Filename Size 1. Introduction/1. Introduction..mp4 21.5 MB 1. Introduction/1. Introduction..vtt 2.7 KB 1. Introduction/2. Introduction to this course!.mp4 13.7 MB 1. Introduction/2. Introduction to this course!.vtt 1.7 KB 1. Introduction/3. Why should you want to get the CISSP certification.mp4 56.7 MB 1. Introduction/3. Why should you want to get the CISSP certification.vtt 8.3 KB 1. Introduction/4. The 8 CISSP domains or CBKs (Common Bodies of Knowledge)..mp4 110.4 MB 1. Introduction/4. The 8 CISSP domains or CBKs (Common Bodies of Knowledge)..vtt 15 KB 1. Introduction/5. Lecture speed..mp4 8.4 MB 1. Introduction/5. Lecture speed..vtt 905 B 1. Introduction/6. Download all the lecture slides from this course!.mp4 8.7 MB 1. Introduction/6. Download all the lecture slides from this course!.vtt 1.2 KB 1. Introduction/7. Links, important topics and where to focus on my slides..mp4 19 MB 1. Introduction/7. Links, important topics and where to focus on my slides..vtt 1.8 KB 1. Introduction/8. General CISSP links..html 1.8 KB 2. CISSP Domain 7 Security Operations/1. Domain 7 - What we will be covering..mp4 18.4 MB 2. CISSP Domain 7 Security Operations/1. Domain 7 - What we will be covering..vtt 2.2 KB 2. CISSP Domain 7 Security Operations/1.1 CISSP DOMAIN 7 SLIDES - THOR TEACHES v1.0.3.pdf.pdf 9.5 MB 2. CISSP Domain 7 Security Operations/10. SIEM (Security Information and Event Management..mp4 27.5 MB 2. CISSP Domain 7 Security Operations/10. SIEM (Security Information and Event Management..vtt 3.1 KB 2. CISSP Domain 7 Security Operations/11. Application white-listing..mp4 28.1 MB 2. CISSP Domain 7 Security Operations/11. Application white-listing..vtt 3.2 KB 2. CISSP Domain 7 Security Operations/12. Honeynets and Honeypots..mp4 31.5 MB 2. CISSP Domain 7 Security Operations/12. Honeynets and Honeypots..vtt 3.4 KB 2. CISSP Domain 7 Security Operations/13. Configuration Management..mp4 34.3 MB 2. CISSP Domain 7 Security Operations/13. Configuration Management..vtt 4.4 KB 2. CISSP Domain 7 Security Operations/14. Patch Management..mp4 63.4 MB 2. CISSP Domain 7 Security Operations/14. Patch Management..vtt 63.4 MB 2. CISSP Domain 7 Security Operations/15. Change management..mp4 55.6 MB 2. CISSP Domain 7 Security Operations/15. Change management..vtt 6.6 KB 2. CISSP Domain 7 Security Operations/16. 0-day attacks..mp4 52.1 MB 2. CISSP Domain 7 Security Operations/16. 0-day attacks..vtt 5.6 KB 2. CISSP Domain 7 Security Operations/17. Backups..mp4 105.3 MB 2. CISSP Domain 7 Security Operations/17. Backups..vtt 12.1 KB 2. CISSP Domain 7 Security Operations/18. RAID (Redundant Array of Independent Disks)..mp4 55.8 MB 2. CISSP Domain 7 Security Operations/18. RAID (Redundant Array of Independent Disks)..vtt 6.1 KB 2. CISSP Domain 7 Security Operations/19. Redundancy..mp4 91 MB 2. CISSP Domain 7 Security Operations/19. Redundancy..vtt 91 MB 2. CISSP Domain 7 Security Operations/2. Domain 7 key concepts..mp4 58 MB 2. CISSP Domain 7 Security Operations/2. Domain 7 key concepts..vtt 5.6 KB 2. CISSP Domain 7 Security Operations/20. BCP and DRP..mp4 159 MB 2. CISSP Domain 7 Security Operations/20. BCP and DRP..vtt 17.1 KB 2. CISSP Domain 7 Security Operations/21. Warfare, terrorism, sabotage, and ransomware..mp4 59.8 MB 2. CISSP Domain 7 Security Operations/21. Warfare, terrorism, sabotage, and ransomware..vtt 6.1 KB 2. CISSP Domain 7 Security Operations/22. Personnel..mp4 36.3 MB 2. CISSP Domain 7 Security Operations/22. Personnel..vtt 4.1 KB 2. CISSP Domain 7 Security Operations/23. DRP basics..mp4 58.6 MB 2. CISSP Domain 7 Security Operations/23. DRP basics..vtt 7.2 KB 2. CISSP Domain 7 Security Operations/24. Developing our BCP and DRP..mp4 113.2 MB 2. CISSP Domain 7 Security Operations/24. Developing our BCP and DRP..vtt 12.2 KB 2. CISSP Domain 7 Security Operations/25. BIA (Business Impact Analysis)..mp4 68.8 MB 2. CISSP Domain 7 Security Operations/25. BIA (Business Impact Analysis)..vtt 8 KB 2. CISSP Domain 7 Security Operations/26. Supply and