Completed
CISSP domain 2 - Part 64 A | Types of Safes
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
CISSP Full Course
Automatically move to the next video in the Classroom when playback concludes
- 1 CISSP Part 1 | Course Introduction | CISSP – Certified Information Systems Security Professional
- 2 CISSP Part 2 | CIA Triad - In Pashto | CISSP – Certified Information Systems Security Professional
- 3 CISSP Laws and Regulations Part 3 | DMCA Digital Millennium Copyright Act in Pashto
- 4 CISSP Laws and Regulations Part 4 | HIPAA - Health Insurance Portability and Accountability Act
- 5 CISSP Laws and Regulations Part 5 | SOX - Sarbanes–Oxley Act of 2002 in Pashto
- 6 CISSP Laws and Regulations Part 6 | GLBA- Gramm–Leach–Bliley Act in Pashto
- 7 CISSP Laws and Regulations Part 7 | GDPR - General Data Protection Regulation in Pashto
- 8 CISSP Laws and Regulations Part 8 | CALEA Communications Assistance for Law Enforcement Act
- 9 CISSP Laws and Regulations Part 9 | COPPA Children's Online Privacy Protection Act
- 10 CISSP Laws and Regulations Part 10 | FISMA - Federal Information Security Management Act of 2002
- 11 CISSP Laws & Regulations Part 11 PIPEDA Personal Information Protection and Electronic Documents Act
- 12 CISSP Laws and Regulations Part 12 | FERPA Family Educational Rights and Privacy Act
- 13 CISSP Laws and Regulations Part 13 | Wassenaar Arrangement in Pashto
- 14 CISSP Laws and Regulations Part 14 | PCI DSS Payment Card Industry Data Security Standard in Pashto
- 15 CISSP Part 15 | Misconception About Cybersecurity Explained in Pashto
- 16 CISSP Part 16 | Six Threat Vectors - In Pashto
- 17 CISSP Part 17 | Threat Vectors - Scripts Kiddie_ Hackers & Hacktivists - In Pashto
- 18 CISSP Part 18 | Threat Vectors - Mobile Devices - In Pashto
- 19 CISSP Part 19 | Threat Vectors - Networks In Pashto
- 20 CISSP Part 20 | Threat Vectors - Users In Pashto
- 21 CISSP Part 21 | Threat Vectors - Emails Web Applications & Remote Desktop Portal
- 22 CISSP Part 22 | What is NIST and The Purpose of Security in Pashto
- 23 CISSP Part 23 | Security Defense in Depth and Concentric Circle in Pashto
- 24 CISSP Part 24 | Security Defense in Depth and Concentric Circle in Pashto
- 25 Fawad Bacha Introduction to an Organizational Cybersecurity Framework and Architecture Course CISSP
- 26 CISSP Part 25 | Private and Public Cloud Computing in Pashto
- 27 CISSP Part 26 | Hybrid and Community Cloud Computing in Pashto
- 28 CISSP Part 27 | Where Are Amazon, Google, and Microsoft Data Centers Located in Pashto
- 29 CISSP Part 28 | Internet of Things (IoT) - In Pashto
- 30 CISSP Part 29 A | MITER What is Common Vulnerabilities and Exposures (CVE) and CVSS in Pashto
- 31 CISSP Part 29 B | MITER Common Vulnerabilities and Exposures (CVE) Walk-Through in Pashto
- 32 CISSP Part 30 A | What is Common Weakness Enumeration (CWS) and CWSS In Pashto
- 33 CISSP Part 30B | SQL Injection Real Life Example and Common Weakness Enumeration (CWS) in Pashto
- 34 CISSP Part 31 A | What is Common Criteria? in Pashto
- 35 CISSP Part 31 B | Common Criteria Walk-Through in Real Life Example in Pashto
- 36 CISSP Part 32 | A Brief introduction to World Wide Web in Pashto
- 37 CISSP Part 33 A | What is Deep Web and Dark Web In Pashto
- 38 CISSP Part 33 B | Dark Web, Deep Web, and Normal Web Walk-Through Tour in Pashto
- 39 CISSP domain 1 - Part 34 A | Short Warm-up Domain 1 Introduction
