Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CISA Domain 5 Training - Protection of Information Assets ' 2023
Section 0 - Course Introduction
2-CISA0-What_is_CISA_Certification (5:45)
1-CISA0-Welcome_to_the_Course (2:03)
Section 1 - Security Foundations
1-CISA5-The_Security_Objective_and_CIA_Triad (7:23)
2-CISA5-Privacy_Requirements_and_regulations (8:02)
3.0-CISA5-Security_Threats (16:20)
3.1-CISA5-Vulnerabilities_and_Cyber_Attacks (13:50)
3.2-CISA5-Man_in_the_middle_attack_and_Bufferover_Flow (3:35)
4-CISA5-Cyber_Kill_Chain_the_Process_of_Hacking_into_systems (6:53)
Section 2 - Personnel and Supply Chain Security
5.1-CISA5-Social_Engineering (16:06)
5.2-CISA5-Security_Awareness_Program (7:31)
5.3-CISA5-Securing_Supply_chain_Risk_Management (6:40)
Section 3 - AAA
6-CISA5-The_IAAA_Framework (6:57)
7-CISA5-MFA_and_Biometric (10:05)
8-CISA5-Single_Sign_on_(SSO)_and_Reduced_Sign_on_(RSO) (5:46)
9-CISA5-Authorisation_and_Access_Control_Models (10:13)
10-CISA5-Owner_and_Custodian_and_their_responsibilities_in_Assets_and_data_protection (10:16)
Section 4 - Physical Security
11-CISA5-What_is_Physical_Security (15:11)
12-CISA5-Physical_Access_Control_System_1 (5:52)
13-CISA5-Physical_Access_Control_System_2 (5:38)
14-CISA5-Environmental_Controls_-_Securing_Power_Sources (8:18)
15-CISA5-Environmental_Controls_-_Fire_Threat_and_Controls (16:38)
16-CISA5-Physical_Security_Best_Practices (13:34)
Section 5 - Data Security
17.0-CISA5-Data_Lifecylce (8:05)
17.1_-CISA5-Roles_in_Data_and_Assets_Protection (10:16)
17.2_-CISA5-Privacy_Regulation_Roles (3:56)
18-CISA5-Data_Security_Measures (15:07)
19-CISA5-Data_Classification (7:06)
20.0-CISA5-Data_Destruction (9:33)
20.1-CISA5-RACI_Matrix (5:22)
Section 6 - Cryptography
21-CISA5-Cryptography_Overview (10:21)
22-CISA5-Symmetric_Encryption (15:09)
23-CISA5-Asymmetric_Encryption_Overview (13:57)
24-CISA5-Asymmetric_Encryption_Benefits (12:16)
25-CISA5-Digital_Certificate (6:00)
26-CISA5-Public_Key_Infrastructure (12:56)
27-CISA5-Integrity_Hashing_and_Salting (15:22)
28-CISA5-Encryption_vs_Hashing_vs_Encdoing (4:39)
29-CISA5-Digital_Signature (5:16)
30-CISA5-Cryptography_Applications_in_IT (3:09)
Section 7 - Network Security
32-CISA5-Network_Segmentation_and_VLANs (5:31)
31-CISA5-Organization_IT_Infrastructure_and_Security_Overview (13:19)
33-CISA5-Firewalls (4:52)
33-CISA5-Network_Admission_Control (3:11)
34-CISA5-DMZ_and_Bastian_Host (4:20)
35-CISA5-Proxy_Load_Balancer_Email_Security (7:51)
Section 8 - Endpoint Security
36-CISA5-End-user_Security_Software_Overview (14:00)
37-CISA5-Endpoint_Protection_Platform_Overview_-_EPP (13:12)
38-CISA5-Endpoint_security_best_practices (14:56)
Teach online with
24-CISA5-Asymmetric_Encryption_Benefits
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock