Filename | Size |
| 1. Introduction/1. Introduction..mp4 | 21.5 MB |
| 1. Introduction/1. Introduction..vtt | 2.7 KB |
| 1. Introduction/2. Introduction to this course!.mp4 | 13.7 MB |
| 1. Introduction/2. Introduction to this course!.vtt | 1.7 KB |
| 1. Introduction/3. Why should you want to get the CISSP certification.mp4 | 56.7 MB |
| 1. Introduction/3. Why should you want to get the CISSP certification.vtt | 8.3 KB |
| 1. Introduction/4. The 8 CISSP domains or CBKs (Common Bodies of Knowledge)..mp4 | 110.4 MB |
| 1. Introduction/4. The 8 CISSP domains or CBKs (Common Bodies of Knowledge)..vtt | 15 KB |
| 1. Introduction/5. Lecture speed..mp4 | 8.4 MB |
| 1. Introduction/5. Lecture speed..vtt | 905 B |
| 1. Introduction/6. Download all the lecture slides from this course!.mp4 | 8.7 MB |
| 1. Introduction/6. Download all the lecture slides from this course!.vtt | 1.2 KB |
| 1. Introduction/7. Links, important topics and where to focus on my slides..mp4 | 19 MB |
| 1. Introduction/7. Links, important topics and where to focus on my slides..vtt | 1.8 KB |
| 1. Introduction/8. General CISSP links..html | 1.8 KB |
| 2. CISSP Domain 7 Security Operations/1. Domain 7 - What we will be covering..mp4 | 18.4 MB |
| 2. CISSP Domain 7 Security Operations/1. Domain 7 - What we will be covering..vtt | 2.2 KB |
| 2. CISSP Domain 7 Security Operations/1.1 CISSP DOMAIN 7 SLIDES - THOR TEACHES v1.0.3.pdf.pdf | 9.5 MB |
| 2. CISSP Domain 7 Security Operations/10. SIEM (Security Information and Event Management..mp4 | 27.5 MB |
| 2. CISSP Domain 7 Security Operations/10. SIEM (Security Information and Event Management..vtt | 3.1 KB |
| 2. CISSP Domain 7 Security Operations/11. Application white-listing..mp4 | 28.1 MB |
| 2. CISSP Domain 7 Security Operations/11. Application white-listing..vtt | 3.2 KB |
| 2. CISSP Domain 7 Security Operations/12. Honeynets and Honeypots..mp4 | 31.5 MB |
| 2. CISSP Domain 7 Security Operations/12. Honeynets and Honeypots..vtt | 3.4 KB |
| 2. CISSP Domain 7 Security Operations/13. Configuration Management..mp4 | 34.3 MB |
| 2. CISSP Domain 7 Security Operations/13. Configuration Management..vtt | 4.4 KB |
| 2. CISSP Domain 7 Security Operations/14. Patch Management..mp4 | 63.4 MB |
| 2. CISSP Domain 7 Security Operations/14. Patch Management..vtt | 63.4 MB |
| 2. CISSP Domain 7 Security Operations/15. Change management..mp4 | 55.6 MB |
| 2. CISSP Domain 7 Security Operations/15. Change management..vtt | 6.6 KB |
| 2. CISSP Domain 7 Security Operations/16. 0-day attacks..mp4 | 52.1 MB |
| 2. CISSP Domain 7 Security Operations/16. 0-day attacks..vtt | 5.6 KB |
| 2. CISSP Domain 7 Security Operations/17. Backups..mp4 | 105.3 MB |
| 2. CISSP Domain 7 Security Operations/17. Backups..vtt | 12.1 KB |
| 2. CISSP Domain 7 Security Operations/18. RAID (Redundant Array of Independent Disks)..mp4 | 55.8 MB |
| 2. CISSP Domain 7 Security Operations/18. RAID (Redundant Array of Independent Disks)..vtt | 6.1 KB |
| 2. CISSP Domain 7 Security Operations/19. Redundancy..mp4 | 91 MB |
| 2. CISSP Domain 7 Security Operations/19. Redundancy..vtt | 91 MB |
| 2. CISSP Domain 7 Security Operations/2. Domain 7 key concepts..mp4 | 58 MB |
| 2. CISSP Domain 7 Security Operations/2. Domain 7 key concepts..vtt | 5.6 KB |
| 2. CISSP Domain 7 Security Operations/20. BCP and DRP..mp4 | 159 MB |
| 2. CISSP Domain 7 Security Operations/20. BCP and DRP..vtt | 17.1 KB |
| 2. CISSP Domain 7 Security Operations/21. Warfare, terrorism, sabotage, and ransomware..mp4 | 59.8 MB |
| 2. CISSP Domain 7 Security Operations/21. Warfare, terrorism, sabotage, and ransomware..vtt | 6.1 KB |
| 2. CISSP Domain 7 Security Operations/22. Personnel..mp4 | 36.3 MB |
| 2. CISSP Domain 7 Security Operations/22. Personnel..vtt | 4.1 KB |
| 2. CISSP Domain 7 Security Operations/23. DRP basics..mp4 | 58.6 MB |
| 2. CISSP Domain 7 Security Operations/23. DRP basics..vtt | 7.2 KB |
| 2. CISSP Domain 7 Security Operations/24. Developing our BCP and DRP..mp4 | 113.2 MB |
| 2. CISSP Domain 7 Security Operations/24. Developing our BCP and DRP..vtt | 12.2 KB |
| 2. CISSP Domain 7 Security Operations/25. BIA (Business Impact Analysis)..mp4 | 68.8 MB |
| 2. CISSP Domain 7 Security Operations/25. BIA (Business Impact Analysis)..vtt | 8 KB |
