-
1 Domain 03—Security Engineering1:14
-
2 Objectives1:23
-
3 Security Architecture and Design – Case Study1:42
-
4 Security Engineering1:31
-
5 Architecture Framework2:29
-
6 Zachman Framework2:11
-
7 TOGAF1:45
-
8 ITIL2:32
-
9 Creating a Security Architecture3:0
-
10 Enterprise Security Architecture3:6
-
11 Common Security Services in ESA2:29
-
12 SABSA Framework1:58
-
13 SABSA Matrix5:1
-
14 Business Scenario1:41
-
15 ISO/IEC 27001:2013 Security Standards2:8
-
16 ISO/IEC 27002—Code of Practice for Information Security Management2:37
-
17 Security Models2:6
-
18 State Machine Model1:24
-
19 Multilevel Security Models2:7
-
20 Matrix-Based Model1:48
-
21 Non-Interference Model1:57
-
22 Information flow model1:40
-
23 Examples of Security Models: Bell–LaPadula Confidentiality Model3:13
-
24 Examples of Security Models: Biba Integrity Model2:26
-
25 Examples of Security Models: Clark–Wilson integrity model2:13
-
26 Brewer–Nash, Graham–Denning, and Harrison–Ruzzo–Ullman models2:15
-
27 Business Scenario1:34
-
28 Evaluation Criteria2:4
-
29 CSEC3:20
-
30 Information Technology Security Evaluation Criteria2:20
-
31 Common Criteria2:15
-
32 Common Criteria Evaluation Process1:50
-
33 Common Criteria Levels2:23
-
34 Payment Card Industry Data Security Standard1:51
-
35 Certification and Accreditation1:36
-
36 Certification and Accreditation Standards2:33
-
37 SEI—CMMI2:49
-
38 SEI—CMMI Levels1:46
-
39 Business Scenario2:11
-
40 System Security Architecture2:19
-
41 Mainframes and Other Thin Client Systems2:40
-
42 Middleware and Embedded Systems1:23
-
43 Pervasive Computing and Mobile Computing Devices1:15
-
44 System Components—Processors2:8
-
45 System Components—Memory1:51
-
46 System Components—Storage1:17
-
47 System Components—Trusted Computing Base (TCB)1:23
-
48 System Components—Reference Monitor1:29
-
49 System Components—Trusted Platform Module (TPM)1:38
-
50 System Components—Peripherals and Other Input/Output Devices1:42
-
51 System Components—Operating System1:40
-
52 System Components—Ring Model1:34
-
53 System Components—System Kernel1:54
-
54 Distributed Systems1:34
-
55 Virtualization1:28
-
56 Hypervisor1:45
-
57 Cloud Computing1:10
-
58 Service models2:15
-
59 Grid Computing1:12
-
60 Peer to Peer Networking (P2P)1:20
-
61 Business Scenario1:56
-
62 Security Threats and Countermeasures1:22
-
63 Assessing and Mitigating Vulnerabilities and Threats2:30
-
64 Assessing and Mitigating Vulnerabilities and Threats (contd.)1:54
-
65 Assessing and Mitigating Vulnerabilities and Threats (contd.)2:5
-
66 Best Practices1:45
-
67 Best Practices (contd.)1:30
-
68 Best Practices—Techniques and Technologies1:59
-
69 Best Practices—Techniques and Technologies (contd.)1:30
-
70 Best Practices—Techniques and Technologies (contd.)1:24
-
71 Best Practices—Techniques and Technologies (contd.)1:37
-
72 Best Practices—Techniques and Technologies (contd.)1:42
-
73 Introduction to Cryptography3:40
-
74 Cryptographic Lifecycle1:56
-
75 Algorithm or Protocol Governance1:52
-
76 Cryptography Terms3:45
-
77 Strength of a Cryptosystem2:29
-
78 Cryptography Methods—Substitution Cipher2:31
-
79 Cryptography Methods—Transposition Cipher1:24
-
80 Cryptography Methods—Book or Running Key Cipher2:9
-
81 Cryptography Methods—Concealment Cipher1:43
-
82 Cryptography Methods—Steganography and DRM2:19
-
83 Business Scenario1:36
-
84 Introduction to Symmetric Cryptography3:1
-
85 Symmetric Key Ciphers2:16
-
86 Block Cipher1:47
-
87 Stream Cipher3:2
-
88 Block Cipher Designs1:41
-
89 Data Encryption Standard (DES)2:33
-
90 DES Algorithm2:35
-
91 DES Operation Modes—Electronic Code Book2:1
-
92 DES Operation Modes—Cipher Block Chaining2:7
-
93 DES Operation Modes—Cipher Feed Back2:22
-
94 DES Operation Modes—Output Feed Back1:44
-
95 DES Operation Modes—Counter2:1
-
96 Triple DES2:46
-
97 Advanced Encryption Standard (AES)2:17
-
98 AES Algorithm1:14
-
99 AES Algorithm—Key Expansion and Initial Round1:15
-
100 Advanced Encryption Standard (AES) Algorithm—Rounds3:1
-
101 AES Algorithm—Final Round1:8
-
102 Other Symmetric Systems2:54
-
103 Other Symmetric Systems (contd.)2:11
-
104 Business Scenario1:43
-
105 Introduction to Asymmetric Cryptography3:7
-
106 Introduction to Asymmetric Cryptography—Diagram1:9
-
107 Introduction to RSA Algorithm1:54
-
108 RSA Algorithm Process2:20
-
109 Other Types of Asymmetric Cryptography—Elliptic Curve Cryptosystems2:2
-
110 Other Types of Asymmetric Cryptography—Diffie-Hellman Key Exchange1:35
-
111 Public Key Cryptography2:25
-
112 Symmetric vs. Asymmetric Cryptography3:45
-
113 Advantages and Disadvantages1:54
-
114 Introduction to Public Key Infrastructure3:15
-
115 PKI Certification2:48
-
116 PKI Certification (contd.)1:33
-
117 PKI Steps—Part 11:44
-
118 PKI Steps—Part 21:58
-
119 One-Way Hash2:13
-
120 Hashing Algorithms3:9
-
121 Hashing Algorithms (contd.)2:41
-
122 Salting1:34
-
123 Message Authentication Code (MAC)2:50
-
124 Digital Signatures2:15
-
125 Key Management2:30
-
126 Key Management Principles2:50
-
127 Escrowed Encryption3:44
-
128 Business Scenario1:58
-
129 Need for Physical and Environmental Security2:50
-
130 Business Scenario2:2
-
131 Site and Facility Design Criteria3:27
-
132 Information Protection Environment1:53
-
133 Crime Prevention Through Environmental Design (CPTED)2:2
-
134 Site Location2:38
-
135 Construction2:8
-
136 Support Facilities2:46
-
137 Business Scenario1:51
-
138 Secure Operational Areas4:15
-
139 Business Scenario1:49
-
140 Environmental Controls1:21
-
141 Environmental Controls (Contd.)2:5
-
142 Fire Detection and Suppression1:44
-
143 Power Supply3:3
-
144 Power Supply (contd.)1:57
-
145 HVAC1:43
-
146 Training and Awareness1:23
-
147 Business Scenario1:0
-
148 Quiz0:0
-
149 Summary1:48
-
150 Conclusion1:7