infrastructure redundancy..mp4 27.3 MB 2. CISSP Domain 7 Security Operations/26. Supply and infrastructure redundancy..vtt 3.4 KB 2. CISSP Domain 7 Security Operations/27. Disaster Recovery sites..mp4 81.4 MB 2. CISSP Domain 7 Security Operations/27. Disaster Recovery sites..vtt 9.5 KB 2. CISSP Domain 7 Security Operations/28. Other BCP sub plans..mp4 102.4 MB 2. CISSP Domain 7 Security Operations/28. Other BCP sub plans..vtt 12.4 KB 2. CISSP Domain 7 Security Operations/29. Employee redundancy..mp4 96.6 MB 2. CISSP Domain 7 Security Operations/29. Employee redundancy..vtt 10.7 KB 2. CISSP Domain 7 Security Operations/3. Administrative personnel controls..mp4 80.6 MB 2. CISSP Domain 7 Security Operations/3. Administrative personnel controls..vtt 80.6 MB 2. CISSP Domain 7 Security Operations/30. Testing the plans..mp4 132.7 MB 2. CISSP Domain 7 Security Operations/30. Testing the plans..vtt 17.3 KB 2. CISSP Domain 7 Security Operations/31. After a disruption..mp4 79.9 MB 2. CISSP Domain 7 Security Operations/31. After a disruption..vtt 10.1 KB 2. CISSP Domain 7 Security Operations/32. What we covered in Domain 7..mp4 40 MB 2. CISSP Domain 7 Security Operations/32. What we covered in Domain 7..vtt 4.2 KB 2. CISSP Domain 7 Security Operations/33. (Bonus) Domain 7 - 30 practice questions..html 127 B 2. CISSP Domain 7 Security Operations/34. Domain 7 links..html 4.9 KB 2. CISSP Domain 7 Security Operations/4. Digital forensics..mp4 79 MB 2. CISSP Domain 7 Security Operations/4. Digital forensics..vtt 8.7 KB 2. CISSP Domain 7 Security Operations/5. Spinning disk forensics..mp4 32 MB 2. CISSP Domain 7 Security Operations/5. Spinning disk forensics..vtt 3.3 KB 2. CISSP Domain 7 Security Operations/6. Network and Software forensics..mp4 66.1 MB 2. CISSP Domain 7 Security Operations/6. Network and Software forensics..vtt 8 KB 2. CISSP Domain 7 Security Operations/7. Incident Management definitions..mp4 70.5 MB 2. CISSP Domain 7 Security Operations/7. Incident Management definitions..vtt 8.5 KB 2. CISSP Domain 7 Security Operations/8. Incident Management..mp4 163.7 MB 2. CISSP Domain 7 Security Operations/8. Incident Management..vtt 19.6 KB 2. CISSP Domain 7 Security Operations/9. Intrusion detection and prevention systems..mp4 106.1 MB 2. CISSP Domain 7 Security Operations/9. Intrusion detection and prevention systems..vtt 12.8 KB 3. CISSP Domain 8 Software Development Security/1. Domain 8 - What we will be covering..mp4 32.6 MB 3. CISSP Domain 8 Software Development Security/1. Domain 8 - What we will be covering..vtt 3.7 KB 3. CISSP Domain 8 Software Development Security/1.1 CISSP DOMAIN 8 SLIDES - THOR TEACHES v1.0.4.pdf.pdf 7.2 MB 3. CISSP Domain 8 Software Development Security/10. Software vulnerabilities and Attacks..mp4 66.6 MB 3. CISSP Domain 8 Software Development Security/10. Software vulnerabilities and Attacks..vtt 7.4 KB 3. CISSP Domain 8 Software Development Security/11. Capability Maturity Model (CMM)..mp4 79.6 MB 3. CISSP Domain 8 Software Development Security/11. Capability Maturity Model (CMM)..vtt 9.6 KB 3. CISSP Domain 8 Software Development Security/12. Buying software from other companies..mp4 101.9 MB 3. CISSP Domain 8 Software Development Security/12. Buying software from other companies..vtt 12 KB 3. CISSP Domain 8 Software Development Security/13. Artificial intelligence (AI).mp4 59 MB 3. CISSP Domain 8 Software Development Security/13. Artificial intelligence (AI).vtt 6.3 KB 3. CISSP Domain 8 Software Development Security/14. What we covered in Domain 8..mp4 11.4 MB 3. CISSP Domain 8 Software Development Security/14. What we covered in Domain 8..vtt 1.5 KB 3. CISSP Domain 8 Software Development Security/2. Designing security into our software..mp4 40.5 MB 3. CISSP Domain 8 Software Development Security/2. Designing security into our software..vtt 4.1 KB 3. CISSP Domain 8 Software Development Security/3. Programming concepts..mp4 135.1 MB 3. CISSP Domain 8 Software Development Security/3. Programming concepts..vtt 16.5 KB