- 40 CISSP domain 1 - Part 34 B | Policies and Standards
- 41 CISSP domain 1 - Part 34 C | Guidelines, Procedures and Baselines
- 42 CISSP domain 1 - Part 34 D | Policies and Procedures Samples
- 43 CISSP domain 1 - Part 35 | What is Security Frameworks in Pashto
- 44 CISSP domain 1 - Part 36 | What is ISO and IEC
- 45 CISSP domain 1 - Part 37 A | An Introduction to Intellectual Property Laws
- 46 CISSP domain 1 - Part 37 B | Trade Secret
- 47 CISSP domain 1 - Part 37 C | Copyright
- 48 CISSP domain 1 - Part 37 D | Trademark
- 49 CISSP domain 1 - Part 37 E | Patent
- 50 CISSP domain 1 - Part 38 | Senior Management
- 51 CISSP domain 1 - Part 39 | Data Breaches and Notifications
- 52 CISSP domain 1 - Part 40 | Organizational Risk Management Framework
- 53 CISSP domain 1 - Part 41 | Conducting Risk Assessments
- 54 CISSP domain 1 - Part 42 | Acceptable Level of Risk - Risk Management Options
- 55 CISSP domain 1 - Part 43 | Risk Management Framework-RMF
- 56 CISSP domain 1 - Part 44 | The Risk Management lifecycle
- 57 CISSP domain 1 - Part 45 | Risk Analysis and Risk Registers
- 58 CISSP domain 1 - Part 46 | Quantitative Risk Analysis
- 59 CISSP domain 1 - Part 47 A | Types of Attackers -Anonymous
- 60 CISSP domain 1 - Part 47 B | Types of Attacks and Hackers
- 61 CISSP domain 1 - Part 47 C | Attack Tree
- 62 CISSP domain 1 - Part 48 | Security Threat Model and Methodology
- 63 CISSP domain 1 - Part 49 | Disaster in 3 Categories
- 64 CISSP domain 1 - Part 50 A | Business Continuity Plan
- 65 CISSP domain 1 - Part 50 B | Business Continuity Plan
- 66 CISSP domain 1 - Part 51 A | Business Impact Analysis
- 67 CISSP domain 1 - Part 51 B | Business Impact Analysis
- 68 CISSP domain 1 - Part 51 C | Business Impact Analysis
- 69 CISSP domain 1 - Part 52 A | Personnel Security
- 70 CISSP domain 1 - Part 52 B | Personnel Security 2
- 71 CISSP domain 1 - Part 52 C | Personnel Security - Hiring process
- 72 CISSP domain 1 - Part 52 D | Personnel Security - Onboarding
- 73 CISSP domain 1- Part 52 E | Personnel Security Employee Termination and Security Awareness Training
- 74 CISSP domain 1 - Part 53 | Ethics | CISSP Course
- 75 CISSP domain 2 - Part 54 | Subjects and Objects Access
- 76 CISSP domain 2 - Part 55 A | Information Life Cycle- Data Acquisition and Use
- 77 CISSP domain 2 - Part 55 B | Information Life Cycle- Data Archive and Disposal
- 78 CISSP domain 2 - Part 56 A | Data Classification Levels in Government
- 79 CISSP domain 2 - Part 56 B | Data Classification Levels in Private Sector
- 80 CISSP domain 2 - Part 57 A | Layers of Responsibility CEO CIO
- 81 CISSP domain 2 - Part 57 B | Layers of Responsibility Data Owner - Custodian and Security Admin
- 82 CISSP domain 2 - Part 57 C | Layers of Responsibility Auditor
- 83 CISSP domain 2 - Part 58 | Privacy is different from Security
- 84 CISSP domain 2 - Part 59 | Retention Policy
- 85 CISSP domain 2 - Part 60 A | Paper Records and Disposal
- 86 CISSP domain 2 - Part 60 B | Digital Records and Disposal
- 87 CISSP domain 2 - Part 61 | Protecting Privacy
- 88 CISSP domain 2 - Part 62 | Data Remanence
- 89 CISSP domain 2 - Part 63 | Types of Memory
- 90 CISSP domain 2 - Part 64 A | Types of Safes
- 91 CISSP domain 2 - Part 64 B | Protecting Assets – Data Loss Prevention DLP
- 92 CISSP domain 3 - Part 65 | Short Intro of Domain 3
- 93 CISSP domain 3 - Part 66 | System Architecture
- 94 CISSP domain 3 - Part 67 | Computer Architecture and The Ring Model
