Filename Size 001 - About the Author.mp4 5.6 MB 002 - About the Course.mp4 20.4 MB 003 - About the Exam.mp4 35.3 MB 004 - Understanding IOCs.mp4 108.6 MB 005 - Types of Malware.mp4 109.4 MB 006 - Social Engineering Attacks.mp4 50.1 MB 007 - Technical Attacks.mp4 95.4 MB 008 - Wireless and Cryptographic Attacks.mp4 101.7 MB 009 - Threat Actor Types and Attributes.mp4 97.8 MB 010 - Pentesting Concepts.mp4 79.8 MB 011 - Explain concepts of vulnerability scanning.mp4 74.2 MB 012 - Discuss the Impact of Vulnerability Types.mp4 154.8 MB 013 - Firewalls.mp4 99.5 MB 014 - IDS_IPS.mp4 114.9 MB 015 - Router and Switch Security.mp4 54.1 MB 016 - Proxies and Load balancers.mp4 66.5 MB 017 - Other Network Components.mp4 146.1 MB 018 - Tool Overview.mp4 139.6 MB 019 - Command Line Tools.mp4 88.4 MB 020 - Common Security Issues and their Impact.mp4 167 MB 021 - Connection methodologies defined.mp4 110.7 MB 022 - Mobile Device Management Principles.mp4 105.7 MB 023 - Monitoring and Enforcing Mobile methodologies.mp4 171.9 MB 024 - Secure Protocols Overview.mp4 99.5 MB 025 - Frameworks Overview.mp4 80.8 MB 026 - Discussing the concepts that will help secure your network.mp4 60.6 MB 027 - Hardware security.mp4 87.9 MB 028 - Operating Systems.mp4 107.2 MB 029 - Staging Environments and security implications.mp4 54.3 MB 030 - Security Implications of Embedded Systems.mp4 130.1 MB 031 - Development Lifecycle Models.mp4 52.8 MB 032 - Secure DevOps.mp4 88.8 MB 033 - Secure coding techniques and best practices.mp4 131.6 MB 034 - Code quality and testing.mp4 49.9 MB 035 - Virtualization Concepts.mp4 61.9 MB 036 - Cloud Concepts.mp4 77.8 MB 037 - Resiliency and Automation.mp4 90.3 MB 038 - Redundancy and High Availability.mp4 59.1 MB 039 - Physical Controls.mp4 122.9 MB 040 - Identification, authentication, authorization and accounting (AAA).mp4 69.6 MB 041 - Account Management.mp4 126.2 MB 042 - Account Policy Enforcement.mp4 87 MB 043 - Define different Identity and Access Service Types.mp4 78.6 MB 044 - Identity and Access Services Part 2.mp4 48.4 MB 045 - Identity and Access Management Controls.mp4 74.1 MB 046 - Personnel Management.mp4 86.4 MB 047 - Agreement Types.mp4 83 MB 048 - Business Impact Analysis.mp4 131.5 MB 049 - Risk Management.mp4 80.2 MB 050 - Incident Response Concepts.mp4 110.2 MB 051 - Digital Forensics.mp4 53.6 MB 052 - Disaster Recovery and Continuity of Operations.mp4 101.4 MB 053 - Differentiating between Control Types.mp4 43.1 MB 054 - Data Security and Privacy Practices.mp4 88.7 MB 055 - Basic Concepts of Cryptography (Part 1).mp4 97.7 MB 056 - Basic Concepts of Cryptography (Part 2).mp4 59.7 MB 057 - Symmetric Algorithms.mp4 61.7 MB 058 - Asymmetric Algorithms.mp4 24.2 MB 059 - Hashing Algorithms.mp4 30.7 MB 060 - Wireless Cryptography.mp4 84.3 MB 061 - PKI Overview.mp4 55.9 MB 062 - Types of Certificates.mp4 72.7 MB 063 - Concepts.mp4 41.8 MB