CISSP Full Course

CISSP Full Course

Cyber Pashto via YouTube Direct link

CISSP domain 2 - Part 56 A | Data Classification Levels in Government

78 of 191

78 of 191

CISSP domain 2 - Part 56 A | Data Classification Levels in Government

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

CISSP Full Course

Automatically move to the next video in the Classroom when playback concludes

  1. 1 CISSP Part 1 | Course Introduction | CISSP – Certified Information Systems Security Professional
  2. 2 CISSP Part 2 | CIA Triad - In Pashto | CISSP – Certified Information Systems Security Professional
  3. 3 CISSP Laws and Regulations Part 3 | DMCA Digital Millennium Copyright Act in Pashto
  4. 4 CISSP Laws and Regulations Part 4 | HIPAA - Health Insurance Portability and Accountability Act
  5. 5 CISSP Laws and Regulations Part 5 | SOX - Sarbanes–Oxley Act of 2002 in Pashto
  6. 6 CISSP Laws and Regulations Part 6 | GLBA- Gramm–Leach–Bliley Act in Pashto
  7. 7 CISSP Laws and Regulations Part 7 | GDPR - General Data Protection Regulation in Pashto
  8. 8 CISSP Laws and Regulations Part 8 | CALEA Communications Assistance for Law Enforcement Act
  9. 9 CISSP Laws and Regulations Part 9 | COPPA Children's Online Privacy Protection Act
  10. 10 CISSP Laws and Regulations Part 10 | FISMA - Federal Information Security Management Act of 2002
  11. 11 CISSP Laws & Regulations Part 11 PIPEDA Personal Information Protection and Electronic Documents Act
  12. 12 CISSP Laws and Regulations Part 12 | FERPA Family Educational Rights and Privacy Act
  13. 13 CISSP Laws and Regulations Part 13 | Wassenaar Arrangement in Pashto
  14. 14 CISSP Laws and Regulations Part 14 | PCI DSS Payment Card Industry Data Security Standard in Pashto
  15. 15 CISSP Part 15 | Misconception About Cybersecurity Explained in Pashto
  16. 16 CISSP Part 16 | Six Threat Vectors - In Pashto
  17. 17 CISSP Part 17 | Threat Vectors - Scripts Kiddie_ Hackers & Hacktivists - In Pashto
  18. 18 CISSP Part 18 | Threat Vectors - Mobile Devices - In Pashto
  19. 19 CISSP Part 19 | Threat Vectors - Networks In Pashto
  20. 20 CISSP Part 20 | Threat Vectors - Users In Pashto
  21. 21 CISSP Part 21 | Threat Vectors - Emails Web Applications & Remote Desktop Portal
  22. 22 CISSP Part 22 | What is NIST and The Purpose of Security in Pashto
  23. 23 CISSP Part 23 | Security Defense in Depth and Concentric Circle in Pashto
  24. 24 CISSP Part 24 | Security Defense in Depth and Concentric Circle in Pashto
  25. 25 Fawad Bacha Introduction to an Organizational Cybersecurity Framework and Architecture Course CISSP
  26. 26 CISSP Part 25 | Private and Public Cloud Computing in Pashto
  27. 27 CISSP Part 26 | Hybrid and Community Cloud Computing in Pashto
  28. 28 CISSP Part 27 | Where Are Amazon, Google, and Microsoft Data Centers Located in Pashto
  29. 29 CISSP Part 28 | Internet of Things (IoT) - In Pashto
  30. 30 CISSP Part 29 A | MITER What is Common Vulnerabilities and Exposures (CVE) and CVSS in Pashto
  31. 31 CISSP Part 29 B | MITER Common Vulnerabilities and Exposures (CVE) Walk-Through in Pashto
  32. 32 CISSP Part 30 A | What is Common Weakness Enumeration (CWS) and CWSS In Pashto
  33. 33 CISSP Part 30B | SQL Injection Real Life Example and Common Weakness Enumeration (CWS) in Pashto
  34. 34 CISSP Part 31 A | What is Common Criteria? in Pashto
  35. 35 CISSP Part 31 B | Common Criteria Walk-Through in Real Life Example in Pashto
  36. 36 CISSP Part 32 | A Brief introduction to World Wide Web in Pashto
  37. 37 CISSP Part 33 A | What is Deep Web and Dark Web In Pashto
  38. 38 CISSP Part 33 B | Dark Web, Deep Web, and Normal Web Walk-Through Tour in Pashto
