Curated Video
CISSP Crash Course - Control Physical and Logical Access
This video explains control physical and logical access as well as type of assets that are part of a system. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5,...
Curated Video
CISSP Crash Course - Security in Systems Part 2
This video continues talking about security in systems, microservices, and containerization. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
Curated Video
CISSP Crash Course - Architecture and Design
This video explains architecture and design and takes us through what’s inside a system. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
Curated Video
CISSP Crash Course - Security Capabilities
This video explains security capabilities of information systems. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture and engineering.
Curated Video
CISSP Crash Course - Security Controls from Requirements
This video explains common criteria guidelines for security controls. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture and...
Curated Video
CISSP Crash Course - Security Controls and Compliance Requirements
This video explains security controls, security controls baseline, and compliance requirements. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset...
Curated Video
CISSP Crash Course - Asset Retention
This video explains asset retention, end-of-life, end-of-support, and end-of-service-life. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security,...
Curated Video
CISSP Crash Course - Data Roles
This video explains data roles, data owner, and asset owner in domain 2. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Curated Video
CISSP Crash Course - Secure Provisioning
This video explains ownership and secure provisioning in asset security. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Curated Video
CISSP Crash Course - Information Assets
This video explains information assets and data classification. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Curated Video
CISSP Crash Course - Threat Modeling
This video explains threat modeling and identifying threats. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Curated Video
CISSP Crash Course - Personnel Security Policies and Procedures
This video explains personnel security policies and procedures. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Curated Video
CISSP Crash Course - Policy, Standards, Procedures, and Guidelines
This video explains policy, standards, procedures, and guidelines. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Curated Video
CISSP Crash Course - Security Concepts
This video explains some basic security topics. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
The Business Professor
Understanding Risk Management: Identifying, Mitigating, and Monitoring Risks
The video provides an overview of risk management. It emphasizes the importance of focusing on identifying risks and coming up with ways to either avoid or tolerate them if they are unavoidable.
Curated Video
Risk Management
Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings. These risks stem from a variety of sources including financial uncertainties, legal liabilities, technology...
Curated Video
Risk Management Implementation Requirements
The video shows how to Identify the risk, Assess the risk,Treat the risk,Monitor and Report on the risk
Curated Video
Risk Identification
Risk identification is the process of documenting any risks that could keep an organization or program from reaching its objective. It's the first step in the risk management process, which is designed to help companies understand and...
Curated Video
Risk Treatment and Residual Risks
The basic methods for risk management—avoidance, retention, sharing, transferring, and loss prevention and reduction
Curated Video
Risk Acceptance
Accepting risk, or risk acceptance, occurs when a business or individual acknowledges that the potential loss from a risk is not great enough to warrant spending money to avoid it
Curated Video
Risk Analysis
Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. This process is done in order to help organizations avoid or mitigate those risks.
Curated Video
Types of project risks and how to prepare a contingency plan
This video discusses types of project management and the importance of preparing a contingency plan for business projects. The video explains the various risks associated with business projects, including budget, schedule, and...
Curated Video
GDPR Program Audit
This section provides you with the techniques needed to audit your GDPR program