English | Size: 61.55 GB
Genre: eLearning
SUPPORTING IT GOVERNANCE AND RISK MANAGEMENT
Overview
So You Want To Setup A Lab
Begin At The Beginning – Confidentiality
Begin At The Beginning – Integrity
Begin At The Beginning – Availability
Governance And Risk Management: Overview
Governance And Risk Management: Risk Vocabulary
Governance And Risk Management: Risk Management
Governance And Risk Management: Risk Analysis
Assess Risks: What Is A Security Framework
Assess Risks: ESA Framework Assessment Process
Assess Risks: System Specific Risk Analysis
Assess Risks: Risk Determination
Assess Risks: Guidelines For Assessing Risk
Risk Mitigation: What Is A Aggregate CIA Score
Risk Mitigation: What Are The CVSS And CVE
Risk Mitigation: Risk Responses
Risk Management Documentation: Best Practices
Risk Management Documentation: BCP
Risk Management Documentation: What Is A BIA
Risk Management Documentation: Downtime
Risk Management Documentation: Documents
I.T. Governance And Risk Management – Key Points
LEVERAGING COLLABORATION TO SUPPORT SECURITY
Collaboration: GRC And Controls
Collaboration: What Is An SCA
Collaboration: Solutions
Leveraging Collaboration – Key Points
USING RESEARCH AND ANALYSIS TO SECURE THE ENTERPRISE
Research And Analysis: Industry Trends
Research And Analysis: Artificial Intelligence
Research And Analysis: Requirements For Contracts
Analyze Scenarios To Secure The Enterprise
Using Research And Analysis – Key Points
INTEGRATING ADVANCED AUTHENTICATION AND AUTHORIZATION TECHNIQUES
Authentication And Access Control
Authentication Factors And Controls
Authentication Types
Centralized Remote Authentication Services
Deep Dive: RADIUS
Deep Dive: 802.1X
What Is Authorization/OAuth2.0
What Is XACML
Trusts Models And Kerberos
Trust Models And Kerberos Part 2
Directory Services And LDAP
Hands On: Establishing Peer Trusts
Authentication And Authorization Review Questions
Advanced Identity Concepts And Vocabulary
Identity Federation Methods
Advanced Identity Review Questions
Authentication And Authorization: Key Points
IMPLEMENTING CRYPTOGRAPHIC TECHNIQUES
Encryption
Hashing
Digital Signatures
Blockchain And Bitcoin
Hands On: Configuring A Blockchain
Public Key Infrastructure PKI – Design
Public Key Infrastructure PKI – Concepts
Cryptography Concepts
Stream Vs. Block Ciphers
Implement Cryptography
Implementing Cryptographic Techniques – Key Points
IMPLEMENTING SECURITY CONTROLS FOR HOSTS
Host Concepts And Vocabulary
Product Evaluation Models – TCSEC
Product Evaluation Models – ITSEC
Product Evaluation Models – Common Criteria
What Is A Trusted OS
Types Of Security Models
Bell-LaPadula
Biba
Clark-Wilson And Others
Access Control Concepts
Role-Based Access Control (RBAC)
Other Access Control Models
Endpoint Security
Host Review Questions
Hardening Hosts Concepts And Vocabulary
Peripherals
Full Disk Encryption
Hands-On: Hardening Windows Hosts, AppLocker
Virtualization Concepts And Vocabulary
Common VM Vulnerabilities
Hands-On: Creating Securing VM Using Virtualbox
Boot Loader Concepts And Vocabulary
Hands-On: Protecting Boot Loaders
Implementing Security Controls Hosts Key Points
SECURITY CONTROLS FOR MOBILE DEVICES
