Course Content
CISSP Part 1
-
CISSP Part 1 | Course Introduction | CISSP – Certified Information Systems Security Professional
21:03 -
CISSP Part 2 | CIA Triad – In Pashto | CISSP – Certified Information Systems Security Professional
14:53 -
CISSP Laws and Regulations Part 3 | DMCA Digital Millennium Copyright Act in Pashto
18:38 -
CISSP Laws and Regulations Part 4 | HIPAA – Health Insurance Portability and Accountability Act
25:15 -
CISSP Laws and Regulations Part 5 | SOX – Sarbanes–Oxley Act of 2002 in Pashto
11:48 -
CISSP Laws and Regulations Part 6 | GLBA- Gramm–Leach–Bliley Act in Pashto
11:46 -
CISSP Laws and Regulations Part 7 | GDPR – General Data Protection Regulation in Pashto
27:15 -
CISSP Laws and Regulations Part 8 | CALEA Communications Assistance for Law Enforcement Act
08:52 -
CISSP Laws and Regulations Part 9 | COPPA Children’s Online Privacy Protection Act
09:16 -
CISSP Laws and Regulations Part 10 | FISMA – Federal Information Security Management Act of 2002
12:35 -
CISSP Laws & Regulations Part 11 PIPEDA Personal Information Protection and Electronic Documents Act
13:35 -
CISSP Laws and Regulations Part 12 | FERPA Family Educational Rights and Privacy Act
09:50 -
CISSP Laws and Regulations Part 13 | Wassenaar Arrangement in Pashto
12:08 -
CISSP Laws and Regulations Part 14 | PCI DSS Payment Card Industry Data Security Standard in Pashto
19:37 -
CISSP Part 15 | Misconception About Cybersecurity Explained in Pashto
17:28 -
CISSP Part 16 | Six Threat Vectors – In Pashto
16:38 -
CISSP Part 17 | Threat Vectors – Scripts Kiddie_ Hackers & Hacktivists – In Pashto
10:59 -
CISSP Part 18 | Threat Vectors – Mobile Devices – In Pashto
09:27 -
CISSP Part 19 | Threat Vectors – Networks In Pashto
10:19 -
CISSP Part 20 | Threat Vectors – Users In Pashto
12:53 -
CISSP Part 21 | Threat Vectors – Emails Web Applications & Remote Desktop Portal
18:15 -
CISSP Part 22 | What is NIST and The Purpose of Security in Pashto
20:01 -
CISSP Part 23 | Security Defense in Depth and Concentric Circle in Pashto
15:31 -
CISSP Part 24 | Security Defense in Depth and Concentric Circle in Pashto
11:29 -
Fawad Bacha Introduction to an Organizational Cybersecurity Framework and Architecture Course CISSP
23:23 -
CISSP Part 25 | Private and Public Cloud Computing in Pashto
17:10 -
CISSP Part 26 | Hybrid and Community Cloud Computing in Pashto
21:19 -
CISSP Part 27 | Where Are Amazon, Google, and Microsoft Data Centers Located in Pashto
08:21 -
CISSP Part 28 | Internet of Things (IoT) – In Pashto
17:44 -
CISSP Part 29 A | MITER What is Common Vulnerabilities and Exposures (CVE) and CVSS in Pashto
15:00 -
CISSP Part 30 A | What is Common Weakness Enumeration (CWS) and CWSS In Pashto
08:07 -
CISSP Part 30 B | SQL Injection Real Life Example and Common Weakness Enumeration (CWS) in Pashto
12:53 -
CISSP Part 31 A | What is Common Criteria? in Pashto
23:13 -
CISSP Part 31 B | Common Criteria Walk-Through in Real Life Example in Pashto
13:00 -
CISSP Part 32 | A Brief introduction to World Wide Web in Pashto
23:28 -
CISSP Part 33 A | What is Deep Web and Dark Web In Pashto
16:38 -
CISSP Part 33 B | Dark Web, Deep Web, and Normal Web Walk-Through Tour in Pashto
12:09 -
CISSP domain 1 – Part 34 A | Short Warm-up Domain 1 Introduction
13:06 -
CISSP domain 1 – Part 34 B | Policies and Standards
10:04 -
CISSP domain 1 – Part 34 C | Guidelines, Procedures and Baselines
15:40 -
CISSP domain 1 – Part 34 D | Policies and Procedures Samples
00:00 -
CISSP domain 1 – Part 35 | What is Security Frameworks in Pashto
25:58 -
CISSP domain 1 – Part 36 | What is ISO and IEC
00:00 -
CISSP domain 1 – Part 37 A | An Introduction to Intellectual Property Laws
10:42 -
CISSP domain 1 – Part 37 B | Trade Secret
