Module 01 – WATCH THIS FIRST

  1. Workbook (Pdf)
  2. Overview
  3. Just The Basics
  4. Review Quiz (Number of attempts allowed: Unlimited)

Module 03 – SECURITY OPERATIONS & ADMINISTRATION

  1. Workbook (Pdf)
  2. The ISC2 Code Of Professional Ethics
  3. Identify And Classify Assets
  4. Asset Ownership And Privacy Protection
  5. Establish Asset Handling Requirements
  6. Secure Provisioning And Resource Protection
  7. Databases And Data Warehouses
  8. Databases And Data Warehouses Part 2
  9. Foundational Security Operations Concepts
  10. Determine Data Security Controls
  11. Assessment, Test And Audit Strategies
  12. Control Selection And System Requirments
  13. Control Selection And System Requirements Part 2
  14. Participate In Change Management
  15. Implement Recovery Strategies
  16. Implement Recovery Strategies Part 2
  17. Implement Recovery Strategies Part 3
  18. Implement Physical Security
  19. Implement Physical Security Part 2
  20. Personnel Safety And Security Concerns
  21. Patch And Vulnerability Management
  22. Security In The SDLC
  23. Security In The SDLC Part 2
  24. Security Controls In Development Environments
  25. Security Operations, Administration – Key Points
  26. Review Quiz (Number of attempts allowed: Unlimited)

Module 05 – INCIDENT RESPONSE AND RECOVERY

  1. Workbook (Pdf)
  2. Supporting Forensic Investigations
  3. Supporting Forensic Investigations Part 2
  4. Conduct Incident Management
  5. Business Continuity And Disaster Recovery
  6. Business Continuity And Disaster Recovery Pt.2
  7. Incident Response And Recovery – Key Points
  8. Review Quiz (Number of attempts allowed: Unlimited)

Module 07 – NETWORK AND COMMUNICATIONS SECURITY

  1. Workbook (Pdf)
  2. Design Principles In Network Architecture
  3. Design Principles In Network Architecture Part 2
  4. Design Principles In Network Architecture Part 3
  5. Design Principles In Network Architecture Part 4
  6. Design Principles In Network Architecture Part 5
  7. Design Principles In Network Architecture Part 6
  8. Design Principles In Network Architecture Part 7
  9. Design Principles In Network Architecture Part 8
  10. Design Principles In Network Architecture Part 9
  11. Secure Network Components
  12. Secure Network Components Part 2
  13. Secure Network Components Part 3
  14. Implement Secure Communication Channels
  15. Implement Secure Communication Channels Pt.2
  16. Implement Secure Communication Channels Pt.3
  17. Implement Secure Communication Channels Pt.4
  18. Implement Secure Communication Channels Pt.5
  19. Network And Communication Security – Key Points
  20. Review Quiz (Number of attempts allowed: Unlimited)

Module 02 – ACCESS CONTROLS

  1. Workbook (Pdf)
  2. Control Access To Assets
  3. Manage Identification And Authentication
  4. Manage Identification And Authentication Pt.2
  5. Manage Identification And Authentication Pt.3
  6. Integrate Identity As A Third Party Service
  7. Authorization Mechanisms
  8. Authorization Mechanisms Part 2
  9. Authorization Mechanisms Part 3
  10. Authorization Mechanisms Part 4
  11. The Identity And Access Provisioning Lifecycle
  12. Access Control Attacks
  13. Access Controls – Key Points
  14. Review Quiz (Number of attempts allowed: Unlimited)

Module 04 – RISK IDENTIFICATION, MONITORING AND ANALYSIS

  1. Workbook (Pdf)
  2. Review Of Confidentiality, Integrity, Availability
  3. Evaluate And Apply Security Governance Principles
  4. Determine Compliance Requirements
  5. Information Security In A Global Context
  6. Risk Management Concepts
  7. Risk Management Concepts Part 2
  8. Risk Management Concepts Part 3
  9. Threat Modeling Concepts
  10. Risk In The Supply Chain
  11. Assessment And Testing
  12. Assessment And Testing Part 2
  13. Assessment And Testing Part 3
  14. Logging And Monitoring
  15. Logging And Monitoring Part 2
  16. Risk Identification, Monitoring, Analysis Key Pnts
  17. Review Quiz (Number of attempts allowed: Unlimited)

Module 06 – CRYPTOGRAPHY

  1. Workbook (Pdf)
  2. Cryptography… Just What Is It Anyway
  3. Applied Cryptography
  4. Applied Cryptography Part 2
  5. Applied Cryptography Part 3
  6. Applied Cryptography Part 4
  7. Applied Cryptography Part 5
  8. Applied Cryptography Part 6
  9. Applied Cryptography Part 7
  10. Applied Cryptography Part 8
  11. Applied Cryptography Part 9
  12. Cryptography – Key Points
  13. Review Quiz (Number of attempts allowed: Unlimited)

Module 08 – SYSTEMS AND APPLICATION SECURITY

  1. Workbook (Pdf)
  2. Identify And Analyze Malicious Code
  3. Identify And Analyze Malicious Code Part 2
  4. Identify And Analyze Malicious Code Part 3
  5. Endpoint Device Security
  6. Endpoint Device Security Part 2
  7. Cloud Computing
  8. Operate And Secure Virtual Environments
  9. Systems And Application Security – Key Points
  10. Review Quiz (Number of attempts allowed: Unlimited)