04. Security Evaluation Models/04_08-ISOIEC 27001 and 27002 Security Standards.mp47.38MB
04. Security Evaluation Models/04_09-Control Objects for Information and Related Technology COBIT.mp42.83MB
04. Security Evaluation Models/04_10-Payment Card Industry Data Security Standard PCIDSS.mp47.66MB
04. Security Evaluation Models/04_11-Summary and Whats Next.mp41.61MB
05. Security Capabilities of Information Systems/05_01-Introduction to Security Capabilities of Information Systems.mp41.5MB
05. Security Capabilities of Information Systems/05_02-Access Control Mechanisms.mp41.37MB
05. Security Capabilities of Information Systems/05_03-Secure Memory Management.mp43.81MB
05. Security Capabilities of Information Systems/05_04-State and Layering.mp42.37MB
05. Security Capabilities of Information Systems/05_05-Cryptographic Protections.mp42.66MB
05. Security Capabilities of Information Systems/05_06-Host Firewalls and Intrusion Prevention.mp4956.22KB
05. Security Capabilities of Information Systems/05_07-Auditing and Monitoring Controls.mp42.14MB
05. Security Capabilities of Information Systems/05_08-Virtualization.mp42.82MB
05. Security Capabilities of Information Systems/05_09-Summary and Whats Next.mp41.12MB
06. Vulnerabilities in Security Architecture and Technology Components/06_01-Introduction to Vulnerabilities in Security Architecture and Technology Components.mp42.64MB
06. Vulnerabilities in Security Architecture and Technology Components/06_02-Completely Secure Any System.mp42.38MB
06. Vulnerabilities in Security Architecture and Technology Components/06_03-Vulnerability Types.mp48.76MB
06. Vulnerabilities in Security Architecture and Technology Components/06_04-The CIA Triad.mp41.78MB
06. Vulnerabilities in Security Architecture and Technology Components/06_05-Security Architecture Vulnerabilities.mp45.92MB
06. Vulnerabilities in Security Architecture and Technology Components/06_06-Technology Component Vulnerabilities.mp44.11MB
06. Vulnerabilities in Security Architecture and Technology Components/06_07-Summary and Whats Next.mp41.95MB
07. Cryptography/07_01-Introduction to Cryptography.mp41.57MB
07. Cryptography/07_02-Cryptography Is Typically Bypassed, Not Penetrated.mp41.74MB
07. Cryptography/07_03-Basic Concept of Cryptography.mp45.19MB