Mobile Deployment Models
MDM Concepts And Vocabulary
MDM Concepts And Vocabulary Part 2
Storage
Concepts And Vocabulary
Concepts And Vocabulary Part 2
Security Controls For Mobile Devices – Key Points
IMPLEMENTING NETWORK SECURITY
IDSs Vs IPSs Casp
What Is A SIEM System
Network Security Concepts And Vocabulary
Hands-On Deploy Network Security Platform OPNsense
SoC, BASs, ICS And SCADA
Network-Enabled Devices Review Questions
Remote Access And IPv6
Network Authentication
Network Topologies And SDN
Optimizing Resource Placement
Advanced Network Design Review Questions
Network Security Controls Concepts Vocabulary
VLANS And Network Data Flow
DPI And HTTPS Inspection
Network Device Configurations
NAC And Alerting
Hands On: Implementing Network Monitoring Ntopng
Implementing Network Security – Key Points
IMPLEMENTING SECURITY IN THE SYSTEMS AND SOFTWARE DEVELOPMENT LIFECYCLE
What Is The Systems Development Life Cycle SDLC
Development Methodologies
What Are The SDLC Phases
Security Requirements Traceability Matrix SRTM
Common Software Development Approaches
Common Software Development Methods
What About Validation And Acceptance Testing
SDLC Review Questions
Secure Vs Insecure Direct Object References
Error Exception Handling Try…Catch Statements
What Is Privilege Escalation
Overflows And Canaries
Memory Leaks
Races And Exhaustion
What Is SQL Injection
What Is Session…
What Is A Cross-Site Scripting XSS Attack
Cross-Site Request Forgery XSRF/CSRF Attack
What About Clickjacking And Cookie Hijacking
What Is Security By…
Input Validation Fuzzing Application Sandboxing
WS-Security DAM And Software Assurance Tech
Implementing Security In The SDLC – Key Points
INTEGRATING ASSETS IN A SECURE ENTERPRISE ARCHITECTURE
Integrate Best Practices In Enterprise Security
Technical Deployment Models: What Is A Model
Technical Deployment Models: What Is Cloud
Cloud Security Services In The Enterprise
Secure Design: Vocabulary And Concepts
Secure Design: Vocabulary And Concepts Part 2
Secure Design: Review Questions
Data Security: Owners, Processors And Sovereignty
Data Security: Data Flow Security
Data Security: Data Remanence
Data Security: Provisioning And Deprovisioning
Data Security: Review Questions
Enterprise Applications: What Are They
Enterprise Applications: Directory Svcs, DNS
Enterprise Applications: Directory Svsc, DNS Pt.2
Enterprise Applications: Hands On With DNS RRs
DNSSEC, Zone Transfers And TSIGs
DNSSEC, Zone Transfers And TSIG Part 2
DNSSEC, Zone Transfers And TSIG Part 3
Hands On With DNSSEC
Enterprise Applications: Configuration Management
Enterprise Applications: Review Questions
Integrating Assets – Key Points
CONDUCTING SECURITY ASSESSMENTS
Security Assessments: Types
Security Assessments: Application Code Review
Going Deeper: Vulnerability Scanning
Going Deeper: Testing Software
Software Testing Types
Software Testing Types Part 2
Logs, Memory And Debugging
Social Engineering
OSINT, Self-Assessments And Teaming
Security Assessments – Review Questions
Vulnerability Scanner (Nikto)
Port Scanner (Zenmap)
Protocol Analyzer (Wireshark)
Network Enumerator (Zenmap)
Password Cracker (John The Ripper)
