Completed
CISSP domain 2 - Part 56 A | Data Classification Levels in Government
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
CISSP Full Course
Automatically move to the next video in the Classroom when playback concludes
- 1 CISSP Part 1 | Course Introduction | CISSP – Certified Information Systems Security Professional
- 2 CISSP Part 2 | CIA Triad - In Pashto | CISSP – Certified Information Systems Security Professional
- 3 CISSP Laws and Regulations Part 3 | DMCA Digital Millennium Copyright Act in Pashto
- 4 CISSP Laws and Regulations Part 4 | HIPAA - Health Insurance Portability and Accountability Act
- 5 CISSP Laws and Regulations Part 5 | SOX - Sarbanes–Oxley Act of 2002 in Pashto
- 6 CISSP Laws and Regulations Part 6 | GLBA- Gramm–Leach–Bliley Act in Pashto
- 7 CISSP Laws and Regulations Part 7 | GDPR - General Data Protection Regulation in Pashto
- 8 CISSP Laws and Regulations Part 8 | CALEA Communications Assistance for Law Enforcement Act
- 9 CISSP Laws and Regulations Part 9 | COPPA Children's Online Privacy Protection Act
- 10 CISSP Laws and Regulations Part 10 | FISMA - Federal Information Security Management Act of 2002
- 11 CISSP Laws & Regulations Part 11 PIPEDA Personal Information Protection and Electronic Documents Act
- 12 CISSP Laws and Regulations Part 12 | FERPA Family Educational Rights and Privacy Act
- 13 CISSP Laws and Regulations Part 13 | Wassenaar Arrangement in Pashto
- 14 CISSP Laws and Regulations Part 14 | PCI DSS Payment Card Industry Data Security Standard in Pashto
- 15 CISSP Part 15 | Misconception About Cybersecurity Explained in Pashto
- 16 CISSP Part 16 | Six Threat Vectors - In Pashto
- 17 CISSP Part 17 | Threat Vectors - Scripts Kiddie_ Hackers & Hacktivists - In Pashto
- 18 CISSP Part 18 | Threat Vectors - Mobile Devices - In Pashto
- 19 CISSP Part 19 | Threat Vectors - Networks In Pashto
- 20 CISSP Part 20 | Threat Vectors - Users In Pashto
- 21 CISSP Part 21 | Threat Vectors - Emails Web Applications & Remote Desktop Portal
- 22 CISSP Part 22 | What is NIST and The Purpose of Security in Pashto
- 23 CISSP Part 23 | Security Defense in Depth and Concentric Circle in Pashto
- 24 CISSP Part 24 | Security Defense in Depth and Concentric Circle in Pashto
- 25 Fawad Bacha Introduction to an Organizational Cybersecurity Framework and Architecture Course CISSP
- 26 CISSP Part 25 | Private and Public Cloud Computing in Pashto
- 27 CISSP Part 26 | Hybrid and Community Cloud Computing in Pashto
- 28 CISSP Part 27 | Where Are Amazon, Google, and Microsoft Data Centers Located in Pashto
- 29 CISSP Part 28 | Internet of Things (IoT) - In Pashto
- 30 CISSP Part 29 A | MITER What is Common Vulnerabilities and Exposures (CVE) and CVSS in Pashto
- 31 CISSP Part 29 B | MITER Common Vulnerabilities and Exposures (CVE) Walk-Through in Pashto
- 32 CISSP Part 30 A | What is Common Weakness Enumeration (CWS) and CWSS In Pashto
- 33 CISSP Part 30B | SQL Injection Real Life Example and Common Weakness Enumeration (CWS) in Pashto
- 34 CISSP Part 31 A | What is Common Criteria? in Pashto
- 35 CISSP Part 31 B | Common Criteria Walk-Through in Real Life Example in Pashto
- 36 CISSP Part 32 | A Brief introduction to World Wide Web in Pashto
- 37 CISSP Part 33 A | What is Deep Web and Dark Web In Pashto
- 38 CISSP Part 33 B | Dark Web, Deep Web, and Normal Web Walk-Through Tour in Pashto
- 39 CISSP domain 1 - Part 34 A | Short Warm-up Domain 1 Introduction
