- Certification Overview
- Exam Objectives
- Instructor Introduction
- ISC CiC Course Intro
- 1.0 Module 1 Overview
- 1.1.5 Password Security
- 1.1.6 Whiteboard - Multifactor Authentication (MFA)
- 1.2 Understand the risk management process
- 1.2.1 Risk Management
- 1.2.2 Risk Identification assessment and treatment
- 1.3 Understand security controls
- 1.3.1 Technical Controls
- 1.3.2 Administrative Controls
- 1.3.3 Physical Controls
- 1.3.4 Whiteboard Discussion - Controls1.3.5 Demonstration - AWS Access Controls
- 1.4 - Understand ISC2 Code of Ethics
- 1.4.1 Professional Code of Ethics
- 1.5 Understand Governance processes
- 1.5.1 Standards, Regulations, etc
- 1.5.2 Security Policies
- 1.5.3 Module Summary Review
- 1.5.4 Module Review Questions
- 2.0 Module 2 Overview
- 2.1 Understand Business Continuity
- 2.1.1 Business Continuity
- 2.1.2 Components of a Business Continuity Plan
- 2.2.1 Disaster Recovery
- 2.2.2 RTO-RPO
- 2.3 Understand Business Response
- 2.3.1 Incident Response
- 2.3.2 Post Incident Review
- 2.3.3 Module Summary Review
- 2.3.4 Module Review Questions
- 3.0 Module 3 Overview
- 3.1 Understand physical access controls
- 3.1.1 Defense In Depth
- 3.1.2 Compare Physical Control Types
- 3.1.3 Monitoring Controls
- 3.2 Describe logical access controls
- 3.2.1 Logical Access controls
- 3.2.2 Principle of least privilege
- 3.2.3 Segregation of duties
- 3.2.4 Whiteboard - Access Control
- 3.2.5 Demonstration - Cloud IAM Sequence 32
- 3.2.6 Module Summary Review
- 3.2.7 Module Review Questions
- 4.0 Module 4 Overview
- 4.1 Understanding computer networking
- 4.1.1 Network Security Design
- 4.1.2 Whiteboard - Networking Concepts
- 4.1.3 Networking protocols and ports
- 4.1.4 Demonstration - AWS VPC
- 4.2 Understand Network Threats
- 4.2.1 Types of network (cyber) threats and attacks
- 4.2.2 Threat Actors
- 4.2.3 Tools used to identify and prevent threats
- 4.2.4 Whiteboard Discussion - DDoS attacks
- 4.3 Network Security Infrastructure
- 4.3.1 On Premises Architecture
- 4.3.2 Data Center Design Discussion
- 4.3.3 Cloud Architecture Service and Deployment Models
- 4.3.4 Managed Service Providers
- 4.3.5 Service Level Agreements (SLA)
- 4.3.6 Shared Security Model
- 4.3.7 Zero Trust
- 4.3.8 Module Summary Review
- 4.3.9 Module Review Questions
- 5.0 Module 5 Overview
- 5.1 Understand Data Security
- 5.1.1 Data Security Fundamentals
- 5.1.2 Data Handling Best Practices
- 5.1.3 Encryption
- 5.1.4 Data Security Compliance
- 5.2 Understand System Hardening
- 5.2.1 System Hardening
- 5.2.2 Configuration Management
- 5.3 Understanding Best Practice Security Policies
- 5.3.1 Common Security Policies
- 5.3.2 Demonstration - AUP
- 5.3.3 Demonstration - Privacy Policy
- 5.4 Security Awareness Training
- 5.4.1 Importance of Security Awareness Training
- 5.4.2 Social Engineering
- 5.4.3 Module Summary Review
- 5.4.4 Module Review Questions
- 5.4.5 Next Steps and Course Closeout
- 1.1 Security Architecture
- 1.2 Why Cybersecurity is so Important
- 1.3 Cyber Security Architecture
- 1.4 CIA Triad
- 1.5 Data Protection
- 1.6 Cryptography
- 1.7 Defense in Depth
- 1.8 Network Design
- 1.9 Single Point of Failure (SPOF)
- 1.10 Whiteboard - Putting it all together
- 2.1 Security Operations
- 2.2 Cybersecurity Operations
- 2.3 Incident Response
- 2.4 Security Operations Center (SOC)
- 2.5 Security Information and Management (SIEM)
- 2.6 Threat Hunting
- 2.7 Vulnerability Management
- 3.1 Application Security
- 3.2 API Security
- 3.3 Data Flow Diagram
- 3.4 Software Security Software Assurance
- 3.5 Source Code Scanning
- 3.6 Secure Software Development Lifecycle (SDLC)
- 4.1 Physical Security
