Instructional Video8:46
Curated Video

CISSP Crash Course - Asset Handling

Higher Ed
This video explains information, asset handling, and how to deal with data. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and...
Instructional Video10:06
Curated Video

CISSP Crash Course - Security Training

Higher Ed
This video explains security awareness, training, and education. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Instructional Video7:04
Curated Video

CISSP Crash Course - Supply Chain Risk

Higher Ed
This video explains supply chain risk management and the minimum-security requirements. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on...
Instructional Video15:00
Curated Video

CISSP Crash Course - Business Continuity

Higher Ed
This video explains business continuity and business continuity planning. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Instructional Video12:42
Curated Video

CISSP Crash Course - Compliance, Legal, and Regulations

Higher Ed
This video explains compliance, legal, and regulations in domain 1. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Instructional Video11:59
Curated Video

CISSP Crash Course - Security Governance

Higher Ed
This video explains security policy and how to apply security governance. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Instructional Video2:41
Curated Video

CISSP Crash Course - Analyze Test Output and Reporting

Higher Ed
This video explains analyzing test output and reporting. This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which focuses on security assessment and testing.
Instructional Video3:08
Curated Video

CISSP Crash Course - Collect Security Process Data

Higher Ed
This video explains collecting security process data and account management and review. This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which focuses on...
Instructional Video3:49
Curated Video

CISSP Crash Course - Design and Validate Assessment, Test, and Audit

Higher Ed
This video explains design and validate assessment, tests, internal and external audits. This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which focuses on...
Instructional Video3:04
Curated Video

CISSP Crash Course - Control Physical and Logical Access

Higher Ed
This video explains control physical and logical access as well as type of assets that are part of a system. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5,...
Instructional Video5:45
Curated Video

CISSP Crash Course - Security Controls and Compliance Requirements

Higher Ed
This video explains security controls, security controls baseline, and compliance requirements. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset...
Instructional Video4:18
Curated Video

CISSP Crash Course - Data Roles

Higher Ed
This video explains data roles, data owner, and asset owner in domain 2. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Instructional Video2:48
Curated Video

CISSP Crash Course - Secure Provisioning

Higher Ed
This video explains ownership and secure provisioning in asset security. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Instructional Video8:39
Curated Video

CISSP Crash Course - Information Assets

Higher Ed
This video explains information assets and data classification. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Instructional Video8:40
Curated Video

CISSP Crash Course - Personnel Security Policies and Procedures

Higher Ed
This video explains personnel security policies and procedures. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Instructional Video4:24
Curated Video

CISSP Crash Course - Policy, Standards, Procedures, and Guidelines

Higher Ed
This video explains policy, standards, procedures, and guidelines. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Instructional Video8:14
Curated Video

CISSP Crash Course - Security Concepts

Higher Ed
This video explains some basic security topics. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Instructional Video2:57
Curated Video

HashiCorp Certified - Vault Associate Course - Pros and Cons of Unseal Options

Higher Ed
In this video, we will compare and contrast the different methods of unsealing HashiCorp Vault. We have learned a lot about seal and unseal options, but which do we use? This short video will walk you through the pros and cons of each...
Instructional Video5:15
Curated Video

HashiCorp Certified - Vault Associate Course - Unsealing with Key Shards

Higher Ed
In this video, we will explore the process of unsealing HashiCorp Vault using key shards, which is a method of distributing the unsealing keys across multiple individuals or systems for added security. This clip is from the chapter...
Instructional Video2:56
Curated Video

HashiCorp Certified - Vault Associate Course - Why Organizations Choose Vault

Higher Ed
This video explains why organizations choose HashiCorp Vault as their go-to solution for managing secrets and sensitive data. This clip is from the chapter "Introduction to Vault" of the series "HashiCorp Certified - Vault Associate...
Instructional Video6:28
Curated Video

HashiCorp Certified - Vault Associate Course - What Is Vault?

Higher Ed
This video provides a general introduction to HashiCorp Vault. Vault is a powerful open-source tool developed by HashiCorp that provides a secure and centralized way to manage secrets, encryption keys, and other sensitive data used in...
Instructional Video5:39
Curated Video

Getting Started with HashiCorp Nomad - Demo - Using the Nomad API

Higher Ed
In the last demonstration for this section on interacting with Nomad, we will watch a quick showcase on the introduction to the Nomad API. We will briefly understand API endpoints. This clip is from the chapter "Interacting with Nomad"...
Instructional Video4:42
Curated Video

HashiCorp Certified - Vault Associate Course - Lab - Okta Auth Method

Higher Ed
This is a lab video on Okta Auth Method. Learn how to enable, configure, and use the Okta auth method in this lab video. This clip is from the chapter "Compare Authentication Methods" of the series "HashiCorp Certified - Vault Associate...
Instructional Video5:51
Curated Video

HashiCorp Certified - Vault Associate Course - Choosing an Auth Method

Higher Ed
In this video, we will explore how to choose the best authentication method for your HashiCorp Vault deployment based on your specific use case and requirements. Objective 1B is all about being able to choose the proper auth method. We...