- 40 CISSP domain 1 - Part 34 B | Policies and Standards
- 41 CISSP domain 1 - Part 34 C | Guidelines, Procedures and Baselines
- 42 CISSP domain 1 - Part 34 D | Policies and Procedures Samples
- 43 CISSP domain 1 - Part 35 | What is Security Frameworks in Pashto
- 44 CISSP domain 1 - Part 36 | What is ISO and IEC
- 45 CISSP domain 1 - Part 37 A | An Introduction to Intellectual Property Laws
- 46 CISSP domain 1 - Part 37 B | Trade Secret
- 47 CISSP domain 1 - Part 37 C | Copyright
- 48 CISSP domain 1 - Part 37 D | Trademark
- 49 CISSP domain 1 - Part 37 E | Patent
- 50 CISSP domain 1 - Part 38 | Senior Management
- 51 CISSP domain 1 - Part 39 | Data Breaches and Notifications
- 52 CISSP domain 1 - Part 40 | Organizational Risk Management Framework
- 53 CISSP domain 1 - Part 41 | Conducting Risk Assessments
- 54 CISSP domain 1 - Part 42 | Acceptable Level of Risk - Risk Management Options
- 55 CISSP domain 1 - Part 43 | Risk Management Framework-RMF
- 56 CISSP domain 1 - Part 44 | The Risk Management lifecycle
- 57 CISSP domain 1 - Part 45 | Risk Analysis and Risk Registers
- 58 CISSP domain 1 - Part 46 | Quantitative Risk Analysis
- 59 CISSP domain 1 - Part 47 A | Types of Attackers -Anonymous
- 60 CISSP domain 1 - Part 47 B | Types of Attacks and Hackers
- 61 CISSP domain 1 - Part 47 C | Attack Tree
- 62 CISSP domain 1 - Part 48 | Security Threat Model and Methodology
- 63 CISSP domain 1 - Part 49 | Disaster in 3 Categories
- 64 CISSP domain 1 - Part 50 A | Business Continuity Plan
- 65 CISSP domain 1 - Part 50 B | Business Continuity Plan
- 66 CISSP domain 1 - Part 51 A | Business Impact Analysis
- 67 CISSP domain 1 - Part 51 B | Business Impact Analysis
- 68 CISSP domain 1 - Part 51 C | Business Impact Analysis
- 69 CISSP domain 1 - Part 52 A | Personnel Security
- 70 CISSP domain 1 - Part 52 B | Personnel Security 2
- 71 CISSP domain 1 - Part 52 C | Personnel Security - Hiring process
- 72 CISSP domain 1 - Part 52 D | Personnel Security - Onboarding
- 73 CISSP domain 1- Part 52 E | Personnel Security Employee Termination and Security Awareness Training
- 74 CISSP domain 1 - Part 53 | Ethics | CISSP Course
- 75 CISSP domain 2 - Part 54 | Subjects and Objects Access
- 76 CISSP domain 2 - Part 55 A | Information Life Cycle- Data Acquisition and Use
- 77 CISSP domain 2 - Part 55 B | Information Life Cycle- Data Archive and Disposal
- 78 CISSP domain 2 - Part 56 A | Data Classification Levels in Government
- 79 CISSP domain 2 - Part 56 B | Data Classification Levels in Private Sector
- 80 CISSP domain 2 - Part 57 A | Layers of Responsibility CEO CIO
- 81 CISSP domain 2 - Part 57 B | Layers of Responsibility Data Owner - Custodian and Security Admin
- 82 CISSP domain 2 - Part 57 C | Layers of Responsibility Auditor
- 83 CISSP domain 2 - Part 58 | Privacy is different from Security
- 84 CISSP domain 2 - Part 59 | Retention Policy
- 85 CISSP domain 2 - Part 60 A | Paper Records and Disposal
- 86 CISSP domain 2 - Part 60 B | Digital Records and Disposal
- 87 CISSP domain 2 - Part 61 | Protecting Privacy
- 88 CISSP domain 2 - Part 62 | Data Remanence
- 89 CISSP domain 2 - Part 63 | Types of Memory
- 90 CISSP domain 2 - Part 64 A | Types of Safes
- 91 CISSP domain 2 - Part 64 B | Protecting Assets – Data Loss Prevention DLP
- 92 CISSP domain 3 - Part 65 | Short Intro of Domain 3
- 93 CISSP domain 3 - Part 66 | System Architecture
- 94 CISSP domain 3 - Part 67 | Computer Architecture and The Ring Model
