Review of the major Vulnerabilities in Systems concepts and terms, and how they interrelate, to help you review, guide your studies, and help you pass the CISSP exam.
This MindMap review covers:
0:00 Introduction
0:31 Vulnerabilities in Systems
1:08 Single Point of Failure
1:38 Redundancy
1:56 Bypass Controls
2:28 Mitigating Controls
3:07 TOCTOU (Race Conditions)
4:03 Emanations
4:22 Shielding (TEMPEST)
4:46 White Noise
5:00 Control Zones
5:19 Covert Channels and its Types
5:33 Analysis and Design of Covert Channels
5:52 Aggregation & Interference
6:12 Polyinstantiation
6:39 Mobile Devices
7:01 Policy, Training and Procedures
722 Remote Access Security
7:35 End-point Security
7:46 OWASP Mobile Top Ten
8:05 Improper Platform Usage
8:22 Insecure Data Storage
8:49 Insecure Communication
9:08 Insecure Authentication
9:30 Insufficient Cryptography
9:46 Insecure Authorization
10:20 Client Code Quality
10:45 Code Tampering
11:03 Reverse Engineering
11:27 Extraneous Functionality
11:54 Web-based Vulnerabilities
12:10 Cross-Site Scripting (XSS)
12:34 Stored Cross-Site Scripting
13:31 Reflected Cross-Site Scripting
14:27 Document Object Model (DOM)
14:53 Cross-Site Request Forgery (CSRF)
15:28 SQL Injection
16:10 SQL Injection Example
16:35 Prevention of SQL Injection
17:14 Outro
Other MindMaps:
Domain 1
Security & Risk Management: [ Ссылка ]
Domain 2
Asset Classification: [ Ссылка ]
Privacy: [ Ссылка ]
Domain 3
Models and Frameworks: [ Ссылка ]
Evaluation Criteria: [ Ссылка ]
Trusted Computing Base: [ Ссылка ]
Vulnerabilities in Systems: [ Ссылка ]
Cloud: [ Ссылка ]
Cryptography: [ Ссылка ]
Digital Certificates, Digital Signatures & PKI: [ Ссылка ]
Cryptanalysis: [ Ссылка ]
Physical Security: [ Ссылка ]
Domain 5
Access Control Overview: [ Ссылка ]
Single Sing-on & Federated Access: [ Ссылка ]
Domain 6
Security Assessment and Testing Overview: [ Ссылка ]
Vulnerability Assessment and Penetration Testing: [ Ссылка ]
Logging & Monitoring: [ Ссылка ]
Domain 7
Investigations: [ Ссылка ]
Incident Response: [ Ссылка ]
Malware: [ Ссылка ]
Patching & Change Management: [ Ссылка ]
Recovery Strategies: [ Ссылка ]
Business Continuity Management (BCM): [ Ссылка ]
Domain 8
Secure Software Development: [ Ссылка ]
Databases: [ Ссылка ]
CISSP Master Instructor, John Berti: [ Ссылка ]
Visuals, narration and CISSP Master Instructor, Rob Witcher: [ Ссылка ]
Video editing by Nick: threntinfo@gmail.com
#CISSPDomain3Review #robwitcher
Ещё видео!