Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
$14.99/24.99
Lectures |
---|
1. Overview of Security- 2m 55s |
2. CIA Triad- 3m 54s |
3. AAA of Security- 3m 5s |
4. Security Threats- 2m 57s |
5. Mitigating Threats- 2m 28s |
6. Hackers- 4m 53s |
7. Threat Actors- 3m 12s |
Lectures |
---|
1. Malware- 39s |
2. Viruses- 6m 21s |
3. Worms- 2m 9s |
4. Trojans- 2m 48s |
5. Demo: Viruses and Trojans- 6m 16s |
6. Ransomware- 2m 30s |
7. Spyware- 2m 39s |
8. Rootkits- 3m 29s |
9. Spam- 2m 56s |
10. Summary of Malware- 2m 2s |
Lectures |
---|
1. Malware Infections- 4m 12s |
2. Common Delivery Methods- 3m 23s |
3. Botnets and Zombies- 3m 30s |
4. Active Interception and Privilege Escalation- 2m 28s |
5. Demo: Privilege Escalation- 5m 41s |
6. Backdoors and Logic Bombs- 3m 48s |
7. Symptoms of Infection- 4m 10s |
8. Removing Malware- 5m 1s |
9. Preventing Malware- 5m 56s |
Lectures |
---|
1. Security Applications and Devices- 33s |
2. Software Firewalls- 4m 16s |
3. Demo: Software Firewalls- 6m 44s |
4. IDS- 5m 3s |
5. Pop-up Blockers- 3m 9s |
6. Data Loss Prevention (DLP)- 3m 43s |
7. Securing the BIOS- 3m 56s |
8. Securing Storage Devices- 3m 26s |
9. Disk Encryption- 4m 51s |
Lectures |
---|
1. Mobile Device Security- 1m 14s |
2. Securing Wireless Devices- 1m 30s |
3. Mobile Malware- 6m 19s |
4. SIM Cloning & ID Theft- 4m |
5. Bluetooth Attacks- 2m 8s |
6. Mobile Device Theft- 3m 10s |
7. Security of Apps- 5m 6s |
8. BYOD- 4m 56s |
9. Hardening Mobile Devices- 3m 51s |
Lectures |
---|
1. Hardening- 1m 47s |
2. Unnecessary Applications- 3m 10s |
3. Restricting Applications- 2m 56s |
4. Demo: Unnecessary Services- 5m 35s |
5. Trusted Operating System- 1m 57s |
6. Updates and Patches- 3m 26s |
7. Patch Management- 3m 49s |
8. Group Policies- 2m 33s |
9. Demo: Group Policies- 4m 6s |
10. File Systems and Hard Drives- 3m 18s |
Lectures |
---|
1. Virtualization- 2m 7s |
2. Hypervisors- 2m 37s |
3. Demo: How to create a VM- 4m 39s |
4. Threats to VMs- 3m 43s |
5. Securing VMs- 3m 47s |
6. Demo: Securing VMs- 4m 41s |
Lectures |
---|
1. Application Security- 1m 43s |
2. Web Browser Security- 6m 39s |
3. Web Browser Concerns- 3m 19s |
4. Demo: Web Browser Configuration- 5m 20s |
5. Securing Applications- 4m 49s |
Lectures |
---|
1. Software Development- 8m 34s |
2. SDLC Principles- 6m 22s |
3. Testing Methods- 6m 59s |
4. Software Vulnerabilities and Exploits- 2m 28s |
5. Buffer Overflows- 6m 15s |
6. Demo: Buffer Overflow Attack- 6m 25s |
7. XSS and XSRF- 3m 7s |
8. SQL Injection- 6m 25s |
9. Demo: SQL Injection- 7m 13s |
Lectures |
---|
1. Network Security- 44s |
2. The OSI Model- 6m |
3. Switches- 3m 32s |
4. Routers- 2m 27s |
5. Network Zones- 3m 26s |
6. Network Access Control- 2m 40s |
7. VLANs- 1m 30s |
8. Subnetting- 1m 51s |
9. Network Address Translation- 2m 26s |
10. Telephony- 5m 58s |
Lectures |
---|
1. Perimeter Security- 46s |
2. Firewalls- 8m 1s |
3. Demo: SOHO Firewall- 4m 4s |
4. Proxy Servers- 4m 12s |
5. Honeypots and Honeynets- 1m 22s |
6. Data Loss Prevention- 1m 35s |
7. NIDS and NIPS- 4m 11s |
8. Unified Threat Management- 1m 52s |
Lectures |
---|
1. Cloud Computing- 3m 29s |
2. Cloud Types- 2m 51s |
3. As a Service- 7m 4s |
4. Cloud Security- 2m 25s |
5. Defending Servers- 4m 32s |
Lectures |
---|
1. Network Attacks- 38s |
2. Ports and Protocols- 54s |
3. Memorization of Ports- 11m 30s |
4. Unnecessary Ports- 3m 21s |
5. Denial of Service- 7m 56s |
6. DDoS- 1m 36s |
7. Stopping a DDoS- 2m 27s |
8. Spoofing- 1m 16s |
9. Hijacking- 3m 45s |
10. Replay Attack- 1m 27s |
11. Demo: Null Sessions- 2m 24s |
12. Transitive Attacks- 1m 24s |
13. DNS Attacks- 4m 33s |
14. ARP Poisoning- 1m 30s |
Lectures |
---|
1. Securing Networks- 49s |
2. Securing Network Devices- 6m 43s |
3. Securing Network Media- 8m 48s |
4. Securing WiFi Devices- 4m 22s |
5. Wireless Encryption- 5m 30s |
