Overview
Syllabus
CISSP Part 1 | Course Introduction | CISSP – Certified Information Systems Security Professional.
CISSP Part 2 | CIA Triad - In Pashto | CISSP – Certified Information Systems Security Professional.
CISSP Laws and Regulations Part 3 | DMCA Digital Millennium Copyright Act in Pashto.
CISSP Laws and Regulations Part 4 | HIPAA - Health Insurance Portability and Accountability Act.
CISSP Laws and Regulations Part 5 | SOX - Sarbanes–Oxley Act of 2002 in Pashto.
CISSP Laws and Regulations Part 6 | GLBA- Gramm–Leach–Bliley Act in Pashto.
CISSP Laws and Regulations Part 7 | GDPR - General Data Protection Regulation in Pashto.
CISSP Laws and Regulations Part 8 | CALEA Communications Assistance for Law Enforcement Act.
CISSP Laws and Regulations Part 9 | COPPA Children's Online Privacy Protection Act.
CISSP Laws and Regulations Part 10 | FISMA - Federal Information Security Management Act of 2002.
CISSP Laws & Regulations Part 11 PIPEDA Personal Information Protection and Electronic Documents Act.
CISSP Laws and Regulations Part 12 | FERPA Family Educational Rights and Privacy Act.
CISSP Laws and Regulations Part 13 | Wassenaar Arrangement in Pashto.
CISSP Laws and Regulations Part 14 | PCI DSS Payment Card Industry Data Security Standard in Pashto.
CISSP Part 15 | Misconception About Cybersecurity Explained in Pashto.
CISSP Part 16 | Six Threat Vectors - In Pashto.
CISSP Part 17 | Threat Vectors - Scripts Kiddie_ Hackers & Hacktivists - In Pashto.
CISSP Part 18 | Threat Vectors - Mobile Devices - In Pashto.
CISSP Part 19 | Threat Vectors - Networks In Pashto.
CISSP Part 20 | Threat Vectors - Users In Pashto.
CISSP Part 21 | Threat Vectors - Emails Web Applications & Remote Desktop Portal.
CISSP Part 22 | What is NIST and The Purpose of Security in Pashto.
CISSP Part 23 | Security Defense in Depth and Concentric Circle in Pashto.
CISSP Part 24 | Security Defense in Depth and Concentric Circle in Pashto.
Fawad Bacha Introduction to an Organizational Cybersecurity Framework and Architecture Course CISSP.
CISSP Part 25 | Private and Public Cloud Computing in Pashto.
CISSP Part 26 | Hybrid and Community Cloud Computing in Pashto.
CISSP Part 27 | Where Are Amazon, Google, and Microsoft Data Centers Located in Pashto.
CISSP Part 28 | Internet of Things (IoT) - In Pashto.
CISSP Part 29 A | MITER What is Common Vulnerabilities and Exposures (CVE) and CVSS in Pashto.
CISSP Part 29 B | MITER Common Vulnerabilities and Exposures (CVE) Walk-Through in Pashto.
CISSP Part 30 A | What is Common Weakness Enumeration (CWS) and CWSS In Pashto.
CISSP Part 30B | SQL Injection Real Life Example and Common Weakness Enumeration (CWS) in Pashto.
CISSP Part 31 A | What is Common Criteria? in Pashto.
CISSP Part 31 B | Common Criteria Walk-Through in Real Life Example in Pashto.
CISSP Part 32 | A Brief introduction to World Wide Web in Pashto.
CISSP Part 33 A | What is Deep Web and Dark Web In Pashto.
CISSP Part 33 B | Dark Web, Deep Web, and Normal Web Walk-Through Tour in Pashto.
CISSP domain 1 - Part 34 A | Short Warm-up Domain 1 Introduction.
CISSP domain 1 - Part 34 B | Policies and Standards.
CISSP domain 1 - Part 34 C | Guidelines, Procedures and Baselines.
CISSP domain 1 - Part 34 D | Policies and Procedures Samples.