- 4.2 IoT Security
- 4.3 Access Control
- 4.4 Social Engineering
- 4.5 Physical Security Components
- 4.6 Security Personnel
- 5.1 Threat Intelligence
- 5.2 What is Threat Intelligence
- 5.3 Threat Intelligence Lifecycle
- 5.4 Threat Intelligence Use Case
- 5.5 Threat Intelligence Types
- 6.1 Risk Assessment
- 6.2 Cyber Risk
- 6.3 Performing a Cyber Assessment
- 6.4 Enterprise Risk Management (ERM)
- 6.5 Cyber Insurance
- 6.6 Course Closeout
- 1.1 - Your Complete PAM Solution
- 1.2 - Overview of CyberArk
- 2.1 - CyberArk Architecture Overview
- 2.2 - CyberArk Deployment Models
- 3.1 - The CyberArk Digital Vault
- 3.2 Managing Users and Permissions
- 4.1 Add and Managing PAM Accounts
- 4.2 - Password Rotation and Policy Management
- 5.1 - Using the Privileged Session Manager (PSM)
- 5.2 - Session Monitoring and Reporting
- 6.1 - CyberArk Hardening and Best Practices
- 6.2 - Incident Reponse With CyberArk
- 7.1 - Real World Use Cases of CyberArk
- 7.2 - CyberArk Certification Paths
- 7.3 - CyberArk Fundamentals Course Closeout
- 1.1 - Welcome to Essential Cybersecurity 101
- 1.2 - 5 Cyber Threats and How to Stay Safe
- 2.1 - Defending Against Ransomware
- 2.2 - Phishing Attack Awareness
- 3.1 - Securing Your Home Network
- 3.2 - Best Practices for Securing Work-from-Home Devices and Data
- 4.1 - Understanding Social Engineering
- 4.2 - Protecting Your Digital Identity
- 5.1 - AI Powered Threat Detection and Prevention
- 5.2 - AI in Cybersecurity Incident Response and Fraud Detection
- Instructor Introduction
- Course Introduction
- Exam Overview
- Module Overview
- InfoSec Strategic Context Part 1
- InfoSec Strategic Context Part 2
- GRC Strategy and Assurance
- Roles and Responsibilities
- GMA Tasks Knowledge and Metrics
- IS Strategy Overview
- Strategy Implemenation
- Strategy Development Support
- Architecture and Controls
- Considerations and Action Plan
- InfoSec Prog Objectives and Wrap-Up
- Module Overview
- Risk Identification Task and Knowledge
- Risk Management Strategy
- Additional Considerations
- Risk Analysis and Treatment Tasks & Knowledge
- Leveraging Frameworks
- Assessment Tools and Analysis
- Risk Scenario Development
- Additional Risk Factors
- Asset Classification and Risk Management
- Risk Monitoring and Communication
- Information Risk Management Summary
- Module Overview
- Alignment and Resource Management – Task and Knowledge
- Key Relationships
- Standards Awareness and Training – Tasks and Knowledge
- Awareness and Training
- Building Security into Process and Practices – Tasks and Knowledge
- Additional Technology Infrastructure Concerns
- Security monitoring and reporting Overview Tasks and Knowledge
- Metrics and Monitoring
- Summary
- Module Overview
- Planning and Integration Overview Task and Knowledge
- Incident Response Concepts and Process
- Forensics and Recovery
- Readiness and Assessment – Overview Tasks and Knowledge
- Identification and Response Overview Tasks and Knowledge
- Incident Processes
- Case Study – Security On a Shoestring Budget
- Case Study – APT In Action
- Summary
- Exam Prep
- Total Course Video Hours: 17 Hrs 18 Min
- Total Videos: 48
- Course Intro
- Cloud Concepts, Architecture and Design – Part 1
- Cloud Concepts, Architecture and Design – Part 2
- Cloud Concepts, Architecture and Design – Part 3
- Cloud Concepts, Architecture and Design – Part 4
- Cloud Concepts, Architecture and Design – Part 5
- Cloud Concepts, Architecture and Design – Part 6
- Cloud Concepts, Architecture and Design – Part 7
- Cloud Concepts, Architecture and Design – Part 8
- Cloud Concepts, Architecture and Design – Part 9
- Legal, Risk and Compliance Part 1