6. Wireless Access Points- 6m 11s |
7. Wireless Attacks- 4m 15s |
8. Demo: Wireless Attack- 6m 58s |
9. Other Wireless Technologies- 6m 2s |
Lectures |
---|
1. Physical Security- 1m 30s |
2. Surveillance- 2m 51s |
3. Door Locks- 3m 47s |
4. Demo: Lock Picking- 1m 36s |
5. Biometric Readers- 4m 15s |
Lectures |
---|
1. Facilities Security- 36s |
2. Fire Suppression- 6m 21s |
3. HVAC- 2m 23s |
4. Shielding- 2m 34s |
5. Vehicles- 2m 3s |
Lectures |
---|
1. Authentication- 5m 53s |
2. Authentication Models- 5m 17s |
3. 802.1x- 3m 44s |
4. LDAP and Kerberos- 2m 26s |
5. Remote Desktop Services- 1m 51s |
6. Remote Access Service- 2m 3s |
7. VPN- 3m 2s |
8. RADIUS vs TACACS+- 2m 18s |
9. Authentication Summary- 2m 4s |
Lectures |
---|
1. Access Control- 50s |
2. Access Control Models- 8m 14s |
3. Best Practices- 5m 44s |
4. Users and Groups- 9m 12s |
5. Permissions- 3m 41s |
6. Usernames and Passwords- 2m 36s |
7. Demo: Policies- 4m 34s |
8. User Account Control- 1m 53s |
Lectures |
---|
1. Risk Assessments- 8m 33s |
2. Qualitative Risk- 4m 6s |
3. Quantitative Risk- 5m 27s |
4. Methodologies- 2m 49s |
5. Security Controls- 6m 49s |
6. Vulnerability Management- 7m 50s |
7. Penetration Testing- 4m 26s |
8. OVAL- 1m 34s |
9. Vulnerability Assessments- 6m 52s |
10. Demo: Nmap Scanning- 8m 50s |
11. Demo: Vulnerability Scanning- 9m 33s |
12. Password Analysis- 5m 54s |
13. Demo: Password Cracking- 2m 36s |
Lectures |
---|
1. Monitoring Types- 2m 54s |
2. Performance Baselining- 4m 35s |
3. Protocol Analyzers- 2m 58s |
4. SNMP- 3m 40s |
5. Demo: Analytical Tools- 4m 27s |
6. Auditing- 1m 54s |
7. Demo: Auditing Files- 3m 53s |
8. Logging- 3m 39s |
9. Log Files- 5m 14s |
10. SIEM- 2m 54s |
Lectures |
---|
1. Cryptography- 4m 56s |
2. Symmetric vs Asymmetric- 6m 12s |
3. Symmetric Algorithms- 4m 56s |
4. Public Key Cryptography- 3m 9s |
5. Asymmetric Algorithms- 3m 44s |
6. Pretty Good Privacy- 1m 46s |
7. Key Management- 2m 11s |
8. One-Time Pad- 4m 18s |
9. Hashing- 8m 27s |
10. Demo: Hashing- 3m 4s |
11. Hashing Attacks- 3m 15s |
12. Increasing Hash Security- 1m 26s |
Lectures |
---|
1. Public Key Infrastructure- 3m 53s |
2. Digital Certificates- 6m 42s |
3. Demo: Certificates- 3m 31s |
4. Certificate Authorities- 4m 12s |
5. Web of Trust- 2m 35s |
Lectures |
---|
1. Security Protocols- 21s |
2. S/MIME- 1m 29s |
3. SSL and TLS- 5m 48s |
4. SSH- 2m 28s |
5. VPN Protocols- 6m 37s |
6. Demo: Setting up a VPN- 1m 37s |
Lectures |
---|
1. Planning for the Worst- 2m 9s |
2. Redundant Power- 3m 8s |
3. Backup Power- 3m 6s |
4. Data Redundancy- 4m 39s |
5. Demo: RAIDs- 3m 35s |
6. Network Redundancy- 2m 4s |
7. Server Redundancy- 1m 42s |
8. Redundant Sites- 2m 20s |
9. Data Backup- 2m 54s |
10. Tape Rotation- 3m 52s |
11. Disaster Recovery Plan- 5m 38s |
Lectures |
---|
1. Social Engineering- 52s |
2. Demo: Pretexting- 4m 14s |
3. Insider Threat- 2m 10s |
4. Phishing- 1m 13s |
5. More Social Engineering- 4m |
6. User Education- 4m 44s |
Lectures |
---|
1. Policies and Procedures- 5m 53s |
2. Data Classifications- 6m 42s |
3. PII and PHI- 6m 19s |
4. Security Policies- 10m 19s |
5. User Education- 4m 2s |
6. Vendor Relationships- 7m 52s |
7. Disposal Policies- 5m 4s |
8. Incident Response Procedures- 4m 36s |
9. Data Collection Procedures- 3m 11s |
10. Demo: Disk Imaging- 6m 56s |
11. IT Security Frameworks- 3m 18s |
Lectures |
---|
1. Exam Tricks- 4m 9s |
PassQueen does not provide real Microsoft exam questions. Similarly, PassQueen does not supply real Amazon exam questions. The materials offered by PassQueen lack real questions and answers of certification exams. The CFA Institute neither endorses nor assures the accuracy or quality of PassQueen content. CFA® and Chartered Financial Analyst® are registered trademarks held by the CFA Institute.
Other Pages
© 2025 All Rights Reserved passqueen.com.