CISSP domain 1 - Part 35 | What is Security Frameworks in Pashto.
CISSP domain 1 - Part 36 | What is ISO and IEC.
CISSP domain 1 - Part 37 A | An Introduction to Intellectual Property Laws.
CISSP domain 1 - Part 37 B | Trade Secret.
CISSP domain 1 - Part 37 C | Copyright.
CISSP domain 1 - Part 37 D | Trademark.
CISSP domain 1 - Part 37 E | Patent.
CISSP domain 1 - Part 38 | Senior Management.
CISSP domain 1 - Part 39 | Data Breaches and Notifications.
CISSP domain 1 - Part 40 | Organizational Risk Management Framework.
CISSP domain 1 - Part 41 | Conducting Risk Assessments.
CISSP domain 1 - Part 42 | Acceptable Level of Risk - Risk Management Options.
CISSP domain 1 - Part 43 | Risk Management Framework-RMF.
CISSP domain 1 - Part 44 | The Risk Management lifecycle.
CISSP domain 1 - Part 45 | Risk Analysis and Risk Registers.
CISSP domain 1 - Part 46 | Quantitative Risk Analysis.
CISSP domain 1 - Part 47 A | Types of Attackers -Anonymous.
CISSP domain 1 - Part 47 B | Types of Attacks and Hackers.
CISSP domain 1 - Part 47 C | Attack Tree.
CISSP domain 1 - Part 48 | Security Threat Model and Methodology.
CISSP domain 1 - Part 49 | Disaster in 3 Categories.
CISSP domain 1 - Part 50 A | Business Continuity Plan.
CISSP domain 1 - Part 50 B | Business Continuity Plan.
CISSP domain 1 - Part 51 A | Business Impact Analysis.
CISSP domain 1 - Part 51 B | Business Impact Analysis.
CISSP domain 1 - Part 51 C | Business Impact Analysis.
CISSP domain 1 - Part 52 A | Personnel Security.
CISSP domain 1 - Part 52 B | Personnel Security 2.
CISSP domain 1 - Part 52 C | Personnel Security - Hiring process.
CISSP domain 1 - Part 52 D | Personnel Security - Onboarding.
CISSP domain 1- Part 52 E | Personnel Security Employee Termination and Security Awareness Training.
CISSP domain 1 - Part 53 | Ethics | CISSP Course.
CISSP domain 2 - Part 54 | Subjects and Objects Access.
CISSP domain 2 - Part 55 A | Information Life Cycle- Data Acquisition and Use.
CISSP domain 2 - Part 55 B | Information Life Cycle- Data Archive and Disposal.
CISSP domain 2 - Part 56 A | Data Classification Levels in Government.
CISSP domain 2 - Part 56 B | Data Classification Levels in Private Sector.
CISSP domain 2 - Part 57 A | Layers of Responsibility CEO CIO.
CISSP domain 2 - Part 57 B | Layers of Responsibility Data Owner - Custodian and Security Admin.
CISSP domain 2 - Part 57 C | Layers of Responsibility Auditor.
CISSP domain 2 - Part 58 | Privacy is different from Security.
CISSP domain 2 - Part 59 | Retention Policy.
CISSP domain 2 - Part 60 A | Paper Records and Disposal.
CISSP domain 2 - Part 60 B | Digital Records and Disposal.
CISSP domain 2 - Part 61 | Protecting Privacy.
CISSP domain 2 - Part 62 | Data Remanence.
CISSP domain 2 - Part 63 | Types of Memory.
CISSP domain 2 - Part 64 A | Types of Safes.
CISSP domain 2 - Part 64 B | Protecting Assets – Data Loss Prevention DLP.
CISSP domain 3 - Part 65 | Short Intro of Domain 3.
CISSP domain 3 - Part 66 | System Architecture.
CISSP domain 3 - Part 67 | Computer Architecture and The Ring Model.
CISSP domain 3 - Part 68 | Motherboard.