  39. 39 CISSP domain 1 - Part 34 A | Short Warm-up Domain 1 Introduction
  40. 40 CISSP domain 1 - Part 34 B | Policies and Standards
  41. 41 CISSP domain 1 - Part 34 C | Guidelines, Procedures and Baselines
  42. 42 CISSP domain 1 - Part 34 D | Policies and Procedures Samples
  43. 43 CISSP domain 1 - Part 35 | What is Security Frameworks in Pashto
  44. 44 CISSP domain 1 - Part 36 | What is ISO and IEC
  45. 45 CISSP domain 1 - Part 37 A | An Introduction to Intellectual Property Laws
  46. 46 CISSP domain 1 - Part 37 B | Trade Secret
  47. 47 CISSP domain 1 - Part 37 C | Copyright
  48. 48 CISSP domain 1 - Part 37 D | Trademark
  49. 49 CISSP domain 1 - Part 37 E | Patent
  50. 50 CISSP domain 1 - Part 38 | Senior Management
  51. 51 CISSP domain 1 - Part 39 | Data Breaches and Notifications
  52. 52 CISSP domain 1 - Part 40 | Organizational Risk Management Framework
  53. 53 CISSP domain 1 - Part 41 | Conducting Risk Assessments
  54. 54 CISSP domain 1 - Part 42 | Acceptable Level of Risk - Risk Management Options
  55. 55 CISSP domain 1 - Part 43 | Risk Management Framework-RMF
  56. 56 CISSP domain 1 - Part 44 | The Risk Management lifecycle
  57. 57 CISSP domain 1 - Part 45 | Risk Analysis and Risk Registers
  58. 58 CISSP domain 1 - Part 46 | Quantitative Risk Analysis
  59. 59 CISSP domain 1 - Part 47 A | Types of Attackers -Anonymous
  60. 60 CISSP domain 1 - Part 47 B | Types of Attacks and Hackers
  61. 61 CISSP domain 1 - Part 47 C | Attack Tree
  62. 62 CISSP domain 1 - Part 48 | Security Threat Model and Methodology
  63. 63 CISSP domain 1 - Part 49 | Disaster in 3 Categories
  64. 64 CISSP domain 1 - Part 50 A | Business Continuity Plan
  65. 65 CISSP domain 1 - Part 50 B | Business Continuity Plan
  66. 66 CISSP domain 1 - Part 51 A | Business Impact Analysis
  67. 67 CISSP domain 1 - Part 51 B | Business Impact Analysis
  68. 68 CISSP domain 1 - Part 51 C | Business Impact Analysis
  69. 69 CISSP domain 1 - Part 52 A | Personnel Security
  70. 70 CISSP domain 1 - Part 52 B | Personnel Security 2
  71. 71 CISSP domain 1 - Part 52 C | Personnel Security - Hiring process
  72. 72 CISSP domain 1 - Part 52 D | Personnel Security - Onboarding
  73. 73 CISSP domain 1- Part 52 E | Personnel Security Employee Termination and Security Awareness Training
  74. 74 CISSP domain 1 - Part 53 | Ethics | CISSP Course
  75. 75 CISSP domain 2 - Part 54 | Subjects and Objects Access
  76. 76 CISSP domain 2 - Part 55 A | Information Life Cycle- Data Acquisition and Use
  77. 77 CISSP domain 2 - Part 55 B | Information Life Cycle- Data Archive and Disposal
  78. 78 CISSP domain 2 - Part 56 A | Data Classification Levels in Government
  79. 79 CISSP domain 2 - Part 56 B | Data Classification Levels in Private Sector
  80. 80 CISSP domain 2 - Part 57 A | Layers of Responsibility CEO CIO
  81. 81 CISSP domain 2 - Part 57 B | Layers of Responsibility Data Owner - Custodian and Security Admin
  82. 82 CISSP domain 2 - Part 57 C | Layers of Responsibility Auditor
  83. 83 CISSP domain 2 - Part 58 | Privacy is different from Security
  84. 84 CISSP domain 2 - Part 59 | Retention Policy
  85. 85 CISSP domain 2 - Part 60 A | Paper Records and Disposal
  86. 86 CISSP domain 2 - Part 60 B | Digital Records and Disposal
  87. 87 CISSP domain 2 - Part 61 | Protecting Privacy
  88. 88 CISSP domain 2 - Part 62 | Data Remanence
  89. 89 CISSP domain 2 - Part 63 | Types of Memory
  90. 90 CISSP domain 2 - Part 64 A | Types of Safes
  91. 91 CISSP domain 2 - Part 64 B | Protecting Assets – Data Loss Prevention DLP
  92. 92 CISSP domain 3 - Part 65 | Short Intro of Domain 3
  93. 93 CISSP domain 3 - Part 66 | System Architecture
  94. 94 CISSP domain 3 - Part 67 | Computer Architecture and The Ring Model
