CISSP Part 1

Uncategorized
Wishlist Share
Share Course
Page Link
Share On Social Media

Course Content

CISSP Part 1

  • CISSP Part 1 | Course Introduction | CISSP – Certified Information Systems Security Professional
    21:03
  • CISSP Part 2 | CIA Triad – In Pashto | CISSP – Certified Information Systems Security Professional
    14:53
  • CISSP Laws and Regulations Part 3 | DMCA Digital Millennium Copyright Act in Pashto
    18:38
  • CISSP Laws and Regulations Part 4 | HIPAA – Health Insurance Portability and Accountability Act
    25:15
  • CISSP Laws and Regulations Part 5 | SOX – Sarbanes–Oxley Act of 2002 in Pashto
    11:48
  • CISSP Laws and Regulations Part 6 | GLBA- Gramm–Leach–Bliley Act in Pashto
    11:46
  • CISSP Laws and Regulations Part 7 | GDPR – General Data Protection Regulation in Pashto
    27:15
  • CISSP Laws and Regulations Part 8 | CALEA Communications Assistance for Law Enforcement Act
    08:52
  • CISSP Laws and Regulations Part 9 | COPPA Children’s Online Privacy Protection Act
    09:16
  • CISSP Laws and Regulations Part 10 | FISMA – Federal Information Security Management Act of 2002
    12:35
  • CISSP Laws & Regulations Part 11 PIPEDA Personal Information Protection and Electronic Documents Act
    13:35
  • CISSP Laws and Regulations Part 12 | FERPA Family Educational Rights and Privacy Act
    09:50
  • CISSP Laws and Regulations Part 13 | Wassenaar Arrangement in Pashto
    12:08
  • CISSP Laws and Regulations Part 14 | PCI DSS Payment Card Industry Data Security Standard in Pashto
    19:37
  • CISSP Part 15 | Misconception About Cybersecurity Explained in Pashto
    17:28
  • CISSP Part 16 | Six Threat Vectors – In Pashto
    16:38
  • CISSP Part 17 | Threat Vectors – Scripts Kiddie_ Hackers & Hacktivists – In Pashto
    10:59
  • CISSP Part 18 | Threat Vectors – Mobile Devices – In Pashto
    09:27
  • CISSP Part 19 | Threat Vectors – Networks In Pashto
    10:19
  • CISSP Part 20 | Threat Vectors – Users In Pashto
    12:53
  • CISSP Part 21 | Threat Vectors – Emails Web Applications & Remote Desktop Portal
    18:15
  • CISSP Part 22 | What is NIST and The Purpose of Security in Pashto
    20:01
  • CISSP Part 23 | Security Defense in Depth and Concentric Circle in Pashto
    15:31
  • CISSP Part 24 | Security Defense in Depth and Concentric Circle in Pashto
    11:29
  • Fawad Bacha Introduction to an Organizational Cybersecurity Framework and Architecture Course CISSP
    23:23
  • CISSP Part 25 | Private and Public Cloud Computing in Pashto
    17:10
  • CISSP Part 26 | Hybrid and Community Cloud Computing in Pashto
    21:19
  • CISSP Part 27 | Where Are Amazon, Google, and Microsoft Data Centers Located in Pashto
    08:21
  • CISSP Part 28 | Internet of Things (IoT) – In Pashto
    17:44
  • CISSP Part 29 A | MITER What is Common Vulnerabilities and Exposures (CVE) and CVSS in Pashto
    15:00
  • CISSP Part 30 A | What is Common Weakness Enumeration (CWS) and CWSS In Pashto
    08:07
  • CISSP Part 30 B | SQL Injection Real Life Example and Common Weakness Enumeration (CWS) in Pashto
    12:53
  • CISSP Part 31 A | What is Common Criteria? in Pashto
    23:13
  • CISSP Part 31 B | Common Criteria Walk-Through in Real Life Example in Pashto