- 95 CISSP domain 3 - Part 68 | Motherboard
- 96 CISSP domain 3 - Part 69 A | Central Processing Unit CPU 1
- 97 CISSP domain 3 - Part 69 B | CPU Thread and Processing
- 98 CISSP domain 3 - Part 70 | Buffer Overflow in Hardware and Software
- 99 CISSP domain 3 - Part 71 | Operating Systems
- 100 CISSP domain 3 - Part 72 A | Virtualization
- 101 CISSP domain 3 - Part 72 B | Virtualization - Hypervisor
- 102 CISSP domain 3 - Part 73 A | System Security Architecture - Trusted Computing Base
- 103 CISSP domain 3 - Part 73 B | System Security Architecture - Security Perimeter
- 104 CISSP domain 3 - Part 73 C | System Security Architecture - Reference Monitor
- 105 CISSP domain 3 - Part 74 A | Security Models Fundamental Concepts
- 106 CISSP domain 3 - Part 74 B | Security Models - Bell–LaPadula Security Model
- 107 CISSP domain 3 - Part 74 C | Security Models - Biba Security Model
- 108 CISSP domain 3 - Part 74 D | Security Models - Clark-Wilson and Non-interference Security Model
- 109 CISSP domain 3 - Part 75 | Certification vs Accreditation
- 110 CISSP domain 3 - Part 76 | Open vs Closed System
- 111 CISSP domain 3 - Part 77 A | Client Based - Mobile System Security
- 112 CISSP domain 3 - Part 77 B | Grid Computing and Peer to Peer Computer System
- 113 CISSP domain 3 - Part 78 | Mobile Devices Threats and Security
- 114 CISSP domain 3 - Part 79 A | Cloud Computing
- 115 CISSP domain 3 - Part 79 B | Cloud Computing Amazon AWS Walk-Through
- 116 CISSP domain 3 - Part 80 | IoT Embedded System
- 117 CISSP domain 3 - Part 81 | Parallel Computing
- 118 CISSP domain 3 - Part 82 A | Industrial Control System - ICS Introduction
- 119 CISSP domain 3 - Part 82 B | Industrial Control System ICS - RTU - Programmable Logic Controller PLC
- 120 CISSP domain 3 - Part 82 C | Distributed Control System DCS - SCADA
- 121 CISSP domain 3 - Part 82 D | SCADA Threats and Security
- 122 CISSP domain 3 - Part 82 E | SCADA Real Life Cyberattack
- 123 CISSP domain 3 - Part 83 | What is Cryptography
- 124 CISSP domain 3 - Part 84 A | Timeline of Cryptography
- 125 CISSP domain 3 - Part 84 B | Timeline of Cryptography
- 126 CISSP domain 3 - Part 85 | What is Cryptosystem and Algorithm
- 127 CISSP domain 3 - Part 86 | One Time Passcode Types of Cipher and Steganography
- 128 CISSP domain 3 - Part 87 A | Symmetric Algorithm - DES
- 129 CISSP domain 3 - Part 87 B | Symmetric Algorithm - Brute Force Attack - 3 DES
- 130 CISSP domain 3 - Part 87 C | Symmetric Algorithm - AES
- 131 CISSP domain 3 - Part 88-90 | Asymmetric Algorithm
- 132 CISSP domain 3 - Part 91 A | Introduction to Physical Security
- 133 CISSP domain 3 - Part 91 B | Physical Security and Alarm and Sensor system
- 134 CISSP domain 3 - Part 91 C | Front Desk Tailgating – Mantrap – Turnstiles
- 135 CISSP domain 3 - Part 91 D | Contraband Check
- 136 CISSP domain 3 - Part 91 E | Human or Dog Guard
- 137 CISSP domain 3 - Part 91 F | Dumpster Diving
- 138 CISSP domain 3 - Part 91 G | Video Surveillance System DVR NVR CCTV
- 139 CISSP domain 3 - Part 91 H | Lightning Security
- 140 CISSP domain 3 - Part 92 | Fences Gates and Bollards
- 141 CISSP domain 3 - Part 93 | Types of Locks
- 142 Part 94 - Domain 3 - Types of Smart Cards
- 143 CISSP domain 3 - Part 95 | Facilities Selection and Construction Check Up
- 144 CISSP domain 3 - Part 96 | Data Center
- 145 CISSP domain 3 - Part 97 A | Electricity | Electrical Power | Types of Electricity