Using A Fuzzer In Kali Linux
HTTP Interceptor (Burp Suite)
Exploitation Framework (Social-Engineer Toolkit)
Log Analysis In Kali (Grep And Cut)
OpenSCAP
Reverse Engineering (Strace)
Conducting Security Assessments – Key Points
RESPONDING TO AND RECOVERING FROM INCIDENTS
Concepts And Vocabulary
Incident Response Facilitators
Incident Response Facilitators Part 2
E-Discovery
Incident Response Review Questions
What Is COOP
CSIRTs And Common Tools
Evidence Collection And Handling
Types Of Evidence
Five Rules Of Evidence 5 B’s
Principles Of Criminalistics
Investigation Process
Forensic Analysis Of Compromised Systems
What Is The Order Of Volatility
Conducting Forensic Analysis With Autopsy
Responding To Incidents – Key Points
nitroflare.com/view/BE3C33EBBB6411D/ITPT84.15.9.part01.rar
nitroflare.com/view/30971B143657E99/ITPT84.15.9.part02.rar
nitroflare.com/view/AD05FDABB22CB80/ITPT84.15.9.part03.rar
nitroflare.com/view/F5D0B23CBC0ED7E/ITPT84.15.9.part04.rar
nitroflare.com/view/1282AD93F62762D/ITPT84.15.9.part05.rar
nitroflare.com/view/CBD00570771F818/ITPT84.15.9.part06.rar
nitroflare.com/view/934852193C8AD35/ITPT84.15.9.part07.rar
nitroflare.com/view/7C844C5A35E11D7/ITPT84.15.9.part08.rar
nitroflare.com/view/0BF888A3ED951CD/ITPT84.15.9.part09.rar
nitroflare.com/view/7FAB042DF5327B8/ITPT84.15.9.part10.rar
nitroflare.com/view/7EDE1CF793498C1/ITPT84.15.9.part11.rar
nitroflare.com/view/913E9D938499ABC/ITPT84.15.9.part12.rar
nitroflare.com/view/08E6A088D911BDA/ITPT84.15.9.part13.rar
nitroflare.com/view/EE85756894D1D64/ITPT84.15.9.part14.rar
nitroflare.com/view/AFB6A16F9DAB1FD/ITPT84.15.9.part15.rar
nitroflare.com/view/E52ED32D1468D4B/ITPT84.15.9.part16.rar
nitroflare.com/view/FB9C9999C1AA67C/ITPT84.15.9.part17.rar
nitroflare.com/view/06ACBA2D8867524/ITPT84.15.9.part18.rar
nitroflare.com/view/A4E27A364C26CBE/ITPT84.15.9.part19.rar
nitroflare.com/view/C6703694468F6EC/ITPT84.15.9.part20.rar
nitroflare.com/view/9EFCAEC2D7AF630/ITPT84.15.9.part21.rar
nitroflare.com/view/5AC2D344A3EECB7/ITPT84.15.9.part22.rar
nitroflare.com/view/6039F07D4DC3FA6/ITPT84.15.9.part23.rar
nitroflare.com/view/C05D41BDDED5A52/ITPT84.15.9.part24.rar
nitroflare.com/view/FAABB527A26BC4D/ITPT84.15.9.part25.rar
nitroflare.com/view/66C45A2010616C6/ITPT84.15.9.part26.rar
nitroflare.com/view/62EC53B7F749305/ITPT84.15.9.part27.rar
nitroflare.com/view/EF9E4D116608547/ITPT84.15.9.part28.rar
nitroflare.com/view/D8D89886D9ABA8C/ITPT84.15.9.part29.rar
nitroflare.com/view/EDE9B118A953098/ITPT84.15.9.part30.rar
nitroflare.com/view/342C2D13B3032AF/ITPT84.15.9.part31.rar
nitroflare.com/view/BF1A9767692089D/ITPT84.15.9.part32.rar
nitroflare.com/view/71D04CE31FE167A/ITPT84.15.9.part33.rar
nitroflare.com/view/E6ABC0FC9F09C0D/ITPT84.15.9.part34.rar
nitroflare.com/view/FA772DF9A35FC80/ITPT84.15.9.part35.rar
nitroflare.com/view/3BDFB3AF5317E40/ITPT84.15.9.part36.rar
nitroflare.com/view/C76AA8C44BC107D/ITPT84.15.9.part37.rar
nitroflare.com/view/EBA620AD286D504/ITPT84.15.9.part38.rar
nitroflare.com/view/E59D8367B068371/ITPT84.15.9.part39.rar
nitroflare.com/view/37AD0825B80AFF1/ITPT84.15.9.part40.rar
nitroflare.com/view/294E4BA8783859F/ITPT84.15.9.part41.rar
