Prep Logic
CISSP Lecture Series 1 of 3

speech

#    Title    Time    Info  
1 Welcome 1:11
2 Table of Contents 0:25
3 Access Control Systems and Methodology 0:24
4 Access Control Systems 8:08
5 Authentication 4:24
6 Types of Attacks Against Access Control Systems 2:35
7 Intrusion Detection Systems 2:18
8 Telecomunication and Network Security 0:28
9 Ports and Protocols 1:59
10 Cabling 3:18
11 Network Access Techniques 5:20
12 Raid 2:01
13 Firewalls 2:20
14 VPNs 2:15
15 Security Management Practices 0:31
16 Goals of Information Security 1:17
17 Concepts of Information security 1:19
18 Data Classification 2:37
19 Security Managment Hierarchy 2:41
20 Risk Management 4:07
21 Security Awareness Training 1:30
22 Applications and System Development 0:25
23 System Lifecycle 1:24
24 Application Environment 3:18
25 Databases 2:13
26 Application and System Vulnerabilities and Threats 4:35
27 Cryptography 0:25
28 Simple Crypto Systems 3:00
29 Modern Crypto Systems 5:55
30 Cryptographic Attacks 2:17
31 Applied Crytpography 4:55
32 Public Key Infrastructure 1:20
Total time 79:21