CISSP domain 3 - Part 69 A | Central Processing Unit CPU 1.
CISSP domain 3 - Part 69 B | CPU Thread and Processing.
CISSP domain 3 - Part 70 | Buffer Overflow in Hardware and Software.
CISSP domain 3 - Part 71 | Operating Systems.
CISSP domain 3 - Part 72 A | Virtualization.
CISSP domain 3 - Part 72 B | Virtualization - Hypervisor.
CISSP domain 3 - Part 73 A | System Security Architecture - Trusted Computing Base.
CISSP domain 3 - Part 73 B | System Security Architecture - Security Perimeter.
CISSP domain 3 - Part 73 C | System Security Architecture - Reference Monitor.
CISSP domain 3 - Part 74 A | Security Models Fundamental Concepts.
CISSP domain 3 - Part 74 B | Security Models - Bell–LaPadula Security Model.
CISSP domain 3 - Part 74 C | Security Models - Biba Security Model.
CISSP domain 3 - Part 74 D | Security Models - Clark-Wilson and Non-interference Security Model.
CISSP domain 3 - Part 75 | Certification vs Accreditation.
CISSP domain 3 - Part 76 | Open vs Closed System.
CISSP domain 3 - Part 77 A | Client Based - Mobile System Security.
CISSP domain 3 - Part 77 B | Grid Computing and Peer to Peer Computer System.
CISSP domain 3 - Part 78 | Mobile Devices Threats and Security.
CISSP domain 3 - Part 79 A | Cloud Computing.
CISSP domain 3 - Part 79 B | Cloud Computing Amazon AWS Walk-Through.
CISSP domain 3 - Part 80 | IoT Embedded System.
CISSP domain 3 - Part 81 | Parallel Computing.
CISSP domain 3 - Part 82 A | Industrial Control System - ICS Introduction.
CISSP domain 3 - Part 82 B | Industrial Control System ICS - RTU - Programmable Logic Controller PLC.
CISSP domain 3 - Part 82 C | Distributed Control System DCS - SCADA.
CISSP domain 3 - Part 82 D | SCADA Threats and Security.
CISSP domain 3 - Part 82 E | SCADA Real Life Cyberattack.
CISSP domain 3 - Part 83 | What is Cryptography.
CISSP domain 3 - Part 84 A | Timeline of Cryptography.
CISSP domain 3 - Part 84 B | Timeline of Cryptography.
CISSP domain 3 - Part 85 | What is Cryptosystem and Algorithm.
CISSP domain 3 - Part 86 | One Time Passcode Types of Cipher and Steganography.
CISSP domain 3 - Part 87 A | Symmetric Algorithm - DES.
CISSP domain 3 - Part 87 B | Symmetric Algorithm - Brute Force Attack - 3 DES.
CISSP domain 3 - Part 87 C | Symmetric Algorithm - AES.
CISSP domain 3 - Part 88-90 | Asymmetric Algorithm.
CISSP domain 3 - Part 91 A | Introduction to Physical Security.
CISSP domain 3 - Part 91 B | Physical Security and Alarm and Sensor system.
CISSP domain 3 - Part 91 C | Front Desk Tailgating – Mantrap – Turnstiles.
CISSP domain 3 - Part 91 D | Contraband Check.
CISSP domain 3 - Part 91 E | Human or Dog Guard.
CISSP domain 3 - Part 91 F | Dumpster Diving.
CISSP domain 3 - Part 91 G | Video Surveillance System DVR NVR CCTV.
CISSP domain 3 - Part 91 H | Lightning Security.
CISSP domain 3 - Part 92 | Fences Gates and Bollards.
CISSP domain 3 - Part 93 | Types of Locks.
Part 94 - Domain 3 - Types of Smart Cards.
CISSP domain 3 - Part 95 | Facilities Selection and Construction Check Up.
CISSP domain 3 - Part 96 | Data Center.
CISSP domain 3 - Part 97 A | Electricity | Electrical Power | Types of Electricity.