- 95 CISSP domain 3 - Part 68 | Motherboard
- 96 CISSP domain 3 - Part 69 A | Central Processing Unit CPU 1
- 97 CISSP domain 3 - Part 69 B | CPU Thread and Processing
- 98 CISSP domain 3 - Part 70 | Buffer Overflow in Hardware and Software
- 99 CISSP domain 3 - Part 71 | Operating Systems
- 100 CISSP domain 3 - Part 72 A | Virtualization
- 101 CISSP domain 3 - Part 72 B | Virtualization - Hypervisor
- 102 CISSP domain 3 - Part 73 A | System Security Architecture - Trusted Computing Base
- 103 CISSP domain 3 - Part 73 B | System Security Architecture - Security Perimeter
- 104 CISSP domain 3 - Part 73 C | System Security Architecture - Reference Monitor
- 105 CISSP domain 3 - Part 74 A | Security Models Fundamental Concepts
- 106 CISSP domain 3 - Part 74 B | Security Models - Bell–LaPadula Security Model
- 107 CISSP domain 3 - Part 74 C | Security Models - Biba Security Model
- 108 CISSP domain 3 - Part 74 D | Security Models - Clark-Wilson and Non-interference Security Model
- 109 CISSP domain 3 - Part 75 | Certification vs Accreditation
- 110 CISSP domain 3 - Part 76 | Open vs Closed System
- 111 CISSP domain 3 - Part 77 A | Client Based - Mobile System Security
- 112 CISSP domain 3 - Part 77 B | Grid Computing and Peer to Peer Computer System
- 113 CISSP domain 3 - Part 78 | Mobile Devices Threats and Security
- 114 CISSP domain 3 - Part 79 A | Cloud Computing
- 115 CISSP domain 3 - Part 79 B | Cloud Computing Amazon AWS Walk-Through
- 116 CISSP domain 3 - Part 80 | IoT Embedded System
- 117 CISSP domain 3 - Part 81 | Parallel Computing
- 118 CISSP domain 3 - Part 82 A | Industrial Control System - ICS Introduction
- 119 CISSP domain 3 - Part 82 B | Industrial Control System ICS - RTU - Programmable Logic Controller PLC
- 120 CISSP domain 3 - Part 82 C | Distributed Control System DCS - SCADA
- 121 CISSP domain 3 - Part 82 D | SCADA Threats and Security
- 122 CISSP domain 3 - Part 82 E | SCADA Real Life Cyberattack
- 123 CISSP domain 3 - Part 83 | What is Cryptography
- 124 CISSP domain 3 - Part 84 A | Timeline of Cryptography
- 125 CISSP domain 3 - Part 84 B | Timeline of Cryptography
- 126 CISSP domain 3 - Part 85 | What is Cryptosystem and Algorithm
- 127 CISSP domain 3 - Part 86 | One Time Passcode Types of Cipher and Steganography
- 128 CISSP domain 3 - Part 87 A | Symmetric Algorithm - DES
- 129 CISSP domain 3 - Part 87 B | Symmetric Algorithm - Brute Force Attack - 3 DES
- 130 CISSP domain 3 - Part 87 C | Symmetric Algorithm - AES
- 131 CISSP domain 3 - Part 88-90 | Asymmetric Algorithm
- 132 CISSP domain 3 - Part 91 A | Introduction to Physical Security
- 133 CISSP domain 3 - Part 91 B | Physical Security and Alarm and Sensor system
- 134 CISSP domain 3 - Part 91 C | Front Desk Tailgating – Mantrap – Turnstiles
- 135 CISSP domain 3 - Part 91 D | Contraband Check
- 136 CISSP domain 3 - Part 91 E | Human or Dog Guard
- 137 CISSP domain 3 - Part 91 F | Dumpster Diving
- 138 CISSP domain 3 - Part 91 G | Video Surveillance System DVR NVR CCTV
- 139 CISSP domain 3 - Part 91 H | Lightning Security
- 140 CISSP domain 3 - Part 92 | Fences Gates and Bollards
- 141 CISSP domain 3 - Part 93 | Types of Locks
- 142 Part 94 - Domain 3 - Types of Smart Cards
- 143 CISSP domain 3 - Part 95 | Facilities Selection and Construction Check Up
- 144 CISSP domain 3 - Part 96 | Data Center
- 145 CISSP domain 3 - Part 97 A | Electricity | Electrical Power | Types of Electricity