- Legal, Risk and Compliance Part 2
- Legal, Risk and Compliance Part 3
- Legal, Risk and Compliance Part 4
- Legal, Risk and Compliance Part 5
- Legal, Risk and Compliance Part 6
- Legal, Risk and Compliance Part 7
- Cloud Data Security – Part 1
- Cloud Data Security – Part 2
- Cloud Data Security – Part 3
- Cloud Data Security – Part 4
- Cloud Data Security – Part 5
- Cloud Data Security – Part 6
- Cloud Data Security – Part 7
- Cloud Platform and Infrastructure Security – Part 1
- Cloud Platform and Infrastructure Security – Part 2
- Cloud Platform and Infrastructure Security – Part 3
- Cloud Platform and Infrastructure Security – Part 4
- Cloud Platform and Infrastructure Security – Part 5
- Cloud Platform and Infrastructure Security – Part 6
- Cloud Platform and Infrastructure Security – Part 7
- Cloud Platform and Infrastructure Security – Part 8
- Cloud Application Security – Part 1
- Cloud Application Security – Part 2
- Cloud Application Security – Part 3
- Cloud Application Security – Part 4
- Cloud Application Security – Part 5
- Cloud Application Security – Part 6
- Cloud Application Security – Part 7
- Cloud Application Security – Part 8
- Cloud Application Security – Part 9
- Cloud Security Operations – Part 1
- Cloud Security Operations – Part 2
- Cloud Security Operations – Part 3
- Cloud Security Operations – Part 4
- Cloud Security Operations – Part 5
- Cloud Security Operations – Part 6
- Cloud Security Operations – Part 7
- Cloud Security Operations – Part 8
- Cloud Security Operations – Part 9
- Cloud Security Operations – Part 10
- Cloud Security Operations – Part 11
- Course Outro
- Total Course Video Hours: 15 Hrs 51 Min
- Total Videos: 52
- Introduction
- Audit Process
- Auditing Standards
- Auditing Guidelines
- Cobit Model
- Audit Management
- Internal Control Classifications
- Planning
- Program
- Evidence
- Audit Control Evaluation
- CSA Control Self-Assessment
- IT Governance
- Governance & Security Policies
- Outsourcing & Governance
- Outsourcing & Globalization
- Organizational Compliance
- IT Strategy
- IT Performance
- System & Infrastructure
- Requirements
- Project Management Tools – Part 1
- Project Management Tools – Part 2
- Applications
- Agile Development
- Monitoring & Controlling
- Acquisition Process
- Testing Process
- Information Systems Maintenance Practices
- Data Conversion Tools
- Media Disposal Process
- Post Implementation Review
- Periodic Review
- System Maintenance
- IT Service Delivery and Support
- How to Evalutate Service Level Management Practices
- Operations Management
- Databases
- Structured Query Language (SQL)
- Monitoring Performance
- Source Code and Perfomance Monitoring
- Patch Management
- Incident Management
- Hardware Component Types
- Network Component Types
- IS Auditor Technical Overview
- Security Design
- Monitoring Systems
- Types of Attacks
- Cryptography
- Encryption
- Asymmetric Encryption
- Digital Certificate
- Different Kinds of Attacks
- Access Controls
- Identification and Authenication
- Physical Access Exposure
- Environmental Security
- Network Security Devices and Network Components
- Network Address Translation
- Virtual Private Networks (VPNs)
- Voice System Risks
- Intrusion Detection
- Firewalls
- Firewall Implementation
- Network Access Protection
- HoneyPot
- Risks to Portable and Wireless Devices
- Bluetooth
- OSI Networking
- Managing Data
- Business Continuity and Disaster Recovery
- Fault Tolerance
- Business Continuity and Disaster Recovery Regulations
- Total Course Video Hours: 12 Hrs 37 Min
- Total Videos: 74
- Module 1 Notes
- Intro
- Security and Risk Management pt.1
