Filename Size 01.Course Overview/0101.Course Overview.mp4 5 MB 02.Setting the Stage/0201.Setting the Stage - Who Should Watch This Course.mp4 4.8 MB 02.Setting the Stage/0202.Course Overview.mp4 6 MB 02.Setting the Stage/0203.Security Teams.mp4 4.6 MB 02.Setting the Stage/0204.Offensive and Defensive Teams.mp4 8.5 MB 03.Installing and Configuring Network Components/0301.Module Intro.mp4 6.1 MB 03.Installing and Configuring Network Components/0302.TCPIP and OSI Models.mp4 5.9 MB 03.Installing and Configuring Network Components/0303.Firewalls.mp4 11.3 MB 03.Installing and Configuring Network Components/0304.Web Application Firewalls.mp4 4.5 MB 03.Installing and Configuring Network Components/0305.Virtual Private Networks (VPN).mp4 8 MB 03.Installing and Configuring Network Components/0306.Transport Encryption.mp4 2.6 MB 03.Installing and Configuring Network Components/0307.NIDS and NIPS.mp4 10.7 MB 03.Installing and Configuring Network Components/0308.IDSIPS Workflow.mp4 3 MB 03.Installing and Configuring Network Components/0309.Four Approaches to IDS.mp4 3.2 MB 03.Installing and Configuring Network Components/0310.Network Based IDS.mp4 4.4 MB 03.Installing and Configuring Network Components/0311.Reacting to Alerts or Issues.mp4 5.2 MB 03.Installing and Configuring Network Components/0312.Routers and Common Routing Protocols.mp4 3.9 MB 03.Installing and Configuring Network Components/0313.Switches.mp4 3.9 MB 03.Installing and Configuring Network Components/0314.Layer 2 vs. Layer 3.mp4 2.3 MB 03.Installing and Configuring Network Components/0315.Load Balancers.mp4 3.1 MB 03.Installing and Configuring Network Components/0316.Load Balancer Types.mp4 4.1 MB 03.Installing and Configuring Network Components/0317.Web Security Gateways.mp4 3 MB 03.Installing and Configuring Network Components/0318.Port Security and 802.1x.mp4 8.7 MB 03.Installing and Configuring Network Components/0319.Loop Protection and Flood Guards.mp4 3.5 MB 03.Installing and Configuring Network Components/0320.Spanning Tree Protocol (STP).mp4 6.1 MB 03.Installing and Configuring Network Components/0321.Access Points and WiFi Security.mp4 7 MB 03.Installing and Configuring Network Components/0322.Security Information and Event Management (SIEM).mp4 6.6 MB 03.Installing and Configuring Network Components/0323.Data Loss Prevention (DLP).mp4 5 MB 03.Installing and Configuring Network Components/0324.Network Access Control (NAC).mp4 5.3 MB 03.Installing and Configuring Network Components/0325.Hardware Based Encryption.mp4 3.6 MB 03.Installing and Configuring Network Components/0326.Mail Gateway.mp4 938.2 KB 03.Installing and Configuring Network Components/0327.Additional Things to Consider.mp4 4.1 MB 04.Implementing Secure Protocols/0401.Module Intro.mp4 2.9 MB 04.Implementing Secure Protocols/0402.Networking Protocols.mp4 7.4 MB 04.Implementing Secure Protocols/0403.DNS SEC.mp4 9 MB 04.Implementing Secure Protocols/0404.SSH.mp4 2.3 MB 04.Implementing Secure Protocols/0405.SMIME.mp4 2.2 MB 04.Implementing Secure Protocols/0406.SRTP.mp4 1.5 MB 04.Implementing Secure Protocols/0407.LDAPS.mp4 2 MB 04.Implementing Secure Protocols/0408.FTPS and SFTP.mp4 2.7 MB 04.Implementing Secure Protocols/0409.SNMPv3.mp4 2.1 MB 04.Implementing Secure Protocols/0410.SSLTLS.mp4 2.3 MB 04.Implementing Secure Protocols/0411.HTTPS.mp4 3 MB 04.Implementing Secure Protocols/0412.Secure POPIMAP.mp4 6 MB 04.Implementing Secure Protocols/0413.Use Cases.mp4 7.2 MB 05.Implementing Secure Network Architecture/0501.Module Intro and Topology Overview.mp4 9.8 MB 05.Implementing Secure Network Architecture/0502.Additional Topology Concepts.mp4 3.6 MB 05.Implementing Secure Network Architecture/0503.Security, Segmentation, and Isolation.mp4 5.2 MB 05.Implementing Secure Network Architecture/0504.Virtualization.mp4 2.9 MB 05.Implementing Secure Network Architecture/0505.Air Gaps.mp4 4.4 MB 05.Implementing Secure Network