    13:00
  • CISSP Part 32 | A Brief introduction to World Wide Web in Pashto
    23:28
  • CISSP Part 33 A | What is Deep Web and Dark Web In Pashto
    16:38
  • CISSP Part 33 B | Dark Web, Deep Web, and Normal Web Walk-Through Tour in Pashto
    12:09
  • CISSP domain 1 – Part 34 A | Short Warm-up Domain 1 Introduction
    13:06
  • CISSP domain 1 – Part 34 B | Policies and Standards
    10:04
  • CISSP domain 1 – Part 34 C | Guidelines, Procedures and Baselines
    15:40
  • CISSP domain 1 – Part 34 D | Policies and Procedures Samples
    00:00
  • CISSP domain 1 – Part 35 | What is Security Frameworks in Pashto
    25:58
  • CISSP domain 1 – Part 36 | What is ISO and IEC
    00:00
  • CISSP domain 1 – Part 37 A | An Introduction to Intellectual Property Laws
    10:42
  • CISSP domain 1 – Part 37 B | Trade Secret
    11:43
  • CISSP domain 1 – Part 37 C | Copyright
    12:41
  • CISSP domain 1 – Part 37 D | Trademark
    11:35
  • CISSP domain 1 – Part 37 E | Patent
    10:57
  • CISSP domain 1 – Part 38 | Senior Management
    13:51
  • CISSP domain 1 – Part 39 | Data Breaches and Notifications
    06:53
  • CISSP domain 1 – Part 40 | Organizational Risk Management Framework
    11:49
  • CISSP domain 1 – Part 41 | Conducting Risk Assessments
    12:25
  • CISSP domain 1 – Part 42 | Acceptable Level of Risk – Risk Management Options
    08:28
  • CISSP domain 1 – Part 43 | Risk Management Framework-RMF
    18:55
  • CISSP domain 1 – Part 44 | The Risk Management lifecycle
    09:10
  • CISSP domain 1 – Part 45 | Risk Analysis and Risk Registers
    11:18
  • CISSP domain 1 – Part 46 | Quantitative Risk Analysis
    22:09
  • CISSP domain 1 – Part 47 A | Types of Attackers -Anonymous
    15:08
  • CISSP domain 1 – Part 47 B | Types of Attacks and Hackers
    18:05
  • CISSP domain 1 – Part 47 C | Attack Tree
    09:45
  • CISSP domain 1 – Part 48 | Security Threat Model and Methodology
    16:22
  • CISSP domain 1 – Part 49 | Disaster in 3 Categories
    13:44
  • CISSP domain 1 – Part 50 A | Business Continuity Plan
    17:31
  • CISSP domain 1 – Part 50 B | Business Continuity Plan
    12:52
  • CISSP Part 29 B | MITER Common Vulnerabilities and Exposures (CVE) Walk-Through in Pashto
    11:14
  • CISSP domain 1 – Part 50 A | Business Continuity Plan
    17:31
  • CISSP domain 1 – Part 50 B | Business Continuity Plan
    12:52
  • CISSP domain 1 – Part 51 A | Business Impact Analysis
    11:58
  • CISSP domain 1 – Part 51 B | Business Impact Analysis
    15:41
  • CISSP domain 1 – Part 51 C | Business Impact Analysis
    05:40
  • CISSP domain 1 – Part 52 A | Personnel Security
    10:52
  • CISSP domain 1 – Part 52 B | Personnel Security 2
    07:59
  • CISSP domain 1 – Part 52 C | Personnel Security – Hiring process
    11:40
  • CISSP domain 1 – Part 52 D | Personnel Security – Onboarding
    05:31
  • CISSP domain 1- Part 52 E | Personnel Security Employee Termination and Security Awareness Training
    16:27
  • CISSP domain 1 – Part 53 | Ethics | CISSP Course
    15:19
  • CISSP domain 2 – Part 54 | Subjects and Objects Access
    15:25
  • CISSP domain 2 – Part 55 A | Information Life Cycle- Data Acquisition and Use
    12:29
  • CISSP domain 2 – Part 55 B | Information Life Cycle- Data Archive and Disposal
    11:52
  • CISSP domain 2 – Part 56 A | Data Classification Levels in Government
    10:46
  • CISSP domain 2 – Part 56 B | Data Classification Levels in Private Sector
    12:28
  • CISSP domain 2 – Part 57 A | Layers of Responsibility CEO CIO
    12:02
  • CISSP domain 2 – Part 57 B | Layers of Responsibility Data Owner – Custodian and Security Admin
    12:29
  • CISSP domain 2 – Part 57 C | Layers of Responsibility Auditor
    08:16
  • CISSP domain 2 – Part 58 | Privacy is different from Security
    10:30
  • CISSP domain 2 – Part 59 | Retention Policy
    15:29
  • CISSP domain 2 – Part 60 A | Paper Records and Disposal
    07:25
  • CISSP domain 2 – Part 60 B | Digital Records and Disposal
    09:18
  • CISSP domain 2 – Part 61 | Protecting Privacy
    06:06
  • CISSP domain 2 – Part 62 | Data Remanence
    10:57
  • CISSP domain 2 – Part 63 | Types of Memory
    15:16
  • CISSP domain 2 – Part 64 A | Types of Safes
    08:09
  • CISSP domain 2 – Part 64 B | Protecting Assets – Data Loss Prevention DLP
    13:15
  • CISSP domain 3 – Part 65 | Short Intro of Domain 3
    05:09
  • CISSP domain 3 – Part 66 | System Architecture
    12:41
  • CISSP domain 3 – Part 67 | Computer Architecture and The Ring Model
    09:52
  • CISSP domain 3 – Part 68 | Motherboard
    08:17
  • CISSP domain 3 – Part 69 A | Central Processing Unit CPU 1
    10:53
  • CISSP domain 3 – Part 69 B | CPU Thread and Processing
    13:47
  • CISSP domain 3 – Part 70 | Buffer Overflow in Hardware and Software
    15:23
  • CISSP domain 3 – Part 71 | Operating Systems
    17:48
  • CISSP domain 3 – Part 72 A | Virtualization
    13:15
  • CISSP domain 3 – Part 72 B | Virtualization – Hypervisor
    10:16
  • CISSP domain 3 – Part 73 A | System Security Architecture – Trusted Computing Base
    09:23
  • CISSP domain 3 – Part 73 B | System Security Architecture – Security Perimeter
    05:52
  • CISSP domain 3 – Part 73 C | System Security Architecture – Reference Monitor
    10:29
  • CISSP domain 3 – Part 74 A | Security Models Fundamental Concepts
  • CISSP domain 3 – Part 74 B | Security Models – Bell–LaPadula Security Model
    13:56
  • CISSP domain 3 – Part 74 C | Security Models – Biba Security Model
    12:00
  • CISSP domain 3 – Part 74 D | Security Models – Clark-Wilson and Non-interference Security Model
    13:59
  • CISSP domain 3 – Part 75 | Certification vs Accreditation
    10:29
  • CISSP domain 3 – Part 76 | Open vs Closed System
    08:17
  • CISSP domain 3 – Part 77 A | Client Based – Mobile System Security
    13:49
  • CISSP domain 3 – Part 77 B | Grid Computing and Peer to Peer Computer System
    10:31
  • CISSP domain 3 – Part 78 | Mobile Devices Threats and Security
    11:48
  • CISSP domain 3 – Part 79 A | Cloud Computing
    15:10
  • CISSP domain 3 – Part 79 B | Cloud Computing Amazon AWS Walk-Through
    07:38
  • CISSP domain 3 – Part 80 | IoT Embedded System
    10:08
  • CISSP domain 3 – Part 81 | Parallel Computing
    06:59
  • CISSP domain 3 – Part 82 A | Industrial Control System – ICS Introduction
    10:40
  • CISSP domain 3 – Part 82 B | Industrial Control System ICS – RTU – Programmable Logic Controller PLC
