Module 01 – WATCH THIS FIRST
- Workbook (Pdf)
- Overview
- Just The Basics
- Review Quiz (Number of attempts allowed: Unlimited)
Module 03 – SECURITY OPERATIONS & ADMINISTRATION
- Workbook (Pdf)
- The ISC2 Code Of Professional Ethics
- Identify And Classify Assets
- Asset Ownership And Privacy Protection
- Establish Asset Handling Requirements
- Secure Provisioning And Resource Protection
- Databases And Data Warehouses
- Databases And Data Warehouses Part 2
- Foundational Security Operations Concepts
- Determine Data Security Controls
- Assessment, Test And Audit Strategies
- Control Selection And System Requirments
- Control Selection And System Requirements Part 2
- Participate In Change Management
- Implement Recovery Strategies
- Implement Recovery Strategies Part 2
- Implement Recovery Strategies Part 3
- Implement Physical Security
- Implement Physical Security Part 2
- Personnel Safety And Security Concerns
- Patch And Vulnerability Management
- Security In The SDLC
- Security In The SDLC Part 2
- Security Controls In Development Environments
- Security Operations, Administration – Key Points
- Review Quiz (Number of attempts allowed: Unlimited)
Module 05 – INCIDENT RESPONSE AND RECOVERY
- Workbook (Pdf)
- Supporting Forensic Investigations
- Supporting Forensic Investigations Part 2
- Conduct Incident Management
- Business Continuity And Disaster Recovery
- Business Continuity And Disaster Recovery Pt.2
- Incident Response And Recovery – Key Points
- Review Quiz (Number of attempts allowed: Unlimited)
Module 07 – NETWORK AND COMMUNICATIONS SECURITY
- Workbook (Pdf)
- Design Principles In Network Architecture
- Design Principles In Network Architecture Part 2
- Design Principles In Network Architecture Part 3
- Design Principles In Network Architecture Part 4
- Design Principles In Network Architecture Part 5
- Design Principles In Network Architecture Part 6
- Design Principles In Network Architecture Part 7
- Design Principles In Network Architecture Part 8
- Design Principles In Network Architecture Part 9
- Secure Network Components
- Secure Network Components Part 2
- Secure Network Components Part 3
- Implement Secure Communication Channels
- Implement Secure Communication Channels Pt.2
- Implement Secure Communication Channels Pt.3
- Implement Secure Communication Channels Pt.4
- Implement Secure Communication Channels Pt.5
- Network And Communication Security – Key Points
- Review Quiz (Number of attempts allowed: Unlimited)
Module 02 – ACCESS CONTROLS
- Workbook (Pdf)
- Control Access To Assets
- Manage Identification And Authentication
- Manage Identification And Authentication Pt.2
- Manage Identification And Authentication Pt.3
- Integrate Identity As A Third Party Service
- Authorization Mechanisms
- Authorization Mechanisms Part 2
- Authorization Mechanisms Part 3
- Authorization Mechanisms Part 4
- The Identity And Access Provisioning Lifecycle
- Access Control Attacks
- Access Controls – Key Points
- Review Quiz (Number of attempts allowed: Unlimited)
Module 04 – RISK IDENTIFICATION, MONITORING AND ANALYSIS
- Workbook (Pdf)
- Review Of Confidentiality, Integrity, Availability
- Evaluate And Apply Security Governance Principles
- Determine Compliance Requirements
- Information Security In A Global Context
- Risk Management Concepts
- Risk Management Concepts Part 2
- Risk Management Concepts Part 3
- Threat Modeling Concepts
- Risk In The Supply Chain
- Assessment And Testing
- Assessment And Testing Part 2
- Assessment And Testing Part 3
- Logging And Monitoring
- Logging And Monitoring Part 2
- Risk Identification, Monitoring, Analysis Key Pnts
- Review Quiz (Number of attempts allowed: Unlimited)
Module 06 – CRYPTOGRAPHY
- Workbook (Pdf)
- Cryptography… Just What Is It Anyway
- Applied Cryptography
- Applied Cryptography Part 2
- Applied Cryptography Part 3
- Applied Cryptography Part 4
- Applied Cryptography Part 5
- Applied Cryptography Part 6
- Applied Cryptography Part 7
- Applied Cryptography Part 8
- Applied Cryptography Part 9
- Cryptography – Key Points
- Review Quiz (Number of attempts allowed: Unlimited)
Module 08 – SYSTEMS AND APPLICATION SECURITY
- Workbook (Pdf)
- Identify And Analyze Malicious Code
- Identify And Analyze Malicious Code Part 2
- Identify And Analyze Malicious Code Part 3
- Endpoint Device Security
- Endpoint Device Security Part 2
- Cloud Computing
- Operate And Secure Virtual Environments
- Systems And Application Security – Key Points
- Review Quiz (Number of attempts allowed: Unlimited)