nitroflare.com/view/804D89A99E061F2/ITPT84.15.9.part42.rar
nitroflare.com/view/7D3D1B15159B961/ITPT84.15.9.part43.rar
nitroflare.com/view/466431B9358FC00/ITPT84.15.9.part44.rar
nitroflare.com/view/8A1F5719DE43AAA/ITPT84.15.9.part45.rar
nitroflare.com/view/56B8C0B6DCC9B7F/ITPT84.15.9.part46.rar
nitroflare.com/view/652B1EEC8E4029B/ITPT84.15.9.part47.rar
nitroflare.com/view/5BF8BE0B4D70457/ITPT84.15.9.part48.rar
nitroflare.com/view/C4B01B8378F9561/ITPT84.15.9.part49.rar
nitroflare.com/view/3D2D914C811A1A9/ITPT84.15.9.part50.rar
nitroflare.com/view/D1C64093BEA1E84/ITPT84.15.9.part51.rar
nitroflare.com/view/5C9773931D920E0/ITPT84.15.9.part52.rar
nitroflare.com/view/F8E7DAD41F2077C/ITPT84.15.9.part53.rar
nitroflare.com/view/9C9959F3E021FAB/ITPT84.15.9.part54.rar
nitroflare.com/view/2BA2E3FE080B77D/ITPT84.15.9.part55.rar
nitroflare.com/view/16F0630BB2DDF96/ITPT84.15.9.part56.rar
nitroflare.com/view/510CF841C9699C9/ITPT84.15.9.part57.rar
nitroflare.com/view/F6CFCD70DD1ABCD/ITPT84.15.9.part58.rar
nitroflare.com/view/37BC4FBCB0443BE/ITPT84.15.9.part59.rar
nitroflare.com/view/BE2FFD46488591B/ITPT84.15.9.part60.rar
nitroflare.com/view/7C07A7D192F05F0/ITPT84.15.9.part61.rar
nitroflare.com/view/0E01854E6D99A18/ITPT84.15.9.part62.rar
rapidgator.net/file/a927298876ff66246588186167692071/ITPT84.15.9.part01.rar.html
rapidgator.net/file/b1dc15b7b26efe7f828f89e213d68c7b/ITPT84.15.9.part02.rar.html
rapidgator.net/file/ebd91f2f873d3045c987394ac4505f57/ITPT84.15.9.part03.rar.html
rapidgator.net/file/1ac27df49547566442ee91fb931fd11d/ITPT84.15.9.part04.rar.html
rapidgator.net/file/3761adc1c5bbe388d44b3d2baad165ed/ITPT84.15.9.part05.rar.html
rapidgator.net/file/fbd88e69deee02f254a2b91f2377cc95/ITPT84.15.9.part06.rar.html
rapidgator.net/file/1b89142beb4a88921b77d40a4671cf9a/ITPT84.15.9.part07.rar.html
rapidgator.net/file/6c708b82b8aef177c552f91367d132de/ITPT84.15.9.part08.rar.html
rapidgator.net/file/e2496fa2dbc6004e2be5fb641c27caf2/ITPT84.15.9.part09.rar.html
rapidgator.net/file/d02a643633c70aac405e8f93c667e38d/ITPT84.15.9.part10.rar.html
rapidgator.net/file/ac598f561c5867df50b07c86c966b639/ITPT84.15.9.part11.rar.html
rapidgator.net/file/c7b3c8effe71ceb69cf11c7550071d1e/ITPT84.15.9.part12.rar.html
rapidgator.net/file/0002ea406895a0bfebc87d651df13209/ITPT84.15.9.part13.rar.html
rapidgator.net/file/94d1d4c99682ae52ce72b9d846427796/ITPT84.15.9.part14.rar.html
rapidgator.net/file/64554fa183528ce167c31559739016ef/ITPT84.15.9.part15.rar.html
rapidgator.net/file/27b260d5f1c2323b99a95a1a0213b944/ITPT84.15.9.part16.rar.html
rapidgator.net/file/80133808c76b53f3eef6ab790e1768d1/ITPT84.15.9.part17.rar.html
rapidgator.net/file/6db9a911dc899fde4417f3168b5b6d9c/ITPT84.15.9.part18.rar.html
rapidgator.net/file/cc0ba2b38add379b9e35a384d78ee6cc/ITPT84.15.9.part19.rar.html
rapidgator.net/file/42f1b34c2037d35fe189ef10b1561b5b/ITPT84.15.9.part20.rar.html
rapidgator.net/file/46233c02eceea620feb8dd42f9115c27/ITPT84.15.9.part21.rar.html
rapidgator.net/file/865cab99989df12ab3bb64a1481ea685/ITPT84.15.9.part22.rar.html
rapidgator.net/file/40592f0d6055373b495a58dc1d704829/ITPT84.15.9.part23.rar.html
rapidgator.net/file/97d2748f1dcb8b8c2285d8055c19fe6c/ITPT84.15.9.part24.rar.html
