āCourse Overview
1m 44s
āIntroduction
5m 24s
Fundamental Security Principles
- 35m 32s
āIntroduction
2m 8s
āSecurity and Risk Management Fundamentals
3m 28s
āBalancing Business and Security
2m 7s
āThe CIA Triad
9m 19s
āAccountability and Assurance
4m 40s
āControl Types
2m 42s
āDelaying, Preventing, or Detecting Attacks
4m 45s
āDue Care and Due Diligence
2m 10s
āEthics
3m 6s
āConclusion
1m 3s
Legal and Regulatory
- 13m 4s
āIntroduction
1m 11s
āLegal Systems
1m 4s
āCriminal and Civil Law
3m 0s
āAdministrative Law
2m 35s
āImportant Laws
4m 39s
āSummary
0m 32s
āIntroduction
0m 57s
āComputers Can Be Used for EVIL
1m 35s
āSome Hack Just Because They Can
2m 52s
āIt's All About the Money
2m 40s
āSpies Are Real
2m 5s
āPayback and Government Hackers
3m 8s
āTheft, Vandalism, and Trespass
2m 17s
āFraud, Spam, and Slander
2m 53s
āConclusion
1m 43s
Intellectual Property
- 6m 3s
āIntroduction
0m 47s
āPatents
2m 6s
āTrademarks and Trade Secrets
1m 26s
āCopyrights
1m 17s
āSummary
0m 26s
āIntroduction
1m 24s
āPrivacy Matters
4m 47s
āPrivacy Law Examples
8m 57s
āConclusion
0m 56s
āIntroduction
0m 43s
āReasons for Licensing
1m 59s
āLicense Types
0m 32s
āOpen Versus Closed Source Licensing
2m 23s
āCommercial Versus Non-commercial Licensing
3m 20s
āEnd User License Agreements
0m 34s
āFree Software
1m 48s
āDemo and Trial Licenses
1m 17s
āShareware
0m 54s
āAcademic Software Licensing
0m 46s
āSummary
0m 41s
Trans-border Data Flow
- 8m 17s
āIntroduction
1m 1s
āTrans-border Data Flow
4m 6s
āImport and Export Controls
2m 12s
āSummary
0m 56s
Security Awareness
- 15m 39s
āIntroduction
1m 12s
āDevelop a Culture of Security Awareness
4m 34s
āTypes of Security Awareness
2m 1s
āExpected Impact of Training
2m 25s
āAwareness Validation
4m 27s
āSummary
0m 57s
Aligning Security to the Organization
- 16m 30s
āIntroduction
1m 15s
āGovernance
0m 57s
āRoles and Responsibilities
7m 11s
āOrganizational Objectives
1m 33s
āSecurity Goals
2m 57s
āSecurity Mission
1m 37s
āConclusion
0m 58s
Creating Policies, Procedures, Guidelines, and Baselines
- 19m 6s
āIntroduction
0m 58s
āSecurity Frameworks Introduction
3m 46s
āEffective Policies and Procedures
3m 16s
āPolicy Sections
2m 51s
āProcedures
3m 1s
āGuidelines
1m 17s
āBaselines
2m 29s
āSummary
1m 25s
Continuity Planning and Disaster Recovery
- 11m 4s
āIntroduction
1m 9s
āBusiness Continuity Process
1m 15s
āConducting a Business Impact Analysis
1m 0s
āDisaster Recovery Planning vs. Business Continuity Planning
1m 42s
āTesting Your Plans
1m 32s
āDisaster Events
0m 40s
āRecovering from Disaster
1m 6s
āDisaster Recovery Controls
2m 1s
āConclusion
0m 34s
Threat Modeling
- 14m 10s
āIntroduction
1m 8s
āThreat Modeling Overview
2m 9s
āThreat Modeling Focus
2m 26s
āThreat Model - Scoping
1m 27s
āReviewing the Architecture
1m 16s
āDecomposing
0m 50s
āThreat Identification using STRIDE
2m 26s
āDefining and Documenting Countermeasures
0m 40s
āPrioritization
0m 42s
āSummary
1m 1s
Risk Assessment Concepts
- 16m 52s
āIntroduction
1m 22s
āThreats
2m 6s
āThreat Source
1m 43s
āVulnerabilities
1m 15s
āRisk
0m 27s
āRisk Assessments
1m 38s
āRisk Assessment Methodologies
1m 41s
āReal World Threats and Vulnerabilities
1m 32s
āAssessment Approach
0m 51s
āAnalysis Approach
0m 58s
āRisk Acceptance and Assignment
1m 24s
āCommon Calculations
1m 3s
āConclusion
0m 47s
Countermeasure Selection Process
- 15m 8s
āIntroduction
1m 37s
āWhat Is a Countermeasure?
1m 30s
āControl Variations
1m 23s
āControl Types
2m 34s
āControl Considerations
1m 50s
āAssessing Control Strength
1m 42s
āCountermeasure Assurance
0m 35s
āExample Countermeasures
2m 48s
āConclusion
1m 4s
āIntroduction
1m 43s
āRisk Management Framework
0m 46s
āLeveraging Frameworks
1m 8s
āNIST Risk Management Framework RMF
4m 43s
āFAIR
2m 23s
āOCTAVE Allegro
1m 25s
āSummary
0m 52s