    11:51
  • CISSP domain 3 – Part 82 C | Distributed Control System DCS – SCADA
    10:37
  • CISSP domain 3 – Part 82 D | SCADA Threats and Security
    16:18
  • CISSP domain 3 – Part 82 E | SCADA Real Life Cyberattack
    10:21
  • CISSP domain 3 – Part 83 | What is Cryptography
    12:15
  • CISSP domain 3 – Part 84 A | Timeline of Cryptography
    14:26
  • CISSP domain 3 – Part 84 B | Timeline of Cryptography
    12:42
  • CISSP domain 3 – Part 85 | What is Cryptosystem and Algorithm
    16:12
  • CISSP domain 3 – Part 86 | One Time Passcode Types of Cipher and Steganography
    10:36
  • CISSP domain 3 – Part 87 A | Symmetric Algorithm – DES
    11:37
  • CISSP domain 3 – Part 87 B | Symmetric Algorithm – Brute Force Attack – 3 DES
    10:09
  • CISSP domain 3 – Part 87 C | Symmetric Algorithm – AES
    10:23
  • CISSP domain 3 – Part 88-90 | Asymmetric Algorithm
    05:11
  • CISSP domain 3 – Part 91 A | Introduction to Physical Security
    11:36
  • CISSP domain 3 – Part 91 B | Physical Security and Alarm and Sensor system
    09:40
  • CISSP domain 3 – Part 91 C | Front Desk Tailgating – Mantrap – Turnstiles
    11:42
  • CISSP domain 3 – Part 91 D | Contraband Check
    08:32
  • CISSP domain 3 – Part 91 E | Human or Dog Guard
    08:08
  • CISSP domain 3 – Part 91 F | Dumpster Diving
    06:49
  • CISSP domain 3 – Part 91 G | Video Surveillance System DVR NVR CCTV
    11:17
  • CISSP domain 3 – Part 91 H | Lightning Security
    09:11
  • CISSP domain 3 – Part 92 | Fences Gates and Bollards
    09:55
  • CISSP domain 3 – Part 93 | Types of Locks
    11:49
  • CISSP domain 3 – Part 94 – Types of Smart Cards
    07:32
  • CISSP domain 3 – Part 95 | Facilities Selection and Construction Check Up
    11:08
  • CISSP domain 3 – Part 96 | Data Center
    13:13
  • CISSP domain 3 – Part 97 A | Electricity | Electrical Power | Types of Electricity
    11:05
  • CISSP domain 3 – Part 97 B | Electricity | Electrical Power | Power Fluctuation
    11:18
  • CISSP domain 3 – Part 98 A | Fire Detector to secure the system with Alarm
    12:08
  • CISSP domain 3 – Part 98 B | Fire Detection, Alarm Optical and Heat system and Suppression
    10:49
  • CISSP domain 4 – Part 99 | Short Introductions | Communications and Network Security
    08:11
  • CISSP domain 4 – Part 100 A | Network Basics and Definitions
    09:33
  • CISSP domain 4 – Part 100 B | Network Basics and Definitions
    10:16
  • CISSP domain 4 – Part 101 | OSI Model
    14:14
  • CISSP domain 4 – Part 102 | TCP_IP Model and Real World Example
    14:51
  • CISSP domain 4 – Part 103 | TCP Further Discussion
    12:15
  • CISSP domain 4 – Part 104 A | IPv4 and IPv6 Addresses
    10:25
  • CISSP domain 4 – Part 104 B | IPv4 and IPv6 Addresses Real Life Example
    18:46
  • CISSP Domain 4 – Part 105 | Types of Ports – Analog vs Digital Signal and Asynchronous & Synchronous
    11:42
  • CISSP domain 4 – Part 106 | Types of Cables
    14:14
  • CISSP domain4-Part 107 | FHSS-Frequency Hopping Spread Spectrum-DSSS-Direct Sequence Spread Spectrum
    15:18
  • CISSP domain 4 – Part 108 A | Wireless Technology
    12:17
  • CISSP domain 4 – Part 108 B | Wireless Technology
    13:30