- Security and Risk Management pt.2
- Security and Risk Management pt.3
- Security and Risk Management Summary
- Security and Risk Management Test Prep pt.1
- Security and Risk Management Test Prep pt.2
- Security and Risk Management Test Prep pt.3
- Security and Risk Management Test Prep pt.4
- Module 2 Notes
- Asset Secutity pt.1
- Asset Security pt.2
- Asset Security Summary
- Asset Security Test Prep
- Module 3 Notes
- Security Architecture and Engineering pt.1
- Security Architecture and Engineering pt.2
- Security Architecture and Engineering pt.3
- Security Architecture and Engineering Summary
- Security Architecture and Engineering Test Prep pt.1
- Security Architecture and Engineering Test Prep pt.2
- Security Architecture and Engineering Test Prep pt.3
- Module 4 Notes
- Communication and Network Security pt.1
- Communication and Network Security pt.2
- Communication and Network Security Summary
- Communication and Network Security Test Prep
- Module 5 Notes
- Identity and Access Management (IAM)
- Identity and Access Management (IAM) Summary
- Identity and Access Management (IAM) Test Prep pt.1
- Identity and Access Management (IAM) Test Prep pt.2
- Identity and Access Management (IAM) Test Prep pt.3
- Identity and Access Management (IAM) Test Prep pt.4
- Module 6 Notes
- Security Assessment and Testing
- Security Assessment and Testing Summary
- Security Assessment and Testing Test Prep
- Module 7 Notes
- Security Operations pt.1
- Security Operations pt.2
- Security Operations pt.3
- Security Operations pt.4
- Security Operations Summary
- Security Operations Test Prep
- Module 8 Notes
- Software Development Security pt.1
- Software Development Security pt.2
- Software Development Security pt.3
- Software Development Security pt.4
- Software Development Security pt.5
- Software Development Security Summary
- Software Development Security Test Prep
- Outro
- Total Course Video Hours: 19 Hrs 37 Min
- Total Videos: 47
- Intro To Course-Part1
- Intro To Course-Part2
- Intro To Course-Part3
- Intro To Course-Part4
- Intro To Course-Part5
- Intro To Forensics-Part1
- Intro To Forensics-Part2
- Intro To Forensics-Part3
- Intro To Forensics-Part4
- Intro To Forensics-Part5
- Intro To Forensics-Part6
- Intro To Forensics-Part7
- Intro To Forensics-Part8
- Forensics Investigation Process-Part1
- Forensics Investigation Process-Part2
- Forensics Investigation Process-Part3
- Forensics Investigation Process-Part4
- Forensics Investigation Process-Part5
- Forensics Investigation Process-Part6
- Forensics Investigation Process-Part7
- Forensics Investigation Process-Part8
- Forensics Investigation Process-Part9
- Forensics Investigation Process-Part10
- Searching And Seizing-Part1
- Searching And Seizing-Part2
- Searching And Seizing-Part3
- Searching And Seizing-Part4
- Searching And Seizing-Part5
- Digital Evidence-Part1
- Digital Evidence-Part2
- Digital Evidence-Part3
- Digital Evidence-Part4
- Digital Evidence-Part5
- Digital Evidence-Part6
- Digital Evidence-Part7
- First Responder Procedures-Part1
- First Responder Procedures-Part2
- First Responder Procedures-Part3
- First Responder Procedures-Part4
- First Responder Procedures-Part5
- First Responder Procedures-Part6
- First Responder Procedures-Part7
- First Responder Procedures-Part8
- Forensic Lab-Part1
- Forensic Lab-Part2
- Forensic Lab-Part3
- Forensic Lab-Part4
- Forensic Lab-Part5
- Hard Disks And File Systems-Part1
- Hard Disks And File Systems-Part2
- Hard Disks And File Systems-Part3
- Hard Disks And File Systems-Part4
- Hard Disks And File Systems-Part5
- Hard Disks And File Systems-Part6
- Hard Disks And File Systems-Part7