  95. 95 CISSP domain 3 - Part 68 | Motherboard
  96. 96 CISSP domain 3 - Part 69 A | Central Processing Unit CPU 1
  97. 97 CISSP domain 3 - Part 69 B | CPU Thread and Processing
  98. 98 CISSP domain 3 - Part 70 | Buffer Overflow in Hardware and Software
  99. 99 CISSP domain 3 - Part 71 | Operating Systems
  100. 100 CISSP domain 3 - Part 72 A | Virtualization
  101. 101 CISSP domain 3 - Part 72 B | Virtualization - Hypervisor
  102. 102 CISSP domain 3 - Part 73 A | System Security Architecture - Trusted Computing Base
  103. 103 CISSP domain 3 - Part 73 B | System Security Architecture - Security Perimeter
  104. 104 CISSP domain 3 - Part 73 C | System Security Architecture - Reference Monitor
  105. 105 CISSP domain 3 - Part 74 A | Security Models Fundamental Concepts
  106. 106 CISSP domain 3 - Part 74 B | Security Models - Bell–LaPadula Security Model
  107. 107 CISSP domain 3 - Part 74 C | Security Models - Biba Security Model
  108. 108 CISSP domain 3 - Part 74 D | Security Models - Clark-Wilson and Non-interference Security Model
  109. 109 CISSP domain 3 - Part 75 | Certification vs Accreditation
  110. 110 CISSP domain 3 - Part 76 | Open vs Closed System
  111. 111 CISSP domain 3 - Part 77 A | Client Based - Mobile System Security
  112. 112 CISSP domain 3 - Part 77 B | Grid Computing and Peer to Peer Computer System
  113. 113 CISSP domain 3 - Part 78 | Mobile Devices Threats and Security
  114. 114 CISSP domain 3 - Part 79 A | Cloud Computing
  115. 115 CISSP domain 3 - Part 79 B | Cloud Computing Amazon AWS Walk-Through
  116. 116 CISSP domain 3 - Part 80 | IoT Embedded System
  117. 117 CISSP domain 3 - Part 81 | Parallel Computing
  118. 118 CISSP domain 3 - Part 82 A | Industrial Control System - ICS Introduction
  119. 119 CISSP domain 3 - Part 82 B | Industrial Control System ICS - RTU - Programmable Logic Controller PLC
  120. 120 CISSP domain 3 - Part 82 C | Distributed Control System DCS - SCADA
  121. 121 CISSP domain 3 - Part 82 D | SCADA Threats and Security
  122. 122 CISSP domain 3 - Part 82 E | SCADA Real Life Cyberattack
  123. 123 CISSP domain 3 - Part 83 | What is Cryptography
  124. 124 CISSP domain 3 - Part 84 A | Timeline of Cryptography
  125. 125 CISSP domain 3 - Part 84 B | Timeline of Cryptography
  126. 126 CISSP domain 3 - Part 85 | What is Cryptosystem and Algorithm
  127. 127 CISSP domain 3 - Part 86 | One Time Passcode Types of Cipher and Steganography
  128. 128 CISSP domain 3 - Part 87 A | Symmetric Algorithm - DES
  129. 129 CISSP domain 3 - Part 87 B | Symmetric Algorithm - Brute Force Attack - 3 DES
  130. 130 CISSP domain 3 - Part 87 C | Symmetric Algorithm - AES
  131. 131 CISSP domain 3 - Part 88-90 | Asymmetric Algorithm
  132. 132 CISSP domain 3 - Part 91 A | Introduction to Physical Security
  133. 133 CISSP domain 3 - Part 91 B | Physical Security and Alarm and Sensor system
  134. 134 CISSP domain 3 - Part 91 C | Front Desk Tailgating – Mantrap – Turnstiles
  135. 135 CISSP domain 3 - Part 91 D | Contraband Check
  136. 136 CISSP domain 3 - Part 91 E | Human or Dog Guard
  137. 137 CISSP domain 3 - Part 91 F | Dumpster Diving
  138. 138 CISSP domain 3 - Part 91 G | Video Surveillance System DVR NVR CCTV
  139. 139 CISSP domain 3 - Part 91 H | Lightning Security
  140. 140 CISSP domain 3 - Part 92 | Fences Gates and Bollards
  141. 141 CISSP domain 3 - Part 93 | Types of Locks
  142. 142 Part 94 - Domain 3 - Types of Smart Cards
  143. 143 CISSP domain 3 - Part 95 | Facilities Selection and Construction Check Up
  144. 144 CISSP domain 3 - Part 96 | Data Center
  145. 145 CISSP domain 3 - Part 97 A | Electricity | Electrical Power | Types of Electricity
