-Key Length.mp42.66 MB
 07_07-Cipher Types.mp42.2 MB
 07_08-Forms of Cryptography.mp44.25 MB
 07_09-Symmetric Cryptography.mp41.55 MB
 07_10-Data Encryption Standard DES.mp45.65 MB
 08_01-Introduction to Site and Facility Secure Design.mp41.57 MB
 08_02-Physical Security Control Design.mp42.57 MB
 08_03-Crime Prevention Through Environmental Design.mp42.42 MB
 08_04-Physical Security Requirements and Resources.mp43.32 MB
 08_05-Key Facility Protection Points.mp4369.53 KB
 08_06-Facility Access.mp41.99 MB
 08_07-Support Equipment Rooms.mp41.43 MB
 08_08-Server and Technology Component Rooms.mp4844.73 KB
 08_09-Restricted Work Areas.mp41.9 MB
 08_10-Summary and Whats Next.mp41.67 MB
 cisspsecurityengineering.zip11.68 MB


Description





Deep dive into the Security Engineering domain of the Certified Information Systems Security Professional (CISSP®) certification, including Secure Design Principles and Processes, Fundamental Concepts of Security Models, Security Evaluation Models, Security Capabilities of Information Systems, Vulnerabilities in Security Architecture and Technology Components, Cryptography, and Site and Facility Secure Design


Introduction
2m 17s
CISSP® - Security Engineering 0m 48s
What's Security Engineering and What's Next? 1m 29s
Secure Design Principles and Processes
43m 11s
Introduction to Secure Design Principles and Processes 1m 24s
Software/System Design Lifecycle 1m 57s
Requirements Phase 1m 6s
Design Phase 1m 49s
Implementation Phase 0m 50s
Integration and Testing Phase 1m 27s
Transition to Operations Phase 1m 19s
NIST Security Engineering Principles 1m 41s
Security Foundation Principles 3m 35s
Risk Based Principles 5m 58s
Ease of Use Principles 3m 41s
Increase Resilience Principles 7m 40s
Reduce Vulnerabilities Principles 5m 12s
Design with Network in Mind Principles 4m 27s
Summary and What’s Next 1m 0s
Fundamental Concepts of Security Models
19m 21s
Introduction to Fundamental Concepts of Security Models 1m 10s
Type of Security Models 0m 50s
Information Flow Security Model 1m 2s
Matrix-based Security Model 1m 15s
Multi-level Lattice Security Model 0m 42s
Non-interference Security Model 1m 13s
State Machine Security Model 1m 26s
Common Security Model Examples 0m 30s
Bell-LaPadula Confidentiality Security Model 3m 24s
Biba Integrity Security Model 2m 1s
Brewer-Nash (The Chinese Wall) Security Model 0m 32s
Clark Wilson Security Model 0m 38s
Graham-Denning Security Model 0m 41s
Security Architecture Frameworks 0m 45s
The Open Group Architecture Framework (TOGAF) 0m 57s
Zachman Framework 0m 39s
Sherwood Applied Business Security Architecture (SABSA) 0m 40s
Summary and What’s Next 0m 47s
Security Evaluation Models
22m 24s
Introduction to Security Evaluation Models 1m 9s
Certification and Accreditation 1m 4s
Product Evaluation Models 0m 43s
Trusted Computer System Evaluation Criteria (TCSEC) 4m 41s
Information Technology Security Evaluation Criteria (ITSEC) 3m 42s
The Common Criteria 1m 58s
Security Implementation Guidelines 1m 13s
ISO/IEC 27001 and 27002 Security Standards 2m 59s
Control Objects for Information and Related Technology (COBIT) 1m 49s
Payment Card Industry Data Security Standard (PCI-DSS) 2m 15s
Summary and What’s Next 0m 46s
Security Capabilities of Information Systems
8m 49s
Introduction to Security Capabilities of Information Systems 1m 0s
Access Control Mechanisms 0m 49s
Secure Memory Management 1m 31s
State and Layering 0m 51s
Cryptographic Protections 1m 14s
Host Firewalls and Intrusion Prevention 0m 36s
Auditing and Monitoring Controls 0m 57s
Virtualization 1m 7s
Summary and What’s Next 0m 41s
Vulnerabilities in Security Architecture and Technology Components
13m 52s
Introduction to Vulnerabilities in Security Architecture and Technology Components 1m 30s
Completely Secure Any System 1m 9s
Vulnerability Types 3m 2s
The CIA Triad 0m 45s
Security Architecture Vulnerabilities 2m 43s
Technology Component Vulnerabilities 3m 43s
Summary and What’s Next 0m 58s
Cryptography
28m 14s
Introduction to Cryptography 1m 0s
Cryptography Is Typically Bypassed, Not Penetrated 1m 6s
Basic Concept of Cryptography 4m 46s
Cryptography Isn’t New! 2m 25s
The CIA Triad 1m 12s
Key Length 1m 1s
Cipher Types 0m 58s
Forms of Cryptography 1m 12s
Symmetric Cryptography 1m 6s
Data Encryption Standard (DES) 2m 36s
Double DES (2DES) 0m 28s
Triple DES (3DES) 0m 34s
Advanced Encryption Standard (Rijndael) 0m 50s
Asymmetric Cryptography 2m 41s
Hashing Functions 1m 8s
Hashing Attacks 1m 8s
Methods of Cryptanalytic Attacks 1m 27s
Cryptographic Lifecycle 0m 52s
Cryptography Law 0m 51s
Summary and What’s Next 0m 44s
Site and Facility Secure Design
11m 34s
Introduction to Site and Facility Secure Design 1m 0s
Physical Security Control Design 1m 37s
Crime Prevention Through Environmental Design 1m 12s
Physical Security Requirements and Resources 1m 57s
Key Facility Protection Points 0m 20s
Facility Access 1m 30s
Support Equipment Rooms 0m 58s
Server and Technology Component Rooms 0m 42s
Restricted Work Areas 1m 23s
Summary and What’s Next 0m 52s

Sharing Widget


Download torrent
290.52 MB
seeders:0
leechers:1
Pluralsight - CISSP - Security Engineering