- Hard Disks And File Systems-Part8
- Hard Disks And File Systems-Part9
- Hard Disks And File Systems-Part10
- Windows Forensics-Part1
- Windows Forensics-Part2
- Windows Forensics-Part3
- Windows Forensics-Part4
- Windows Forensics-Part5
- Windows Forensics-Part6
- Windows Forensics-Part7
- Windows Forensics-Part8
- Windows Forensics-Part9
- Windows Forensics-Part10
- Recovering Deleted Files And Partitions-Part1
- Recovering Deleted Files And Partitions-Part2
- Data Acquisition And Duplication-Part1
- Data Acquisition And Duplication-Part2
- Data Acquisition And Duplication-Part3
- Data Acquisition And Duplication-Part4
- Data Acquisition And Duplication-Part5
- Data Acquisition And Duplication-Part6
- Data Acquisition And Duplication-Part7
- Using Access Data FTK And Special Steps-Part1
- Using Access Data FTK And Special Steps-Part2
- Using Access Data FTK And Special Steps-Part3
- Using Access Data FTK And Special Steps-Part4
- Using Access Data FTK And Special Steps-Part5
- Using Access Data FTK And Special Steps-Part6
- Using Access Data FTK And Special Steps-Part7
- Using Access Data FTK And Special Steps-Part8
- EnCase-Part1
- EnCase-Part2
- EnCase-Part3
- Stenography-Part1
- Stenography-Part2
- Stenography-Part3
- Stenography-Part4
- Passwords-Part1
- Passwords-Part2
- Passwords-Part3
- Passwords-Part4
- Log Correlation-Part1
- Log Correlation-Part2
- Log Correlation-Part3
- Log Correlation-Part4
- Log Correlation-Part5
- Log Correlation-Part6
- Network Forensics-Part1
- Network Forensics-Part2
- Network Forensics-Part3
- Network Forensics-Part4
- Wireless Attacks-Part1
- Wireless Attacks-Part2
- Wireless Attacks-Part3
- Web Attacks-Part1
- Web Attacks-Part2
- Web Attacks-Part3
- Web Attacks-Part4
- Web Attacks-Part5
- Web Attacks-Part6
- Web Attacks-Part7
- Web Attacks-Part8
- Email Crimes-Part1
- Email Crimes-Part2
- Email Crimes-Part3
- Email Crimes-Part4
- Mobile Investigation-Part1
- Mobile Investigation-Part2
- Mobile Investigation-Part3
- Mobile Investigation-Part4
- Mobile Investigation-Part5
- Investigation Reports-Part1
- Investigation Reports-Part2
- Investigation Reports-Part3
- Investigation Reports-Part4
- Expert Witness-Part1
- Expert Witness-Part2
- Expert Witness-Part3
- Total Course Video Hours: 18 Hrs 26 Min
- Total Videos: 133
- Course Introduction
- Where We Are Today
- Areas Of Protection
- The Connection – Part 1
- The Connection – Part 2
- Network Protection
- Browsing Blunders – Part 1
- Browsing Blunders – Part 2
- Settings – Part 1
- Settings – Part 2
- Settings – Part 3
- Settings – Part 4
- Cookies
- Browsing Tips And Tricks
- Email Can’t Hurt You Right – Part 1
- Email Can’t Hurt You Right – Part 2
- Viruses – Part 1
- Viruses – Part 2
- Viruses – Part 3
- Managing Mobile Device Security-Part1
- Managing Mobile Device Security-Part2
- Secure Access
- Secure Access iPhone Demo
- Secure Access Android Demo
- Protect The Digital
- Protect The Digital Android Demo
- Protect The Digital iPhone Demo
- Manage App Access
- Manage App Access iPhone Demo
- Manage App Access Android Demo
- Stay Up To Date
- Stay Up To Date Android Demo
- Stay Up To Date iPhone Demo
- Use Other Tools To Help
- Prepare For The Worst
- Prepare For The Worst-Android Demo
- Prepare For The Worst-iPhone Demo
- Best Practices
- Course Conclusion
- Total Course Video Hours: 7 Hrs 8 Min
- Total Videos: 39
- Course Introduction
- Treat And Cost
- It’s All About YOU Part1
- It’s All About YOU Part2
- No More Oops Part1
- No More Oops Part2
- The DO Of Security Part1
- The DO Of Security Part2
- Course Conclusion
- Total Course Video Hours: 2 Hrs 13 Min
- Total Videos: 9