CISSP domain 3 - Part 97 B | Electricity | Electrical Power | Power Fluctuation.
CISSP domain 3 - Part 98 A | Fire Detector to secure the system with Alarm.
CISSP domain 3 - Part 98 B | Fire Detection, Alarm Optical and Heat system and Suppression.
CISSP domain 4 - Part 99 | Short Introductions | Communications and Network Security.
CISSP domain 4 - Part 100 A | Network Basics and Definitions.
CISSP domain 4 - Part 100 B | Network Basics and Definitions.
CISSP domain 4 - Part 101 | OSI Model.
CISSP domain 4 - Part 102 | TCP_IP Model and Real World Example.
CISSP domain 4 - Part 103 | TCP Further Discussion.
CISSP domain 4 - Part 104 A | IPv4 and IPv6 Addresses.
CISSP domain 4 - Part 104 B | IPv4 and IPv6 Addresses Real Life Example.
CISSP domain 4 - Part 105 | Types of Ports - Analog vs Digital Signal and Asynchronous & Synchronous.
CISSP domain 4 - Part 106 | Types of Cables.
CISSP domain4-Part 107 | FHSS-Frequency Hopping Spread Spectrum-DSSS-Direct Sequence Spread Spectrum.
CISSP domain 4 - Part 108 A | Wireless Technology.
CISSP domain 4 - Part 108 B | Wireless Technology.
CISSP domain 4 - Part 108 C | Wireless Technology.
CISSP domain 4 - Part 109 | Bluetooth and its Attacks.
CISSP domain 4 - Part 110 | Best Practices for Securing WLANs.
CISSP domain 4 - Part 111 | Satellite Network.
CISSP domain 4 - Part 112 | Mobile Wireless Communication.
CISSP domain 4 - Part 113 | Types of Network Topologies.
CISSP domain 4 - Part 114 | CSMA ARP MAC Media Access Control.
CISSP domain 4 - Part 115 | Dynamic Host Configuration Protocol - DHCP and ICMP.
CISSP domain 4 - Part 116 | Simple Network Management Protocol - SNMP.
Part 117 A Domain 4 Domain Name System DNS | DNS server and how it works.
Part 117 B Domain 4 DNS Root Servers Around The World.
Part 118 - Domain 4 - Simple Mail Transfer Protocol - SMTP POP3 IMAP.
Part 119 - Domain 4 - Network Address Translation - NAT.
Part 120 - Domain 4 - What are Routers, Hubs, Switches, Bridges.
Part 121 - Domain 4 - What is Private Branch Exchange System PBX and Phreaker - Phone Hackers.
Part 122 A - Domain 4 - What is Firewall and Types of Firewall.
Part 122 B - Domain 4 - What is Firewall and Types of Firewall.
Part 122 C - Domain 4 - What is Firewall and Types of Firewall.
Part 123 - Domain 4 - What is a Proxy Server | CISSP Course.
Part 124 - Domain 4 - What is a Honeypot? | CISSP Course in Pashto.
Part 125 - Domain 4 - What is a VPN_ Virtual Private Network | CISSP Course.
Part 126 - Domain 5 - Introduction to Domain 5 Identity and Access Management | CISSP Course.
Part 127 - Domain 5 - Subject to Objects and Access Control | CISSP Course.
Part 128 - Domain 5 - Centralized and Decentralized Access Control | CISSP Course.
Part 129 A - Domain 5 - Authentication Something You Know Type 1 | CISSP Course.
Part 129 B - Domain 5 - Authentication Something You Know Type 1 | CISSP Course.
Part 130 - Domain 5 - Authentication Something You Have Type 2 | CISSP Course.
Part 131 - Domain 5 - Authentication Something You Are Type 3 | CISSP Course.
CISSP Domain 5 | Part 132 - Authorization Accountability and Auditing.
CISSP Domain 5 | Part 133 - Identity Management System and Active Directory | CISSP Course.
Taught by
Cyber Pashto