  146. 146 CISSP domain 3 - Part 97 B | Electricity | Electrical Power | Power Fluctuation
  147. 147 CISSP domain 3 - Part 98 A | Fire Detector to secure the system with Alarm
  148. 148 CISSP domain 3 - Part 98 B | Fire Detection, Alarm Optical and Heat system and Suppression
  149. 149 CISSP domain 4 - Part 99 | Short Introductions | Communications and Network Security
  150. 150 CISSP domain 4 - Part 100 A | Network Basics and Definitions
  151. 151 CISSP domain 4 - Part 100 B | Network Basics and Definitions
  152. 152 CISSP domain 4 - Part 101 | OSI Model
  153. 153 CISSP domain 4 - Part 102 | TCP_IP Model and Real World Example
  154. 154 CISSP domain 4 - Part 103 | TCP Further Discussion
  155. 155 CISSP domain 4 - Part 104 A | IPv4 and IPv6 Addresses
  156. 156 CISSP domain 4 - Part 104 B | IPv4 and IPv6 Addresses Real Life Example
  157. 157 CISSP domain 4 - Part 105 | Types of Ports - Analog vs Digital Signal and Asynchronous & Synchronous
  158. 158 CISSP domain 4 - Part 106 | Types of Cables
  159. 159 CISSP domain4-Part 107 | FHSS-Frequency Hopping Spread Spectrum-DSSS-Direct Sequence Spread Spectrum
  160. 160 CISSP domain 4 - Part 108 A | Wireless Technology
  161. 161 CISSP domain 4 - Part 108 B | Wireless Technology
  162. 162 CISSP domain 4 - Part 108 C | Wireless Technology
  163. 163 CISSP domain 4 - Part 109 | Bluetooth and its Attacks
  164. 164 CISSP domain 4 - Part 110 | Best Practices for Securing WLANs
  165. 165 CISSP domain 4 - Part 111 | Satellite Network
  166. 166 CISSP domain 4 - Part 112 | Mobile Wireless Communication
  167. 167 CISSP domain 4 - Part 113 | Types of Network Topologies
  168. 168 CISSP domain 4 - Part 114 | CSMA ARP MAC Media Access Control
  169. 169 CISSP domain 4 - Part 115 | Dynamic Host Configuration Protocol - DHCP and ICMP
  170. 170 CISSP domain 4 - Part 116 | Simple Network Management Protocol - SNMP
  171. 171 Part 117 A Domain 4 Domain Name System DNS | DNS server and how it works
  172. 172 Part 117 B Domain 4 DNS Root Servers Around The World
  173. 173 Part 118 - Domain 4 - Simple Mail Transfer Protocol - SMTP POP3 IMAP
  174. 174 Part 119 - Domain 4 - Network Address Translation - NAT
  175. 175 Part 120 - Domain 4 - What are Routers, Hubs, Switches, Bridges
  176. 176 Part 121 - Domain 4 - What is Private Branch Exchange System PBX and Phreaker - Phone Hackers
  177. 177 Part 122 A - Domain 4 - What is Firewall and Types of Firewall
  178. 178 Part 122 B - Domain 4 - What is Firewall and Types of Firewall
  179. 179 Part 122 C - Domain 4 - What is Firewall and Types of Firewall
  180. 180 Part 123 - Domain 4 - What is a Proxy Server | CISSP Course
  181. 181 Part 124 - Domain 4 - What is a Honeypot? | CISSP Course in Pashto
  182. 182 Part 125 - Domain 4 - What is a VPN_ Virtual Private Network | CISSP Course
  183. 183 Part 126 - Domain 5 - Introduction to Domain 5 Identity and Access Management | CISSP Course
  184. 184 Part 127 - Domain 5 - Subject to Objects and Access Control | CISSP Course
  185. 185 Part 128 - Domain 5 - Centralized and Decentralized Access Control | CISSP Course
  186. 186 Part 129 A - Domain 5 - Authentication Something You Know Type 1 | CISSP Course
  187. 187 Part 129 B - Domain 5 - Authentication Something You Know Type 1 | CISSP Course
  188. 188 Part 130 - Domain 5 - Authentication Something You Have Type 2 | CISSP Course
  189. 189 Part 131 - Domain 5 - Authentication Something You Are Type 3 | CISSP Course
  190. 190 CISSP Domain 5 | Part 132 - Authorization Accountability and Auditing
  191. 191 CISSP Domain 5 | Part 133 - Identity Management System and Active Directory | CISSP Course

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.