Channel Avatar

Destination Certification @UCXk6whiDrWq42y9Tdv1MEhg@youtube.com

42K subscribers - no pronouns :c

Achieving CISSP & CCSP Certification is an important career


16:28
CCSP MindMap for Domain 1 (1 of 5) | CCSP Exam Prep
06:04
Ignite Your Career in a week! Join our Live Online CISSP BootCamp
04:53
CCSP MasterClass Launches TODAY!
06:35
Databases MindMap (2 of 2) | CISSP Domain 8
18:48
Secure Software Development MindMap (1 of 2) | CISSP Domain 8
08:48
Business Continuity Management (BCM) MindMap (6 of 6) | CISSP Domain 7
13:55
Recovery Strategies MindMap (5 of 6) | CISSP Domain 7
10:26
Patching & Change Management MindMap (4 of 6) | CISSP Domain 7
09:02
Malware MindMap (3 of 6) | CISSP Domain 7
06:31
Incident Response MindMap (2 of 6) | CISSP Domain 7
09:37
Investigations MindMap (1 of 6) | CISSP Domain 7
06:53
Log Review & Analysis MindMap (3 of 3) | CISSP Domain 6
08:32
Identifying Vulnerabilities (2 of 3) | CISSP Domain 6
12:49
Security Assessment and Testing MindMap (1 of 3) | CISSP Domain 6
06:46
Single Sign-on / Federated Access MindMap (2 of 2) | CISSP Domain 5
13:12
Access Control MindMap (1 of 2) | CISSP Domain 5
12:43
Remote Access MindMap (4 of 4) | CISSP Domain 4
16:53
Network Defense MindMap (3 of 4) | CISSP Domain 4
19:16
Networking MindMap (2 of 4) | CISSP Domain 4
18:02
OSI Model MindMap (1 of 4) | CISSP Domain 4
17:39
Physical Security MindMap (9 of 9) | CISSP Domain 3
09:22
Cryptanalysis MindMap (8 of 9) | CISSP Domain 3
16:55
Digital Signatures & Certificates MindMap (7 of 9) | CISSP Domain 3
22:51
Cryptography MindMap (6 of 9) | CISSP Domain 3
01:40:42
CISSP 2024 exam changes in DETAIL!
24:36
Cloud Computing MindMap (5 of 9) | CISSP Domain 3
18:12
Vulnerabilities in Systems MindMap (4 of 9) | CISSP Domain 3
14:14
Trusted Computing Base MindMap (3 of 9) | CISSP Domain 3
07:59
Evaluation Criteria MindMap (2 of 9) | CISSP Domain 3
17:05
Models & Frameworks MindMap (1 of 9) | CISSP Domain 3
17:00
Asset Classification MindMap (1 of 1) | CISSP Domain 2
18:18
Risk Management MindMap (3 of 3) | CISSP Domain 1
12:27
Privacy & Intellectual Property MindMap (2 of 3) | CISSP Domain 1
17:00
Alignment of Security Function MindMap (1 of 3) | CISSP Domain 1
13:50
CISSP Practice Question #7 - Bell–LaPadula model
06:25
CISSP Practice Question #6 - Sanitization for re-use
06:39
CISSP Practice Question #5 - Input Validation
04:55
CISSP Practice Question #4 - Data Owner
05:07
CISSP Practice Question #3 - Risk Management Framework (RMF)
05:24
CISSP Practice Question #2 - Single Sign-on (SSO)
05:33
CISSP Practice Question #1 - Vulnerability Assessment Process
23:46
Diffie-Hellman Key Exchange Explained | A deep dive
14:21
Want to spy on the world’s leaders?
10:28
How computers all over the world were held hostage by WannaCry
10:02
How Billions in Bitcoin disappeared
13:56
The 10 biggest hacks of 2020
11:47
NotPetya Attack
12:37
The hack of Ashley Madison
11:31
Donald Trump’s IP addresses
13:11
The largest cyber attack on US critical infrastructure: the Colonial Pipeline ransomware attack
14:06
How The Hack of DigiNotar Changed The Internet’s Infrastructure
11:08
Who turned out the lights in the Ukraine? 2015 Black Energy attack
14:12
19.7 MILLION Background Checks & 5.6m Fingerprint Records STOLEN: OPM Breach (2015) - WhatTheHack
10:57
The FIRST Computer Worm: The Morris Worm (1988) - WhatTheHack
12:34
CISSP Domain 4 Review | Mind Map (4 of 4) | Remote Access
17:17
CISSP Domain 4 Review | Mind Map (3 of 4) | Network Defense
19:37
CISSP Domain 4 Review / Mind Map (2 of 4) | Networking
17:41
CISSP Domain 4 Review | Mind Map (1 of 4) | OSI Model
16:49
CISSP Domain 3 Review | Mind Map (9 of 9) | Physical Security
09:25
CISSP Domain 3 Review / Mind Map (8 of 9) | Cryptanalysis