| | [00. Intro] |
| | | 184142_01_01_WL30_ITFundamentals.mp4 (2.35 MB) |
| | [01. Security Modeling] |
| | | 184142_02_01_LA30_ModelTools.mp4 (8.81 MB) |
| | [02. The CIA Triad] |
| | | 184142_03_01_LA30_CIATriad.mp4 (7.04 MB) |
| | | 184142_03_02_LA30_CIATriadConfident.mp4 (6.85 MB) |
| | | 184142_03_03_LA30_CIATriadIntegrity.mp4 (8.40 MB) |
| | | 184142_03_04_LA30_CIATriadAvailable.mp4 (10.19 MB) |
| | | 184142_03_05_LA30_CIATriadUsing.mp4 (33.36 MB) |
| | [03. Visualizing Security] |
| | | 184142_04_01_LA30_MikeDans.mp4 (24.39 MB) |
| | [04. Information Assurance Model] |
| | | 184142_05_01_LA30_Assurance-1.mp4 (11.10 MB) |
| | | 184142_05_01_LA30_Assurance.mp4 (11.10 MB) |
| | | 184142_05_03_LA30_AssuranceProcess.mp4 (22.12 MB) |
| | | 184142_05_04_LA30_AssuranceTech.mp4 (20.41 MB) |
| | | 184142_05_05_LA30_ApplyAssurance.mp4 (29.58 MB) |
| | [05. Defense in Depth] |
| | | 184142_06_01_LA30_DefenseIntro.mp4 (19.77 MB) |
| | | 184142_06_02_LA30_Data.mp4 (14.40 MB) |
| | | 184142_06_03_LA30_Application.mp4 (16.69 MB) |
| | | 184142_06_04_LA30_Host.mp4 (16.72 MB) |
| | | 184142_06_05_LA30_InternalNetwork.mp4 (14.75 MB) |
| | | 184142_06_06_LA30_PerimeterNetwork.mp4 (16.33 MB) |
| | | 184142_06_07_LA30_ExternalNetwork.mp4 (13.15 MB) |
| | | 184142_06_08_LA30_Physical.mp4 (15.28 MB) |
| | | 184142_06_09_LA30_Stewardship.mp4 (19.47 MB) |
| | [06. Scenarios for Using the Defense in Depth Model] |
| | | 184142_07_01_LA30_UsingDefense.mp4 (23.80 MB) |
| | | 184142_07_02_LA30_DesktopDefense.mp4 (11.09 MB) |
| | | 184142_07_03_LA30_LaptopDefense.mp4 (13.67 MB) |
| | | 184142_07_04_LA30_PhoneDefense.mp4 (25.07 MB) |
| | | 184142_07_05_LA30_TabletDefense.mp4 (17.93 MB) |
| | | 184142_07_06_LA30_iMacDefense.mp4 (23.24 MB) |
| | | 184142_07_07_LA30_DataDefense.mp4 (18.50 MB) |