Description
Section 1: Security PoliciesLecture 1 Security policies – introduction 01:56Lecture 2 What is security? 03:53Lecture 3 Information security 04:13Lecture 4 Information security – level up 04:04Lecture 5 Security issues 04:50Lecture 6 Why are security solutions fallible? 05:42Lecture 7 Security policy issues 04:50Lecture 8 Introduction to threat modelling and classification 05:14Lecture 9 Threat modelling – STRIDE 04:06Lecture 10 STRIDE: Spoofing identity 05:03Lecture 11 STRIDE: Tampering with Data 04:28Lecture 12 STRIDE: Denial of Service 03:51Lecture 13 Threat Modelling and Classification – notes for the examination19 pagesSection 2: Risk ManagmentLecture 14 Introduction to Risk Management 01:27Lecture 15 Attack Methods 06:42Lecture 16 Local attacks 02:56Lecture 17 Target scanning and enumeration techniques #1 05:52Lecture 18 Target scanning and enumeration techniques #2 03:30Lecture 19 Passive scanning 02:06Lecture 20 Attack Methodologies – notes for the examinationLecture 21 Introduction to risk assessment 06:20Lecture 22 DREAD: Risk assessment model 04:50Lecture 23 DREAD: Exploitability 05:24Lecture 24 EXERCISE: Risk Assessment 07:17Lecture 25 Risk Assessment – notes for the examinationLecture 26 Introduction to Social Engineering and rogue software 04:19Lecture 27 Manipulation tactics 09:01Lecture 28 EXERCISE: Engineering attacks 06:44Lecture 29 SE with BackTrack 07:06Lecture 30 Rogue Software02:28Lecture 31 Fraud tools #10 7:10Lecture 32 Fraud tools #2 06:32Lecture 33 Social Engineering and Rogue Software – notes for the examinationSection 3: Defence in DepthLecture 34 Introduction to Defence in depth 01:32Lecture 35 How to use Defence in depth model? 05:45Lecture 36 DiD: OS and LAN layers 06:39Lecture 37 DiD: Perimeter and Physical Access Layers 06:06Lecture 38 DiD: Demonstration 02:48Lecture 39 Automated attack targeting a service 05:23Lecture 40 Automated user-targeting attack 04:31Lecture 41 The Defence in Depth Model – notes for the examination25 pagesLecture 42 Introduction to Immutable laws of security – Law #1 04:35Lecture 43 Law #2 02:56Lecture 44 Law #3 02:23Lecture 45 Law #401:52Lecture 46 Law #5 03:28Lecture 47 Law #6 02:07Lecture 48 Law #7 01:11Lecture 49 Law #801:43Lecture 50 Law #903:57Lecture 51 Law #1000:48Lecture 52 Laws for administrators 05:59Lecture 53 Immutable Laws of Security – notes for the examination21 pagesSection 4: Disaster RecoveryLecture 54 Introduction to Disaster Recovery 01:33Lecture 55 How to reduce losses? 05:24Lecture 56 Ensuring continous availability 04:08Lecture 57 Threat discovery #1 04:28Lecture 58 Threat discovery #2 03:40Lecture 59 Audit users and keep control accounts05:18Lecture 60 High risk users 03:23Lecture 61 Collecting and analysing evidence 07:13Lecture 62 Forensics example 03:52Lecture 63 CONFICKER: CASE STUDY 07:11Lecture 64 How to reduce losses – notes for the examination31 pagesSection 5: Application SecurityLecture 65 Introduction to Application Security 08:18Lecture 66 Attacks on applications 10:18Lecture 67 SQL Injection 08:10Lecture 68 EXERCISE: Analyze the application13:31Lecture 69 Blind SQL Injection 09:33Lecture 70 Automated SQL Injection 11:44Lecture 71 Cross-site scripting – XSS10:10Lecture 72 Application Attacks – notes for the examination29 pagesLecture 73 Program security assessment 05:10Lecture 74 Unsafe applications 10:11Lecture 75 Program Security Assessment – notes for the examination10 pagesSection 6: Application Security – Configuration and ManagmentLecture 76 Heres what youll learn in this module 01:05Lecture 77 Managing applicaltions08:26Lecture 78 Software updates 02:39Lecture 79 MS Update 06:53Lecture 80 System Center Configuration Manager 02:46Lecture 81 Blocking applications 07:35Lecture 82 Software restrictions policies 05:57Lecture 83 EXERCISE: Application control rules12:11Lecture 84 Isolating applications 06:30Lecture 85 How to protect users without interrupting their work – notes for the examination25 pagesSection 7: CryptographyLecture 86 Introduction to cryptography 09:42Lecture 87 History of ciphers 10:57Lecture 88 Symmetric and asymmetric ciphers 06:13Lecture 89 Symmetric-key algorithms 05:49Lecture 90 Block ciphers 06:01Lecture 91 Data encryption standard 06:51Lecture 92 DES-X 07:35Lecture 93 Advanced encryption standards 05:28Lecture 94 Block cipher modes 07:16
Reviews
There are no reviews yet.