| 2. CISSP Domain 7 Security Operations/26. Supply and infrastructure redundancy..mp4 | 27.3 MB |
| 2. CISSP Domain 7 Security Operations/26. Supply and infrastructure redundancy..vtt | 3.4 KB |
| 2. CISSP Domain 7 Security Operations/27. Disaster Recovery sites..mp4 | 81.4 MB |
| 2. CISSP Domain 7 Security Operations/27. Disaster Recovery sites..vtt | 9.5 KB |
| 2. CISSP Domain 7 Security Operations/28. Other BCP sub plans..mp4 | 102.4 MB |
| 2. CISSP Domain 7 Security Operations/28. Other BCP sub plans..vtt | 12.4 KB |
| 2. CISSP Domain 7 Security Operations/29. Employee redundancy..mp4 | 96.6 MB |
| 2. CISSP Domain 7 Security Operations/29. Employee redundancy..vtt | 10.7 KB |
| 2. CISSP Domain 7 Security Operations/3. Administrative personnel controls..mp4 | 80.6 MB |
| 2. CISSP Domain 7 Security Operations/3. Administrative personnel controls..vtt | 80.6 MB |
| 2. CISSP Domain 7 Security Operations/30. Testing the plans..mp4 | 132.7 MB |
| 2. CISSP Domain 7 Security Operations/30. Testing the plans..vtt | 17.3 KB |
| 2. CISSP Domain 7 Security Operations/31. After a disruption..mp4 | 79.9 MB |
| 2. CISSP Domain 7 Security Operations/31. After a disruption..vtt | 10.1 KB |
| 2. CISSP Domain 7 Security Operations/32. What we covered in Domain 7..mp4 | 40 MB |
| 2. CISSP Domain 7 Security Operations/32. What we covered in Domain 7..vtt | 4.2 KB |
| 2. CISSP Domain 7 Security Operations/33. (Bonus) Domain 7 - 30 practice questions..html | 127 B |
| 2. CISSP Domain 7 Security Operations/34. Domain 7 links..html | 4.9 KB |
| 2. CISSP Domain 7 Security Operations/4. Digital forensics..mp4 | 79 MB |
| 2. CISSP Domain 7 Security Operations/4. Digital forensics..vtt | 8.7 KB |
| 2. CISSP Domain 7 Security Operations/5. Spinning disk forensics..mp4 | 32 MB |
| 2. CISSP Domain 7 Security Operations/5. Spinning disk forensics..vtt | 3.3 KB |
| 2. CISSP Domain 7 Security Operations/6. Network and Software forensics..mp4 | 66.1 MB |
| 2. CISSP Domain 7 Security Operations/6. Network and Software forensics..vtt | 8 KB |
| 2. CISSP Domain 7 Security Operations/7. Incident Management definitions..mp4 | 70.5 MB |
| 2. CISSP Domain 7 Security Operations/7. Incident Management definitions..vtt | 8.5 KB |
| 2. CISSP Domain 7 Security Operations/8. Incident Management..mp4 | 163.7 MB |
| 2. CISSP Domain 7 Security Operations/8. Incident Management..vtt | 19.6 KB |
| 2. CISSP Domain 7 Security Operations/9. Intrusion detection and prevention systems..mp4 | 106.1 MB |
| 2. CISSP Domain 7 Security Operations/9. Intrusion detection and prevention systems..vtt | 12.8 KB |
| 3. CISSP Domain 8 Software Development Security/1. Domain 8 - What we will be covering..mp4 | 32.6 MB |
| 3. CISSP Domain 8 Software Development Security/1. Domain 8 - What we will be covering..vtt | 3.7 KB |
| 3. CISSP Domain 8 Software Development Security/1.1 CISSP DOMAIN 8 SLIDES - THOR TEACHES v1.0.4.pdf.pdf | 7.2 MB |
| 3. CISSP Domain 8 Software Development Security/10. Software vulnerabilities and Attacks..mp4 | 66.6 MB |
| 3. CISSP Domain 8 Software Development Security/10. Software vulnerabilities and Attacks..vtt | 7.4 KB |
| 3. CISSP Domain 8 Software Development Security/11. Capability Maturity Model (CMM)..mp4 | 79.6 MB |
| 3. CISSP Domain 8 Software Development Security/11. Capability Maturity Model (CMM)..vtt | 9.6 KB |
| 3. CISSP Domain 8 Software Development Security/12. Buying software from other companies..mp4 | 101.9 MB |
| 3. CISSP Domain 8 Software Development Security/12. Buying software from other companies..vtt | 12 KB |
| 3. CISSP Domain 8 Software Development Security/13. Artificial intelligence (AI).mp4 | 59 MB |
| 3. CISSP Domain 8 Software Development Security/13. Artificial intelligence (AI).vtt | 6.3 KB |
| 3. CISSP Domain 8 Software Development Security/14. What we covered in Domain 8..mp4 | 11.4 MB |
| 3. CISSP Domain 8 Software Development Security/14. What we covered in Domain 8..vtt | 1.5 KB |
| 3. CISSP Domain 8 Software Development Security/2. Designing security into our software..mp4 | 40.5 MB |
| 3. CISSP Domain 8 Software Development Security/2. Designing security into our software..vtt | 4.1 KB |
| 3. CISSP Domain 8 Software Development Security/3. Programming concepts..mp4 | 135.1 MB |
| 3. CISSP Domain 8 Software Development Security/3. Programming concepts..vtt | 16.5 KB |