001 4.1.1 Enterprise Architecture
002 Practice Questions - Enterprise Architecture.html
003 4.1.2 Security Architecture
004 Practice Questions - Security Architecture.html
005 4.1.3 Maturity Models
006 Practice Questions - Maturity Model.html
007 4.2.1 OSI layers
008 4.2.2 TCP IP
009 Practice Questions - OSI & TCP IP.html
010 4.2.3 Network Cabling
011 Quiz - Network Cabling.html
012 4.2.4 Network Devices
013 Practice Questions - Network Risks.html
014 4.2.5 Types of firewalls
015 4.2.6 Demilitarized Zone (DMZ)
016 4.2.7 Proxy Server
017 4.2.8 Firewall Implementation
018 Practice Questions - Firewall and DMZ.html
019 4.2.9 Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
020 4.2.9A Key Aspects - Intrusion Detection System and Intrusion Prevention System
021 Practice Questions - Intrusion Detection System and Intrusion Prevention System.html
022 4.2.10 Domain Name System
023 Practice Questions - Domain Name System.html
024 4.2.11 Wireless Access Point
025 Practice Questions - Wireless Access Point.html
026 4.2.13 Virtual Private Network (VPN)
027 Practice Questions - Virtual Private Network (VPN).html
028 4.2.14 Cloud computing
029 Practice Questions - Cloud Computing.html
030 4.3.1 Project & Program Management
031 Practice Questions - Project and Program Management.html
032 4.3.2 - Phases of SDLC
033 Practice Questions - Phases of SDLC.html
034 4.3.3 System Migration & Changeover Techniques
035 Practice Questions - System Migration & Changeover (Go-live) Techniques.html
036 4.4.1 - Enterprise Resiliency (BCP & BIA)
037 Practice Questions - Enterprise Resiliency (BCP & BIA).html
038 4.4.2 Recovery Objectives
039 Practice Questions - Recovery Objectives.html
040 Practice Questions - Business Continuity Plan and Business Impact Analysis.html
041 4.4.3 Incident Response Plan and Procedures
042 Practice Questions - Incident Response Plan and Procedures.html
043 4.5.1 Data Classification
044 Practice Questions - Data Classifications.html
045 4.5 Data Life Cycle Management
046 Practice Questions - Data Life Cycle Management.html
047 4.6.2 System Accreditation and Certification
048 Practice Questions - System Accreditation and Certifications.html
049 4.6.3 Online Auditing Techniques
050 Practice Questions - Online Audit Techniques.html
051 4.7.1 Emerging and New Technologies
052 Practice Questions - Emerging Trends in Technology.html
053 4.7.2 Deepfakes
054 4.7.3 Internet of Things
055 4.7.4 BlockChain
056 4.7.5 Information Security Principles.html
057 Practice Questions - Information Security Principles.html
058 4.8.1 Segregation of duties, Cross training and Job rotation
059 4.8.1A Segregation of Duties
060 Practice Questions - Segregation of Duties, Cross training and Job Rotation.html
061 4.8.2 Factor of Authentication
062 4.8.3 Password Management
063 Practice Questions - Factor of Authentication.html
064 4.8.4 Biometrics
065 Practice Questions - Biometrics.html
066 Practice Questions - Single Sign On.html
067 4.8.6 Asymmetric Encryption
068 Practice Questions - Asymmetric Encryption.html
069 4.8.7 Digital Signature
070 Practice Questions - Digital Signatures.html
071 4.8.8 Public Key Infrastructure (PKI)
072 Practice Questions - Public Key Infrastructure.html
073 4.9 Information Security Awareness Training
074 Practice Questions - Information Security Awareness Training.html
075 4.10 Data Privacy
076 Practice Questions - Data Privacy.html
077 4.11 Different Attack Methods
078 Practice Questions - Different Attack Methods.html
external-links.txt