- 146 CISSP domain 3 - Part 97 B | Electricity | Electrical Power | Power Fluctuation
- 147 CISSP domain 3 - Part 98 A | Fire Detector to secure the system with Alarm
- 148 CISSP domain 3 - Part 98 B | Fire Detection, Alarm Optical and Heat system and Suppression
- 149 CISSP domain 4 - Part 99 | Short Introductions | Communications and Network Security
- 150 CISSP domain 4 - Part 100 A | Network Basics and Definitions
- 151 CISSP domain 4 - Part 100 B | Network Basics and Definitions
- 152 CISSP domain 4 - Part 101 | OSI Model
- 153 CISSP domain 4 - Part 102 | TCP_IP Model and Real World Example
- 154 CISSP domain 4 - Part 103 | TCP Further Discussion
- 155 CISSP domain 4 - Part 104 A | IPv4 and IPv6 Addresses
- 156 CISSP domain 4 - Part 104 B | IPv4 and IPv6 Addresses Real Life Example
- 157 CISSP domain 4 - Part 105 | Types of Ports - Analog vs Digital Signal and Asynchronous & Synchronous
- 158 CISSP domain 4 - Part 106 | Types of Cables
- 159 CISSP domain4-Part 107 | FHSS-Frequency Hopping Spread Spectrum-DSSS-Direct Sequence Spread Spectrum
- 160 CISSP domain 4 - Part 108 A | Wireless Technology
- 161 CISSP domain 4 - Part 108 B | Wireless Technology
- 162 CISSP domain 4 - Part 108 C | Wireless Technology
- 163 CISSP domain 4 - Part 109 | Bluetooth and its Attacks
- 164 CISSP domain 4 - Part 110 | Best Practices for Securing WLANs
- 165 CISSP domain 4 - Part 111 | Satellite Network
- 166 CISSP domain 4 - Part 112 | Mobile Wireless Communication
- 167 CISSP domain 4 - Part 113 | Types of Network Topologies
- 168 CISSP domain 4 - Part 114 | CSMA ARP MAC Media Access Control
- 169 CISSP domain 4 - Part 115 | Dynamic Host Configuration Protocol - DHCP and ICMP
- 170 CISSP domain 4 - Part 116 | Simple Network Management Protocol - SNMP
- 171 Part 117 A Domain 4 Domain Name System DNS | DNS server and how it works
- 172 Part 117 B Domain 4 DNS Root Servers Around The World
- 173 Part 118 - Domain 4 - Simple Mail Transfer Protocol - SMTP POP3 IMAP
- 174 Part 119 - Domain 4 - Network Address Translation - NAT
- 175 Part 120 - Domain 4 - What are Routers, Hubs, Switches, Bridges
- 176 Part 121 - Domain 4 - What is Private Branch Exchange System PBX and Phreaker - Phone Hackers
- 177 Part 122 A - Domain 4 - What is Firewall and Types of Firewall
- 178 Part 122 B - Domain 4 - What is Firewall and Types of Firewall
- 179 Part 122 C - Domain 4 - What is Firewall and Types of Firewall
- 180 Part 123 - Domain 4 - What is a Proxy Server | CISSP Course
- 181 Part 124 - Domain 4 - What is a Honeypot? | CISSP Course in Pashto
- 182 Part 125 - Domain 4 - What is a VPN_ Virtual Private Network | CISSP Course
- 183 Part 126 - Domain 5 - Introduction to Domain 5 Identity and Access Management | CISSP Course
- 184 Part 127 - Domain 5 - Subject to Objects and Access Control | CISSP Course
- 185 Part 128 - Domain 5 - Centralized and Decentralized Access Control | CISSP Course
- 186 Part 129 A - Domain 5 - Authentication Something You Know Type 1 | CISSP Course
- 187 Part 129 B - Domain 5 - Authentication Something You Know Type 1 | CISSP Course
- 188 Part 130 - Domain 5 - Authentication Something You Have Type 2 | CISSP Course
- 189 Part 131 - Domain 5 - Authentication Something You Are Type 3 | CISSP Course
- 190 CISSP Domain 5 | Part 132 - Authorization Accountability and Auditing
- 191 CISSP Domain 5 | Part 133 - Identity Management System and Active Directory | CISSP Course