- 146 CISSP domain 3 - Part 97 B | Electricity | Electrical Power | Power Fluctuation
- 147 CISSP domain 3 - Part 98 A | Fire Detector to secure the system with Alarm
- 148 CISSP domain 3 - Part 98 B | Fire Detection, Alarm Optical and Heat system and Suppression
- 149 CISSP domain 4 - Part 99 | Short Introductions | Communications and Network Security
- 150 CISSP domain 4 - Part 100 A | Network Basics and Definitions
- 151 CISSP domain 4 - Part 100 B | Network Basics and Definitions
- 152 CISSP domain 4 - Part 101 | OSI Model
- 153 CISSP domain 4 - Part 102 | TCP_IP Model and Real World Example
- 154 CISSP domain 4 - Part 103 | TCP Further Discussion
- 155 CISSP domain 4 - Part 104 A | IPv4 and IPv6 Addresses
- 156 CISSP domain 4 - Part 104 B | IPv4 and IPv6 Addresses Real Life Example
- 157 CISSP domain 4 - Part 105 | Types of Ports - Analog vs Digital Signal and Asynchronous & Synchronous
- 158 CISSP domain 4 - Part 106 | Types of Cables
- 159 CISSP domain4-Part 107 | FHSS-Frequency Hopping Spread Spectrum-DSSS-Direct Sequence Spread Spectrum
- 160 CISSP domain 4 - Part 108 A | Wireless Technology
- 161 CISSP domain 4 - Part 108 B | Wireless Technology
- 162 CISSP domain 4 - Part 108 C | Wireless Technology
- 163 CISSP domain 4 - Part 109 | Bluetooth and its Attacks
- 164 CISSP domain 4 - Part 110 | Best Practices for Securing WLANs
- 165 CISSP domain 4 - Part 111 | Satellite Network
- 166 CISSP domain 4 - Part 112 | Mobile Wireless Communication
- 167 CISSP domain 4 - Part 113 | Types of Network Topologies
- 168 CISSP domain 4 - Part 114 | CSMA ARP MAC Media Access Control
- 169 CISSP domain 4 - Part 115 | Dynamic Host Configuration Protocol - DHCP and ICMP
- 170 CISSP domain 4 - Part 116 | Simple Network Management Protocol - SNMP
- 171 Part 117 A Domain 4 Domain Name System DNS | DNS server and how it works
- 172 Part 117 B Domain 4 DNS Root Servers Around The World
- 173 Part 118 - Domain 4 - Simple Mail Transfer Protocol - SMTP POP3 IMAP
- 174 Part 119 - Domain 4 - Network Address Translation - NAT
- 175 Part 120 - Domain 4 - What are Routers, Hubs, Switches, Bridges
- 176 Part 121 - Domain 4 - What is Private Branch Exchange System PBX and Phreaker - Phone Hackers
- 177 Part 122 A - Domain 4 - What is Firewall and Types of Firewall
- 178 Part 122 B - Domain 4 - What is Firewall and Types of Firewall
- 179 Part 122 C - Domain 4 - What is Firewall and Types of Firewall
- 180 Part 123 - Domain 4 - What is a Proxy Server | CISSP Course
- 181 Part 124 - Domain 4 - What is a Honeypot? | CISSP Course in Pashto
- 182 Part 125 - Domain 4 - What is a VPN_ Virtual Private Network | CISSP Course
- 183 Part 126 - Domain 5 - Introduction to Domain 5 Identity and Access Management | CISSP Course
- 184 Part 127 - Domain 5 - Subject to Objects and Access Control | CISSP Course
- 185 Part 128 - Domain 5 - Centralized and Decentralized Access Control | CISSP Course
- 186 Part 129 A - Domain 5 - Authentication Something You Know Type 1 | CISSP Course
- 187 Part 129 B - Domain 5 - Authentication Something You Know Type 1 | CISSP Course
- 188 Part 130 - Domain 5 - Authentication Something You Have Type 2 | CISSP Course
- 189 Part 131 - Domain 5 - Authentication Something You Are Type 3 | CISSP Course
- 190 CISSP Domain 5 | Part 132 - Authorization Accountability and Auditing
- 191 CISSP Domain 5 | Part 133 - Identity Management System and Active Directory | CISSP Course