CISA Domain 5 Training - Protection of Information Assets
Language: English | Size:2.59 GB
Genre:eLearning
Files Included :
1 1-CISA0-Welcome to the Course.mp4 (16.68 MB)
MP4
2 2-CISA0-What is CISA Certification.mp4 (35.89 MB)
MP4
1 1-CISA5-The Security Objective and CIA Triad.mp4 (33.99 MB)
MP4
2 2-CISA5-Security vs Privacy and Essential Security Terms.mp4 (58.03 MB)
MP4
3 3-CISA5-Privacy Requirements and regulations.mp4 (52.7 MB)
MP4
4 4-CISA5-Security Vulnerabilities Overview.mp4 (110.29 MB)
MP4
5 5-CISA5-Cyber Kill Chain, the Process of Hacking into systems.mp4 (30.78 MB)
MP4
6 6-CISA5-Cyber attacks Explanations - DoS DDoS Buffer overflow and MiTM.mp4 (181.76 MB)
MP4
7 7-CISA5-Web Application Attacks.mp4 (157.46 MB)
MP4
8 8-CISA5-Malware Types and Other Attacks.mp4 (44.05 MB)
MP4
9 9-CISA5-Password Attacks and Rainbow Tables.mp4 (45.42 MB)
MP4
1 10-CISA5-Social Engineering.mp4 (89.14 MB)
MP4
2 11-CISA5-Security Awareness Program.mp4 (46.63 MB)
MP4
3 12-CISA5-Securing Supply Chain and Supply Chain Risk Management.mp4 (30.75 MB)
MP4
1 13-CISA5-The IAAA Framework.mp4 (30.52 MB)
MP4
2 14-CISA5-MFA and Biometric.mp4 (43.66 MB)
MP4
3 15-CISA5-Single Sign on (SSO) and Reduced Sign on (RSO).mp4 (33.04 MB)
MP4
4 16-CISA5-Authorisation and Access Control Models.mp4 (61.85 MB)
MP4
5 17-CISA5-Owner and Custodian and their responsibilities in Assets protection.mp4 (56.46 MB)
MP4
1 18-CISA5-What is Physical Security.mp4 (46.73 MB)
MP4
2 19-CISA5-Physical Access Control System 1.mp4 (29.7 MB)
MP4
3 20-CISA5-Physical Access Control System 2.mp4 (27.21 MB)
MP4
4 21-CISA5-Environmental Controls - Securing Power Sources.mp4 (40.64 MB)
MP4
5 22-CISA5-Environmental Controls - Fire Threat and Controls.mp4 (114.11 MB)
MP4
6 23-CISA5-Physical Security Best Practices.mp4 (40.52 MB)
MP4
1 24-CISA5-Data Lifecycle.mp4 (44.52 MB)
MP4
2 25-CISA5-Roles in Data and Assets Protection.mp4 (56.58 MB)
MP4
3 26-CISA5-Privacy Regulation Roles.mp4 (18.84 MB)
MP4
4 27-CISA5-Data Security Measures.mp4 (67.64 MB)
MP4
5 28-CISA5-Data Classification.mp4 (42.72 MB)
MP4
6 29-CISA5-Data Destruction.mp4 (47.61 MB)
MP4
7 30-CISA5-RACI Matrix.mp4 (19.19 MB)
MP4
1 31-CISA5-Cryptography Overview.mp4 (48.09 MB)
MP4
10 40-CISA5-Cryptography Applications in IT.mp4 (12.68 MB)
MP4
2 32-CISA5-Symmetric Encryption.mp4 (66.95 MB)
MP4
3 33-CISA5-Asymmetric Encryption Overview.mp4 (83.63 MB)
MP4
4 34-CISA5-Asymmetric Encryption Benefits.mp4 (64.45 MB)
MP4
5 35-CISA5-Digital Certificate.mp4 (41.53 MB)
MP4
6 36-CISA5-Public Key Infrastructure.mp4 (51.08 MB)
MP4
7 37-CISA5-Integrity Hashing and Salting.mp4 (62.48 MB)
MP4
8 38-CISA5-Encryption vs Hashing vs Encoding.mp4 (31.13 MB)
MP4
9 39-CISA5-Digital Signature.mp4 (24.5 MB)
MP4
1 41-CISA5-Organization IT Infrastructure and Security Overview.mp4 (68.78 MB)
MP4
2 42-CISA5-Network Segmentation and VLANs.mp4 (24.1 MB)
MP4
3 43-CISA5-Firewalls.mp4 (29.17 MB)
MP4
4 44-CISA5-Network Admission Control.mp4 (9.25 MB)
MP4
5 45-CISA5-DMZ and Bastian Host.mp4 (23.4 MB)
MP4
6 46-CISA5-Proxy, Load Balancer, Email Security.mp4 (30.16 MB)
MP4
1 47-CISA5-End-user Security Software Overview.mp4 (66.66 MB)
MP4
2 48-CISA5-Endpoint Protection Platform Overview - EPP.mp4 (78.16 MB)
MP4
3 49-CISA5-Endpoint security best practices.mp4 (85.4 MB)
MP4