Curated Video
CISSP Crash Course - Design and Validate Assessment, Test, and Audit
This video explains design and validate assessment, tests, internal and external audits. This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which focuses on...
Curated Video
CISSP Crash Course - Identity Lifecycle
This video explains the identity and access lifecycle along with access review. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and...
Curated Video
CISSP Crash Course - Implement and Manage Authorization
This video explains how to implement and manage authorization. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access management.
Curated Video
CISSP Crash Course - Control Physical and Logical Access
This video explains control physical and logical access as well as type of assets that are part of a system. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5,...
Curated Video
CISSP Crash Course - Security in Systems Part 2
This video continues talking about security in systems, microservices, and containerization. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
Curated Video
CISSP Crash Course - Architecture and Design
This video explains architecture and design and takes us through what’s inside a system. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
Curated Video
CISSP Crash Course - Security Capabilities
This video explains security capabilities of information systems. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture and engineering.
Curated Video
CISSP Crash Course - Security Controls from Requirements
This video explains common criteria guidelines for security controls. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture and...
Curated Video
CISSP Crash Course - Security Controls and Compliance Requirements
This video explains security controls, security controls baseline, and compliance requirements. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset...
Curated Video
CISSP Crash Course - Asset Retention
This video explains asset retention, end-of-life, end-of-support, and end-of-service-life. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security,...
Curated Video
CISSP Crash Course - Data Roles
This video explains data roles, data owner, and asset owner in domain 2. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Curated Video
CISSP Crash Course - Secure Provisioning
This video explains ownership and secure provisioning in asset security. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Curated Video
CISSP Crash Course - Information Assets
This video explains information assets and data classification. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Curated Video
CISSP Crash Course - Threat Modeling
This video explains threat modeling and identifying threats. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Curated Video
CISSP Crash Course - Personnel Security Policies and Procedures
This video explains personnel security policies and procedures. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Curated Video
CISSP Crash Course - Policy, Standards, Procedures, and Guidelines
This video explains policy, standards, procedures, and guidelines. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Curated Video
CISSP Crash Course - Security Concepts
This video explains some basic security topics. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Curated Video
Julius Caesar 4.2 Performance: Brutus, Lines 70-80a
This video explores a pivotal scene from Shakespeare's "Julius Caesar," where Brutus invokes the memory of Caesar's assassination during the Ides of March to underscore a point about integrity and honor. Brutus's vehement refusal to be...
Curated Video
Julius Caesar 5.5 Performance: Antony Praises Brutus (Lines 69-76)
This video explores a powerful moment in Shakespeare's "Julius Caesar" where Mark Antony reflects on Brutus' character after his death. This segment examines the themes of nobility, integrity, and the tragic dimensions of Brutus's...
Curated Video
Wisdom and Problem-Solving
In this video, Otto the Owl teaches us about wisdom through a story about a girl named Kyoko who loses her kite. With Otto's guidance, Kyoko learns the importance of making wise decisions and seeking advice from knowledgeable...
Curated Video
The Good, The Bad, and The Ugly: the Ethics of Influence and Persuasion
Before we get into the detail of techniques for Influencing and persuading, it’s important to acknowledge that they can be used for good or for ill. And that there is an ethical dimension to the methods you choose. So, lets look at the...
Curated Video
How to Build Trust. And Why it Matters in Influence & Persuasion
There is no way you can persuade someone who does not trust you. Trust is a vital part of Influence and persuasion. So, let’s look at how to build Trust. We already have a very popular video about trust, that discusses Maister, Green,...
Curated Video
Use the Power of Scarcity with Integrity
Have you ever wondered why special offers have deadlines, and countdown timers have become ubiquitous on internet shops? This is what I call the ‘sale-must-end-on-Sunday’ principle, which works on our fear of missing out, due to...
Curated Video
The Jiminy Cricket Effect: Cognitive Dissonance and the Urge for Consistency
Conscience is an inner voice that tells us what is right and what is wrong. When we are about to do something that is inconsistent with our conscience, we feel uneasy about. That feeling of unease is what psychologists call “cognitive...