  • CISSP domain 4 – Part 108 C | Wireless Technology
    11:41
  • CISSP domain 4 – Part 109 | Bluetooth and its Attacks
    12:04
  • CISSP domain 4 – Part 110 | Best Practices for Securing WLANs
    12:39
  • CISSP domain 4 – Part 111 | Satellite Network
    09:41
  • CISSP domain 4 – Part 112 | Mobile Wireless Communication
    13:15
  • CISSP domain 4 – Part 113 | Types of Network Topologies
    13:57
  • CISSP domain 4 – Part 113 | Types of Network Topologies
    13:57
  • CISSP domain 4 – Part 114 | CSMA ARP MAC Media Access Control
    15:39
  • CISSP domain 4 – Part 115 | Dynamic Host Configuration Protocol – DHCP and ICMP
    14:18
  • CISSP domain 4 – Part 116 | Simple Network Management Protocol – SNMP
    10:58
  • CISSP domain 4 – Part 117 A | Domain Name System DNS | DNS server and how it works
    12:08
  • CISSP domain 4 – Part 117 B | DNS Root Servers Around The World
    07:19
  • CISSP domain 4 – Part 118 | Simple Mail Transfer Protocol – SMTP POP3 IMAP
    18:15
  • CISSP domain 4 – Part 119 | Network Address Translation – NAT
    12:48
  • CISSP domain 4 – Part 120 | What are Routers, Hubs, Switches, Bridges
    16:02
  • CISSP Domain 4 – Part 121 | What is Private Branch Exchange System PBX and Phreaker – Phone Hackers
    18:55
  • CISSP domain 4 – Part 122 A | What is Firewall and Types of Firewall
    13:44
  • CISSP domain 4 – Part 122 B | What is Firewall and Types of Firewall
    10:36
  • CISSP domain 4 – Part 122 C | What is Firewall and Types of Firewall
    16:12
  • CISSP domain 4 – Part 123 | What is a Proxy Server
    15:33
  • CISSP domain 4 – Part 124 | What is a Honeypot?
    12:53
  • CISSP domain 4 – Part 125 | What is a VPN_ Virtual Private Network
    10:51
  • CISSP domain 5 – Part 126 | Introduction to Domain 5 Identity and Access Management
    11:19
  • CISSP domain 5 – Part 127 | Subject to Objects and Access Control
    12:19
  • CISSP domain 5 – Part 128 | Centralized and Decentralized Access Control
    14:44
  • CISSP domain 5 – Part 129 A | Authentication Something You Know Type 1
    11:37
  • CISSP domain 5 – Part 129 B | Authentication Something You Know Type 1
    12:53
  • CISSP domain 5 – Part 130 | Authentication Something You Have Type 2
    12:08
  • CISSP domain 5 – Part 131 | Authentication Something You Are Type 3
    15:15
  • CISSP Domain 5 | Part 132 – Authorization Accountability and Auditing
    12:32
  • CISSP domain 5 – Part 133 | Identity Management System and Active Directory
    09:41
  • CISSP domain 5 – Part 134 | Single Sign On SSO
    10:46
  • CISSP domain 5 – Part 135 | OAuth, SAML and Identity Provider
    15:07
  • CISSP domain 5 – Part 136 | Kerberos – The Network Authentication Protocol
    13:11
  • CISSP domain 5 – Part 137 | SESAME Authentication Protocol
    11:09
  • CISSP Domain 5 – Part 138 | RADIUS, DIAMETER, PAP, CHAP Authentication Protocols
    17:19
  • CISSP domain 5 – Part 139 A | Security Domain and Thin Clients
    14:09
  • CISSP domain 5 – Part 139 B | Security Domain and Auditing
    13:16
  • CISSP domain 5 – Part 140 | Protecting Audit Logs and What is SIEM System
    15:57
  • What Is Cybersecurity Join Cyber Pashto Premium Now
    03:11

Student Ratings & Reviews

No Review Yet
No Review Yet