Architecture/0506.VPN.mp4 2.6 MB 05.Implementing Secure Network Architecture/0507.Security Device Placement.mp4 5.3 MB 05.Implementing Secure Network Architecture/0508.Software Defined Networking (SDN).mp4 5.8 MB 06.Troubleshooting Common Security Issues/0601.Module Intro.mp4 5.4 MB 06.Troubleshooting Common Security Issues/0602.Unencrypted Credentials.mp4 3.2 MB 06.Troubleshooting Common Security Issues/0603.Logs and Event Anomalies.mp4 4.2 MB 06.Troubleshooting Common Security Issues/0604.Access Violations.mp4 4.3 MB 06.Troubleshooting Common Security Issues/0605.Certificate Issues and Hierarchy.mp4 5.3 MB 06.Troubleshooting Common Security Issues/0606.Misconfigured Devices.mp4 2.3 MB 06.Troubleshooting Common Security Issues/0607.Weak Security Configuration.mp4 2.7 MB 06.Troubleshooting Common Security Issues/0608.Personnel Issues.mp4 8.3 MB 06.Troubleshooting Common Security Issues/0609.Unauthorized Software.mp4 3.7 MB 06.Troubleshooting Common Security Issues/0610.Baseline Deviation and License Compliance.mp4 10.9 MB 06.Troubleshooting Common Security Issues/0611.Asset Management.mp4 1.8 MB 06.Troubleshooting Common Security Issues/0612.Authentication Issues.mp4 3.9 MB 07.Implementing Secure Systems Design/0701.Module intro and Secure Boot.mp4 6.9 MB 07.Implementing Secure Systems Design/0702.Measured Launch.mp4 1.4 MB 07.Implementing Secure Systems Design/0703.Integrity Measurement Architecture (IMA).mp4 897.1 KB 07.Implementing Secure Systems Design/0704.BIOSUEFI.mp4 1.1 MB 07.Implementing Secure Systems Design/0705.Data Encryption Hardware Based Encryption.mp4 17 MB 07.Implementing Secure Systems Design/0706.Types of Data to Secure.mp4 2.9 MB 07.Implementing Secure Systems Design/0707.Supply Chain Security.mp4 3.8 MB 07.Implementing Secure Systems Design/0708.Hardware Root of Trust.mp4 2.9 MB 07.Implementing Secure Systems Design/0709.EMIEMP.mp4 3 MB 07.Implementing Secure Systems Design/0710.Trusted OS.mp4 8.7 MB 07.Implementing Secure Systems Design/0711.Secure Systems Design.mp4 6.3 MB 07.Implementing Secure Systems Design/0712.Mobile Device Management.mp4 20.2 MB 07.Implementing Secure Systems Design/0713.Peripherals Security.mp4 4.9 MB 08.Secure Application Development and Deployment/0801.Module Intro.mp4 3 MB 08.Secure Application Development and Deployment/0802.Development Life-cycle Models.mp4 3.1 MB 08.Secure Application Development and Deployment/0803.Waterfall Development Model.mp4 5 MB 08.Secure Application Development and Deployment/0804.Secure DevOps.mp4 2.2 MB 08.Secure Application Development and Deployment/0805.Security Automation.mp4 5.1 MB 08.Secure Application Development and Deployment/0806.Continuous Integration.mp4 3.4 MB 08.Secure Application Development and Deployment/0807.Baselining and CICD.mp4 1.6 MB 08.Secure Application Development and Deployment/0808.Immutable Systems.mp4 1.4 MB 08.Secure Application Development and Deployment/0809.Infrastructure as Code.mp4 2.4 MB 08.Secure Application Development and Deployment/0810.General Change Management.mp4 4.8 MB 08.Secure Application Development and Deployment/0811.Provisioning, Deprovisioning and Asset Disposal.mp4 4.9 MB 08.Secure Application Development and Deployment/0812.SDLC.mp4 4.5 MB 08.Secure Application Development and Deployment/0813.Secure Coding Techniques.mp4 20.3 MB 08.Secure Application Development and Deployment/0814.Code Quality and Testing.mp4 5.3 MB 08.Secure Application Development and Deployment/0815.Static Code Analysis.mp4 4.1 MB 08.Secure Application Development and Deployment/0816.Fuzzing.mp4 10.8 MB 08.Secure Application Development and Deployment/0817.Secure Coding Concepts.mp4 3.6 MB 08.Secure Application Development and Deployment/0818.Compiled vs. Runtime Code.mp4 2.8 MB 09.Physical Security Controls/0901.Module Intro.mp4 2.9 MB 09.Physical Security Controls/0902.Proper Lighting and Signage.mp4 5.4 MB 09.Physical Security Controls/0903.Fencing.mp4 6.8 MB