CISSP - Online Self-Learning Training

GreyCampus I., Training for working professionals

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
79 Videos (11h 16m)
    • Awareness and Training

      3:53
    • CIA

      3:16
    • Compliance

      4:11
    • Control Frame Works

      4:33
    • Control or Security Control

      6:15
    • Intellectual Property

      1:24
    • Privacy

      2:17
    • Risk Management Brief

      5:02
    • Security Governance

      1:30
    • Vulnarability threat asset risk and impact

      8:04
    • Asset Mnagement

      5:52
    • Data Classification

      7:42
    • Data Life Cycle

      2:17
    • Data Management

      8:13
    • Data Privcy, Protection and Retention

      10:48
    • Data Security 1

      13:45
    • Data Security 2

      8:17
    • Ownership and Custodianship

      5:10
    • Access Control Machanism Basics

      8:29
    • Asymmetric Key Cryptoraphy

      14:43
    • Cloud Computing

      4:50
    • Control Frameworks

      8:14
    • Cryptogaphy Terminologies

      12:56
    • Cryptography Foundation

      11:16
    • Enterprise Architecture

      9:35
    • History Of Cryptography

      5:38
    • Key Management Practices

      11:05
    • Security evaluation Models

      6:17
    • Security Models

      11:51
    • Site, Facility Design and planning

      8:16
    • Softwar Vulnerabilities OWASP

      3:02
    • Symmetric Key Cryptography

      19:32
    • System Components

      11:55
    • Attack Phases

      8:41
    • Network Attacks

      34:35
    • Network Topologies

      4:18
    • OSI Model

      17:29
    • Protocols, Applications and Services

      11:41
    • Secure Communication Channels

      9:20
    • Securing Network Components

      18:12
    • SIEM

      4:33
    • VPN

      2:42
    • Access Control Challenges

      4:19
    • Access Control Types

      2:51
    • Biometric Systems

      10:57
    • Cloud Based Identiy and Access Management

      5:05
    • Desktop Controls

      8:20
    • IDAM

      15:04
    • Identification, Authorization and Authentication

      5:35
    • Logical Access Control

      5:58
    • Multi factor Authentication

      4:42
    • Physical Access Control

      14:17
    • SAML

      2:27
    • Single Sign On

      5:13
    • Assessment and Tesing Strategy

      6:50
    • Code Review and Testing

      26:58
    • Continuous Monitoring

      8:57
    • Internal and Third Party Audits

      10:24
    • Log Management

      12:13
    • Top Most Dangerous SW Errors Category

      3:29
    • Asset Protection

      15:22
    • Controlling Privledged Accounts

      17:10
    • DLP

      8:25
    • Incident Management and Investigations

      14:34
    • Incident Response

      2:18
    • Information Life Cycle

      2:43
    • Intrusion Detection and Prevention

      3:41
    • Personal Safety

      2:59
    • Physical Security Perimeter Security

      6:19
    • Physical Security Physical Access Control

      11:31
    • Recovery Strategy

      11:19
    • Application Development and Programming Concepts

      9:52
    • Database Management System

      18:07
    • Malware or Malicious Software

      4:58
    • SDLC Brief

      7:27
    • Security Issues in Source Code

      7:32
    • Software Devlopment Methodologies

      7:41
    • Soft development Standards

      5:49
    • TCB

      3:17