11:43 -
CISSP domain 1 – Part 37 C | Copyright
12:41 -
CISSP domain 1 – Part 37 D | Trademark
11:35 -
CISSP domain 1 – Part 37 E | Patent
10:57 -
CISSP domain 1 – Part 38 | Senior Management
13:51 -
CISSP domain 1 – Part 39 | Data Breaches and Notifications
06:53 -
CISSP domain 1 – Part 40 | Organizational Risk Management Framework
11:49 -
CISSP domain 1 – Part 41 | Conducting Risk Assessments
12:25 -
CISSP domain 1 – Part 42 | Acceptable Level of Risk – Risk Management Options
08:28 -
CISSP domain 1 – Part 43 | Risk Management Framework-RMF
18:55 -
CISSP domain 1 – Part 44 | The Risk Management lifecycle
09:10 -
CISSP domain 1 – Part 45 | Risk Analysis and Risk Registers
11:18 -
CISSP domain 1 – Part 46 | Quantitative Risk Analysis
22:09 -
CISSP domain 1 – Part 47 A | Types of Attackers -Anonymous
15:08 -
CISSP domain 1 – Part 47 B | Types of Attacks and Hackers
18:05 -
CISSP domain 1 – Part 47 C | Attack Tree
09:45 -
CISSP domain 1 – Part 48 | Security Threat Model and Methodology
16:22 -
CISSP domain 1 – Part 49 | Disaster in 3 Categories
13:44 -
CISSP domain 1 – Part 50 A | Business Continuity Plan
17:31 -
CISSP domain 1 – Part 50 B | Business Continuity Plan
12:52 -
CISSP Part 29 B | MITER Common Vulnerabilities and Exposures (CVE) Walk-Through in Pashto
11:14 -
CISSP domain 1 – Part 50 A | Business Continuity Plan
17:31 -
CISSP domain 1 – Part 50 B | Business Continuity Plan
12:52 -
CISSP domain 1 – Part 51 A | Business Impact Analysis
11:58 -
CISSP domain 1 – Part 51 B | Business Impact Analysis
15:41 -
CISSP domain 1 – Part 51 C | Business Impact Analysis
05:40 -
CISSP domain 1 – Part 52 A | Personnel Security
10:52 -
CISSP domain 1 – Part 52 B | Personnel Security 2
07:59 -
CISSP domain 1 – Part 52 C | Personnel Security – Hiring process
11:40 -
CISSP domain 1 – Part 52 D | Personnel Security – Onboarding
05:31 -
CISSP domain 1- Part 52 E | Personnel Security Employee Termination and Security Awareness Training
16:27 -
CISSP domain 1 – Part 53 | Ethics | CISSP Course
15:19 -
CISSP domain 2 – Part 54 | Subjects and Objects Access
15:25 -
CISSP domain 2 – Part 55 A | Information Life Cycle- Data Acquisition and Use
12:29 -
CISSP domain 2 – Part 55 B | Information Life Cycle- Data Archive and Disposal
11:52 -
CISSP domain 2 – Part 56 A | Data Classification Levels in Government
10:46 -
CISSP domain 2 – Part 56 B | Data Classification Levels in Private Sector
12:28 -
CISSP domain 2 – Part 57 A | Layers of Responsibility CEO CIO
12:02 -
CISSP domain 2 – Part 57 B | Layers of Responsibility Data Owner – Custodian and Security Admin
12:29 -
CISSP domain 2 – Part 57 C | Layers of Responsibility Auditor
08:16 -
CISSP domain 2 – Part 58 | Privacy is different from Security
10:30 -
CISSP domain 2 – Part 59 | Retention Policy
15:29 -
CISSP domain 2 – Part 60 A | Paper Records and Disposal
07:25 -
CISSP domain 2 – Part 60 B | Digital Records and Disposal
09:18 -
CISSP domain 2 – Part 61 | Protecting Privacy
06:06 -
CISSP domain 2 – Part 62 | Data Remanence
10:57 -
CISSP domain 2 – Part 63 | Types of Memory
15:16 -
CISSP domain 2 – Part 64 A | Types of Safes
08:09 -
CISSP domain 2 – Part 64 B | Protecting Assets – Data Loss Prevention DLP
13:15 -
CISSP domain 3 – Part 65 | Short Intro of Domain 3
05:09 -
CISSP domain 3 – Part 66 | System Architecture
12:41 -
CISSP domain 3 – Part 67 | Computer Architecture and The Ring Model
09:52 -
CISSP domain 3 – Part 68 | Motherboard
08:17 -
CISSP domain 3 – Part 69 A | Central Processing Unit CPU 1
10:53 -
CISSP domain 3 – Part 69 B | CPU Thread and Processing
13:47 -
CISSP domain 3 – Part 70 | Buffer Overflow in Hardware and Software
15:23 -
CISSP domain 3 – Part 71 | Operating Systems
17:48 -