rapidgator.net/file/94c93f269b2c53e7a199043cb57367ba/ITPT84.15.9.part25.rar.html
rapidgator.net/file/514d72837158a32dfd48ec9755d31dfd/ITPT84.15.9.part26.rar.html
rapidgator.net/file/ef9d6aa35d1783b7f83a120838595a3e/ITPT84.15.9.part27.rar.html
rapidgator.net/file/7e3a36b006e3cfb027938698f50cf012/ITPT84.15.9.part28.rar.html
rapidgator.net/file/88542ad3699fc4875776edd535ed2564/ITPT84.15.9.part29.rar.html
rapidgator.net/file/f6aca4d817fa08e327ffa028f270503c/ITPT84.15.9.part30.rar.html
rapidgator.net/file/cd08d6797a2040dcdc59cbabb2345d1d/ITPT84.15.9.part31.rar.html
rapidgator.net/file/96a5a8ddbcc29db9caa61615de7ed703/ITPT84.15.9.part32.rar.html
rapidgator.net/file/90f8d533b153a14ba8feb687de470162/ITPT84.15.9.part33.rar.html
rapidgator.net/file/ff41112ed4ccecad19a1dbbe585a5214/ITPT84.15.9.part34.rar.html
rapidgator.net/file/d2568347621f7b9c0ca4aab32f9c4f27/ITPT84.15.9.part35.rar.html
rapidgator.net/file/9432fe85df41dcee6ee6a7947215e3a6/ITPT84.15.9.part36.rar.html
rapidgator.net/file/3a8bb09733ee18d76e279074a4b6e9b0/ITPT84.15.9.part37.rar.html
rapidgator.net/file/fc1fafd2ca39c066e6462c16b51043f6/ITPT84.15.9.part38.rar.html
rapidgator.net/file/b7c607512acaa581a5e97a10fdb97138/ITPT84.15.9.part39.rar.html
rapidgator.net/file/f0aa710441182a6f2341f3a5a3cb0f2e/ITPT84.15.9.part40.rar.html
rapidgator.net/file/e9ed787bb6c0f1e1a7be1387f682fc7b/ITPT84.15.9.part41.rar.html
rapidgator.net/file/4d90afdf4429b342169ef9cb68ec934d/ITPT84.15.9.part42.rar.html
rapidgator.net/file/656a4c0e38e6002e9e9800de90572734/ITPT84.15.9.part43.rar.html
rapidgator.net/file/686fc14e538005bd9711906dbdd27ace/ITPT84.15.9.part44.rar.html
rapidgator.net/file/92a5d2dcd8abbc995c19c9566082eefb/ITPT84.15.9.part45.rar.html
rapidgator.net/file/64d888e61804821ed2b59612990dedcd/ITPT84.15.9.part46.rar.html
rapidgator.net/file/3411ed244767821dd2368d26d9191a34/ITPT84.15.9.part47.rar.html
rapidgator.net/file/9ed515eb68276a0399a7951866a4b141/ITPT84.15.9.part48.rar.html
rapidgator.net/file/b53988d9af7363cf87631ce5a0867d94/ITPT84.15.9.part49.rar.html
rapidgator.net/file/782ba8b33c7c63020b5b4da644db5292/ITPT84.15.9.part50.rar.html
rapidgator.net/file/1a00f8d87bbb0883a586903a4613db95/ITPT84.15.9.part51.rar.html
rapidgator.net/file/ff89fca48c95218fb40bd06bca4d6021/ITPT84.15.9.part52.rar.html
rapidgator.net/file/bd9af445f7ab7123650729b8ba75490f/ITPT84.15.9.part53.rar.html
rapidgator.net/file/891de6c643ddd6087f36081c7c763f0a/ITPT84.15.9.part54.rar.html
rapidgator.net/file/bf9011ccb21499bbcc7f2894c1c61f36/ITPT84.15.9.part55.rar.html
rapidgator.net/file/86d9e9f77aa73bb5455b9f1edc57976d/ITPT84.15.9.part56.rar.html
rapidgator.net/file/aeb02b3b8fa5d5723c779d59eaaf6fc0/ITPT84.15.9.part57.rar.html
rapidgator.net/file/bfef019224912e5fe6b72a548c41ca15/ITPT84.15.9.part58.rar.html
rapidgator.net/file/88fb8e9f4ef7ccae1b9145d0fae8f488/ITPT84.15.9.part59.rar.html
rapidgator.net/file/84902d1c001cee09bccd479d4cedf2ce/ITPT84.15.9.part60.rar.html
rapidgator.net/file/37513708afa472336f484134dc0c592d/ITPT84.15.9.part61.rar.html
rapidgator.net/file/9762cd39b5d2e5c1cca865df620f8d21/ITPT84.15.9.part62.rar.html
If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9