Filter by Source
No sources available

Do you have The Disney Bundle?
What are you waiting for?
Nice! Browse The Disney Bundle with Yidio.
Ad Info
Seasons

15. Malicious Code
In this episode Adam and Don list and describe the many categories of malicious software. They also take a look at social engineering and wrap up the episode discussing the five steps in the hacking process.

14. Networking Part 3
In this episode Adam and Mike discuss several protocols and port numbers. They break down several network protocols, routing protocols and security protocols. They also cover wireless standards and wireless best practices.

13. Networking Part 2
In this episode Adam and Don examine wide area network technologies. They break down the most common technologies most commonly seen in the field and examine the differences between them. They wrap up the episode discussing security appliances like firewalls and NAC.

12. Networking
In this episode Adam and Mike take a look at basic network components. They discuss different network topologies such as LAN and WAN topologies. They discuss how we can implement these components and topologies in a secure fashion.

11. Cryptography Part 3
In this episode Adam and Mike cover the various components of a Public Key Infrastructure (PKI). They discuss several types of attacks against cryptography such as brute force attacks and attacks against symmetric block ciphers.

10. Cryptography Part 2
In this episode Adam and Don explain the difference between symmetric, asymmetric and hybrid encryption systems. They also describe and demonstrate the function of hashing algorithms.

9. Cryptography
In this episode Adam and Mike cover the basics of cryptography. They define some of the terminology necessary to understand cryptography.

8. Risk Response and Recovery Part 2
In this episode Adam and Mike continue risk management by covering policies, incident handling, forensic and recovery alternatives. They conclude with a rundown of disaster recovery planning.

7. Risk Response and Recovery
In this episode Adam and Mike discuss risk response and recovery. They define some of the basic concepts involved in risk management as well as cover controls, countermeasures and the basic risk management process.

6. Monitoring and Analysis Part 2
In this episode Adam and Mike cover patch management, firewall generations. They also discuss goals of security testing as well as the five phases of penetration testing.

5. Monitoring and Analysis
In this episode Adam and Don describe the various components of a security audit and highlight the target areas that a security professional should focus on while monitoring for security.

4. Security Ops and istration Part 2
In this episode Adam and Don examine project management techniques that can be used to assist implementing security standards. They also take a look at the common criteria specification and some of the history behind modern security infrastructure.

3. Security Ops and istration
In this episode Adam and Don take a look at the bureaucratic side of IT security. They discuss the differences policies, procedures, guidelines and baselines as well as recommend several third parties vendors that provide templates.

2. Access Controls
In this episode Adam and Don examine the various access controls that can be implemented by security professionals to increase confidentiality in a modern network.

1. Overview of SS
In this episode Adam and Don introduce the viewers to the (ISC)2 SS certification. They discuss the requirements to becoming SS certified as well as the general topic areas covered by the certification.
Description
-
Channel
-
Premiere DateJanuary 1, 2015

Bundle & save, starting at $9.99 per month
Access epic stories, tons of movies & shows, and more.
All for one incredible price.
Ad Info