CISSP domain 3 – Part 72 A | Virtualization
13:15 -
CISSP domain 3 – Part 72 B | Virtualization – Hypervisor
10:16 -
CISSP domain 3 – Part 73 A | System Security Architecture – Trusted Computing Base
09:23 -
CISSP domain 3 – Part 73 B | System Security Architecture – Security Perimeter
05:52 -
CISSP domain 3 – Part 73 C | System Security Architecture – Reference Monitor
10:29 -
CISSP domain 3 – Part 74 A | Security Models Fundamental Concepts
-
CISSP domain 3 – Part 74 B | Security Models – Bell–LaPadula Security Model
13:56 -
CISSP domain 3 – Part 74 C | Security Models – Biba Security Model
12:00 -
CISSP domain 3 – Part 74 D | Security Models – Clark-Wilson and Non-interference Security Model
13:59 -
CISSP domain 3 – Part 75 | Certification vs Accreditation
10:29 -
CISSP domain 3 – Part 76 | Open vs Closed System
08:17 -
CISSP domain 3 – Part 77 A | Client Based – Mobile System Security
13:49 -
CISSP domain 3 – Part 77 B | Grid Computing and Peer to Peer Computer System
10:31 -
CISSP domain 3 – Part 78 | Mobile Devices Threats and Security
11:48 -
CISSP domain 3 – Part 79 A | Cloud Computing
15:10 -
CISSP domain 3 – Part 79 B | Cloud Computing Amazon AWS Walk-Through
07:38 -
CISSP domain 3 – Part 80 | IoT Embedded System
10:08 -
CISSP domain 3 – Part 81 | Parallel Computing
06:59 -
CISSP domain 3 – Part 82 A | Industrial Control System – ICS Introduction
10:40 -
CISSP domain 3 – Part 82 B | Industrial Control System ICS – RTU – Programmable Logic Controller PLC
11:51 -
CISSP domain 3 – Part 82 C | Distributed Control System DCS – SCADA
10:37 -
CISSP domain 3 – Part 82 D | SCADA Threats and Security
16:18 -
CISSP domain 3 – Part 82 E | SCADA Real Life Cyberattack
10:21 -
CISSP domain 3 – Part 83 | What is Cryptography
12:15 -
CISSP domain 3 – Part 84 A | Timeline of Cryptography
14:26 -
CISSP domain 3 – Part 84 B | Timeline of Cryptography
12:42 -
CISSP domain 3 – Part 85 | What is Cryptosystem and Algorithm
16:12 -
CISSP domain 3 – Part 86 | One Time Passcode Types of Cipher and Steganography
10:36 -
CISSP domain 3 – Part 87 A | Symmetric Algorithm – DES
11:37 -
CISSP domain 3 – Part 87 B | Symmetric Algorithm – Brute Force Attack – 3 DES
10:09 -
CISSP domain 3 – Part 87 C | Symmetric Algorithm – AES
10:23 -
CISSP domain 3 – Part 88-90 | Asymmetric Algorithm
05:11 -
CISSP domain 3 – Part 91 A | Introduction to Physical Security
11:36 -
CISSP domain 3 – Part 91 B | Physical Security and Alarm and Sensor system
09:40 -
CISSP domain 3 – Part 91 C | Front Desk Tailgating – Mantrap – Turnstiles
11:42 -
CISSP domain 3 – Part 91 D | Contraband Check
08:32 -
CISSP domain 3 – Part 91 E | Human or Dog Guard
08:08 -
CISSP domain 3 – Part 91 F | Dumpster Diving
06:49 -
CISSP domain 3 – Part 91 G | Video Surveillance System DVR NVR CCTV
11:17 -
CISSP domain 3 – Part 91 H | Lightning Security
09:11 -
CISSP domain 3 – Part 92 | Fences Gates and Bollards
09:55 -
CISSP domain 3 – Part 93 | Types of Locks
11:49 -
CISSP domain 3 – Part 94 – Types of Smart Cards
07:32 -
CISSP domain 3 – Part 95 | Facilities Selection and Construction Check Up
11:08 -
CISSP domain 3 – Part 96 | Data Center
13:13 -
CISSP domain 3 – Part 97 A | Electricity | Electrical Power | Types of Electricity
11:05 -
CISSP domain 3 – Part 97 B | Electricity | Electrical Power | Power Fluctuation
11:18 -
CISSP domain 3 – Part 98 A | Fire Detector to secure the system with Alarm
12:08 -
CISSP domain 3 – Part 98 B | Fire Detection, Alarm Optical and Heat system and Suppression
10:49 -
CISSP domain 4 – Part 99 | Short Introductions | Communications and Network Security
08:11 -
CISSP domain 4 – Part 100 A | Network Basics and Definitions
09:33 -
CISSP domain 4 – Part 100 B | Network Basics and Definitions
