BENEFITS
Best Seller
Online Courses
24/7 Support
Lifetime Access
Get Certificate
Offer Curriculum
Available in
days
days
after you enroll
- 001 Certification Path Introduction (0:51)
- 001 Course Introduction (1:24)
- 001 Course Summary (8:38)
- 001 Introduction to Asset Security (0:26)
- 001 Introduction to Communication and Network Security (0:29)
- 001 Introduction to Identity and Access Management (0:28)
- 001 Introduction to Security Architecture and Engineering (0:27)
- 001 Introduction to Security Assessment and Testing (0:25)
- 001 Introduction to Security Operations (0:32)
- 001 Introduction to Security and Risk Management (1:10)
- 001 Introduction to Software Development Security (0:31)
Available in
days
days
after you enroll
- 002 About the Training Architect (1:24)
- 002 Assessment Testing and Auditing (12:09)
- 002 Conclusion and Whats Next (1:05)
- 002 Confidentiality Integrity and Availability (6:18)
- 002 Information Classification and Data Roles (9:35)
- 002 Investigations (14:51)
- 002 Networking Basics and Wi-Fi (14:53)
- 002 Networking (0:39)
- 002 Physical and Logical Access Controls (14:01)
- 002 Secure Design Principles (14:06)
- 002 Software Development Lifecycle (SDLC) (13:23)
Available in
days
days
after you enroll
- 003 Data Security (11:39)
- 003 Exam Information and Prerequisites (11:31)
- 003 Governance and Compliance (14:50)
- 003 Identification and Authentication (13:06)
- 003 Intelligence and Kill Chain (10:15)
- 003 Network Protocols (12:33)
- 003 Penetration Testing (9:55)
- 003 Security Models (15:09)
- 003 Security (0:27)
- 003 Software Coding Concepts (11:55)
Available in
days
days
after you enroll
- 004 Asset Retention Handling and Disposal (11:07)
- 004 Certified Ethical Hacker (0:25)
- 004 Firewalls
- 004 Identity Attacks and Access Lifecycle (14:59)
- 004 Legal Privacy and Ethics (14:44)
- 004 Logging and Monitoring (13:57)
- 004 Security Control Testing (14:00)
- 004 Security Controls in Development Environments (10:37)
- 004 System Vulnerabilities (14:39)
Available in
days
days
after you enroll
- 005 Asset Security Summary (5:48)
- 005 Collecting Security Process Data (11:13)
- 005 Databases (13:36)
- 005 Encryption and Hashing (14:59)
- 005 Implementing Authentication Systems (15:18)
- 005 Network Attacks (14:13)
- 005 Patch and Change Management (12:44)
- 005 Security Policies Standards Procedures and Guidelines (6:18)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Offer Ending Soon