001 - Course Overview
002 - Module Introduction
003 - Framework Types
004 - NIST Cyber-Security Framework (CSF)
005 - Sarbanes-Oxley and PCI DSS
006 - NIST, SSAE=16 and AT-101
007 - FedRAMP and ISO
008 - Privacy Shield
009 - HIPPA _ HITECH and PHI
010 - Benchmarks
011 - Systems Hardening
012 - Defense-in-Depth _ Layered Security
013 - Administrative and Technical Controls
014 - Module Intro, Topology and Guest Networks
015 - Honeynets, NAT and Ad Hoc Networks
016 - Security and Segmentation Models
017 - Virtualization
018 - Air Gaps
019 - VPN and VPN Concentrators
020 - Security Device Placement
021 - Software Defined Networking (SDN)
022 - Module Intro and Secure Boot
023 - Measure Launch
024 - Integrity Measurement Architecture (IMA)
025 - BIOS_UEFI
026 - Data Encryption, TPM and Hardware Based Encryption
027 - Types of Data to Secure
028 - Supply Chain Security
029 - Hardware Root of Trust
030 - EMI_EMP
031 - Trusted OS
032 - Secure Systems Design
033 - Mobile Device Management and BYOD
034 - Peripheral Security
035 - Module Intro and Reasons to Securely Stage and Test
036 - SDLC
037 - Development, Test, Staging and Production Environments
038 - Environments Overview
039 - Baselines
040 - Integrity Measurement
041 - Introduction
042 - SCADA
043 - Smart Devices _ IoT
044 - HVAC
045 - SoC
046 - RTOS
047 - Printers _ MFDs
048 - Camera Systems
049 - Medical Devices
050 - Aircraft _ UAV
051 - Vehicles
052 - Introduction
053 - Agile Development Method
054 - Waterfall and Spiral Development Methods
055 - Secure Devops
056 - Security Automation
057 - Continuous Integration
058 - Baselining
059 - Immutable Systems
060 - Infrastructure as Code (IAS)
061 - General Change Management
062 - Provisioning and Deprovisioning
063 - Systems Development Lifecycle (SDLC)
064 - Secure Coding Techniques
065 - Code Quality and Testing
066 - Static Code Analysis
067 - Fuzzing
068 - Stress Testing, Sandboxing and Model Verification
069 - Compiled Code vs. Runtime Code
070 - Introduction
071 - Virtualization
072 - Type I, Type II and Container-based Virtualization
073 - VM Escape
074 - Privilege Elevation
075 - Live VM Migration and Security Risks
076 - Data Remnants
077 - Cloud Storage
078 - Cloud Computing, Iaas, PaaS and SaaS
079 - XaaS
080 - Infrastructure as a Service
081 - Platform as a Service
082 - Software as a Service
083 - Cloud Access Security Broker _ SECaaS
084 - Types of Clouds
085 - VDI
086 - Module Intro and Whats in it for Me
087 - Automation and Scripting
088 - Whats Involved
089 - Continuous Monitoring
090 - Templates, Recoverability, Non-Persistence and Snapshots
091 - Reducing Risk
092 - High Availability
093 - Elasticity and Scalability
094 - Redundancy
095 - Fault Tolerance
096 - RAID
097 - Introduction
098 - Proper Lighting
099 - Fencing
100 - Guards
101 - Alarms
102 - Securing Physical Assets
103 - Protected Distribution Systems (PDS)
104 - Airgap Networks
105 - Hardware Locks
106 - Mantraps
107 - EMI Shielding
108 - Proximity Readers
109 - Biometrics
110 - Barricades
111 - HVAC
112 - Hot and Cold Aisles
113 - Fire Suppression
114 - Screen Filters
115 - Cameras and Video Surveillance
116 - Motion Detection _ Infrared
117 - Logs
118 - Key Management