10:16 -
CISSP domain 4 – Part 101 | OSI Model
14:14 -
CISSP domain 4 – Part 102 | TCP_IP Model and Real World Example
14:51 -
CISSP domain 4 – Part 103 | TCP Further Discussion
12:15 -
CISSP domain 4 – Part 104 A | IPv4 and IPv6 Addresses
10:25 -
CISSP domain 4 – Part 104 B | IPv4 and IPv6 Addresses Real Life Example
18:46 -
CISSP Domain 4 – Part 105 | Types of Ports – Analog vs Digital Signal and Asynchronous & Synchronous
11:42 -
CISSP domain 4 – Part 106 | Types of Cables
14:14 -
CISSP domain4-Part 107 | FHSS-Frequency Hopping Spread Spectrum-DSSS-Direct Sequence Spread Spectrum
15:18 -
CISSP domain 4 – Part 108 A | Wireless Technology
12:17 -
CISSP domain 4 – Part 108 B | Wireless Technology
13:30 -
CISSP domain 4 – Part 108 C | Wireless Technology
11:41 -
CISSP domain 4 – Part 109 | Bluetooth and its Attacks
12:04 -
CISSP domain 4 – Part 110 | Best Practices for Securing WLANs
12:39 -
CISSP domain 4 – Part 111 | Satellite Network
09:41 -
CISSP domain 4 – Part 112 | Mobile Wireless Communication
13:15 -
CISSP domain 4 – Part 113 | Types of Network Topologies
13:57 -
CISSP domain 4 – Part 113 | Types of Network Topologies
13:57 -
CISSP domain 4 – Part 114 | CSMA ARP MAC Media Access Control
15:39 -
CISSP domain 4 – Part 115 | Dynamic Host Configuration Protocol – DHCP and ICMP
14:18 -
CISSP domain 4 – Part 116 | Simple Network Management Protocol – SNMP
10:58 -
CISSP domain 4 – Part 117 A | Domain Name System DNS | DNS server and how it works
12:08 -
CISSP domain 4 – Part 117 B | DNS Root Servers Around The World
07:19 -
CISSP domain 4 – Part 118 | Simple Mail Transfer Protocol – SMTP POP3 IMAP
18:15 -
CISSP domain 4 – Part 119 | Network Address Translation – NAT
12:48 -
CISSP domain 4 – Part 120 | What are Routers, Hubs, Switches, Bridges
16:02 -
CISSP Domain 4 – Part 121 | What is Private Branch Exchange System PBX and Phreaker – Phone Hackers
18:55 -
CISSP domain 4 – Part 122 A | What is Firewall and Types of Firewall
13:44 -
CISSP domain 4 – Part 122 B | What is Firewall and Types of Firewall
10:36 -
CISSP domain 4 – Part 122 C | What is Firewall and Types of Firewall
16:12 -
CISSP domain 4 – Part 123 | What is a Proxy Server
15:33 -
CISSP domain 4 – Part 124 | What is a Honeypot?
12:53 -
CISSP domain 4 – Part 125 | What is a VPN_ Virtual Private Network
10:51 -
CISSP domain 5 – Part 126 | Introduction to Domain 5 Identity and Access Management
11:19 -
CISSP domain 5 – Part 127 | Subject to Objects and Access Control
12:19 -
CISSP domain 5 – Part 128 | Centralized and Decentralized Access Control
14:44 -
CISSP domain 5 – Part 129 A | Authentication Something You Know Type 1
11:37 -
CISSP domain 5 – Part 129 B | Authentication Something You Know Type 1
12:53 -
CISSP domain 5 – Part 130 | Authentication Something You Have Type 2
12:08 -
CISSP domain 5 – Part 131 | Authentication Something You Are Type 3
15:15 -
CISSP Domain 5 | Part 132 – Authorization Accountability and Auditing
12:32 -
CISSP domain 5 – Part 133 | Identity Management System and Active Directory
09:41 -
CISSP domain 5 – Part 134 | Single Sign On SSO
10:46 -
CISSP domain 5 – Part 135 | OAuth, SAML and Identity Provider
15:07 -
CISSP domain 5 – Part 136 | Kerberos – The Network Authentication Protocol
13:11 -
CISSP domain 5 – Part 137 | SESAME Authentication Protocol
11:09 -
CISSP Domain 5 – Part 138 | RADIUS, DIAMETER, PAP, CHAP Authentication Protocols
17:19 -
CISSP domain 5 – Part 139 A | Security Domain and Thin Clients
14:09 -
CISSP domain 5 – Part 139 B | Security Domain and Auditing
13:16 -
CISSP domain 5 – Part 140 | Protecting Audit Logs and What is SIEM System
15:57 -
What Is Cybersecurity Join Cyber Pashto Premium Now
03:11
Student Ratings & Reviews
No Review Yet