Introduction to Social Engineering and rogue software 04:19
Threat Modelling and Classification - notes for the examination
SE with BackTrack 07:06
Data encryption standard 06:51
Answer sample questions which you can find during the examination
Introduction to Risk Management 01:27
EXERCISE: Analyze the application
Block cipher modes 07:16
Blocking applications 07:35
Digital signature 05:56
Attack Methodologies - notes for the examination
EXERCISE: Application control rules
Risk Assessment - notes for the examination
Planning the PKI 08:33
Software updates 02:39
Asymmetric-key algorithms 08:11
Security issues 04:50
Symmetric and Asymmetric Ciphers - notes for the examination
ELGAMAL 02:05
Passive scanning 02:06
How to use Defence in depth model? 05:45
STRIDE: Tampering with Data 04:28
How to reduce losses? 05:24
Immutable Laws of Security - notes for the examination
Information security - level up 04:04
HASH functions 05:56
Security policy issues 04:50
System Center Configuration Manager 02:46
DiD: Demonstration 02:48
Introduction to Immutable laws of security - Law #1 04:35
Software restrictions policies 05:57
Collecting and analysing evidence 07:13
Certificate life cycle 06:24
EXERCISE: Risk Assessment 07:17
Advanced encryption standards 05:28
Automated SQL Injection 11:44
Stream Ciphers - RC4 03:40
Isolating applications 06:30
What will PKI allow you? 06:29
SQL Injection 08:10
Threat discovery #2 03:40
Program security assessment 05:10
The Defence in Depth Model - notes for the examination
How to reduce losses - notes for the examination
Ensuring continous availability 04:08
High risk users 03:23
Here’s what you’ll learn in this module 01:05
Forensics example 03:52
PKI Administration 07:29
Why are security solutions fallible? 05:42
site scripting - XSS
Application Attacks - notes for the examination
Introduction to cryptography 09:42
Local attacks 02:56
Public key infrastructure
MS Update 06:53
Attack Methods 06:42
Hybrid Schemes 06:24
Symmetric and asymmetric ciphers 06:13
STRIDE: Denial of Service 03:51
DiD: Perimeter and Physical Access Layers 06:06
EXERCISE: Engineering attacks 06:44
Program Security Assessment - notes for the examination
Public Key Infrastructure - Trust but verify - notes for the examination
How to protect users without interrupting their work - notes for the examination
Block ciphers 06:01
Introduction to threat modelling and classification 05:14
Information security 04:13
Introduction to Application Security 08:18
Symmetric-key algorithms 05:49
Automated attack targeting a service 05:23
Quiz 1
RSA 05:33
Fraud tools #2 06:32
Audit users and keep control accounts
Managing applicaltions
Target scanning and enumeration techniques #2 03:30
DiD: OS and LAN layers 06:39
Introduction to cryptology 02:12
DREAD: Risk assessment model 04:50
Attacks on applications 10:18
Social Engineering and Rogue Software - notes for the examination
Unsafe applications 10:11
CONFICKER: CASE STUDY 07:11
Automated user-targeting attack 04:31
What is security? 03:53
Blind SQL Injection 09:33
History of ciphers 10:57
Target scanning and enumeration techniques #1 05:52
Fraud tools #10 7:10
Introduction to risk assessment 06:20
BONUS: Examination - your voucher
Manipulation tactics 09:01
Rogue Software02:28
DREAD: Exploitability 05:24
DES-X 07:35
Security policies - introduction 01:56
Introduction to Disaster Recovery 01:33
EXERCISE: Certificates 08:37
Implementing public key infrastructure 05:39
Threat discovery #1 04:28
Introduction to Defence in depth 01:32
Threat modelling - STRIDE 04:06
STRIDE: Spoofing identity 05:03
======================================================================
This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV
======================================================================