مساعد Cyvitrix
×
أهلاً بك! اكتب سؤالك أو اختر اقتراحاً من الأسفل.
أسئلة مقترحة
واتساب
البريد
إرسال
أنا هنا لمساعدتك
جرّبني
×
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Information System Security Professional - CISSP [ARABIC]
CISSP Arabic Training - Domain 1 - Updated 2026
1 - CISSP Training Introduction (11:09)
2 - CISSP Domain 1 Introduction and Key Concepts Overview (11:03)
3 - The Security Objective and CIA Triad (12:57)
4 - Cyber Security Information Security and Information Assurance (13:49)
5 - ISC2 Code of Ethics (10:59)
6 - Basic Security Terminologies - Security Foundations (12:17)
7 - Abstraction of Cyber Attacks (13:16)
8 - Security Vulnerabilities (9:56)
9 - Bug Bounty Programs (10:55)
10 - Adversaries and Threat Actors (13:34)
11 - APTs TTPs (13:46)
12 - Threat Intel and CERT (13:56)
13 - Digital Risk Protection and Dark Web Monitoring (13:33)
14 - Malware - Worm Virus Trojan (12:00)
15 - Cyber Attacks - DOS DDOS (13:21)
16 - DDOS Protection (14:29)
17 - Cyber Attacks - MiTM - Man In The Middle On-Path Attack (11:40)
18 - Web Application Attacks - OWASP Top 10 (13:48)
19 - CWE Common Weak Enumeration (11:19)
20 - Security vs Privacy and Privacy Regulations (14:25)
21 - Laws and Legal Regulations (10:17)
22 - Federal Laws - 1 (13:29)
23 - Federal Laws - 2 (13:59)
24 - Intellectual Properties (10:32)
25 - Security Standards and Frameworks (16:29)
26 - Maturity Assessment Process (11:41)
27 - Security Controls
28 - Security Controls Examples ITGCs and Strong Control Concept (12:08)
29 - Control Objective and Compensating Controls (12:14)
30 - Defense in Depth - Layered Defenses Strategy (13:44)
31 - Abstraction and Security through Obscurity (11:56)
32 - Security Manager Roles (12:01)
33 - Organizational Structure (11:39)
34 - Security Program and Strategy (14:58)
35 - Governance and Management (10:11)
36 - Information Security Governance (13:07)
37 - Policies (9:48)
38 - Standards (11:19)
39 - Procedures and Guidelines (11:30)
40 - Policies Development and Review (15:22)
41 - Risk Management Overview (15:06)
42 - Types of Risk and Risk Levels (10:45)
43 - Risk Management Frameworks (12:11)
44 - Risk Identification (12:05)
45 - Risk Analysis (12:14)
46 - Risk Evaluation and Response (13:45)
47 - Risk Reporting and Monitoring (15:14)
48 - Domain 1 Recap (13:22)
CISSP Arabic Training - Domain 2 - Updated 2026
49 - CISSP Domain 2 Introduction and Key Concepts Overview (9:18)
50 - Data Lifecycle (9:50)
51 - Data Disposal and Destruction (13:06)
52 - Digital Rights Management (11:43)
53 - Data Security Controls (12:14)
54 - Shadow IT (10:21)
55 - IT Asset Management (12:34)
56 - Roles in Data and Assets Protection (10:38)
57 - RACI Matrix (10:14)
58 - Social Engineering (11:10)
59 - Security Awareness Program (9:52)
60 - Personnel Security Measures (13:39)
61 - Due Care vs Due Diligence (10:27)
62 - Outsourcing (13:40)
63 - Securing Supply chain Risk Management (10:18)
64 - A Real Case Study - Crowdstrike Outage July 2024 (11:32)
65 - Domain 2 Recap (12:20)
CISSP Arabic Training - Domain 3 - Updated 2026
66 - CISSP Domain 3 Introduction and Key Concepts Overview (11:56)
67 - Cryptography overview (11:39)
68 - Cryptography Key Concepts (11:55)
69 - Symmetric Encryption Overview (10:42)
70 - Asymmetric Encryption Overview (14:57)
71 - Asymmetric Encryption in Action (9:49)
72 - Integrity and Hashing and Salting (12:02)
73 - Digital Signature (9:01)
74 - Digital Certificate (11:59)
75 - PKI - Public Key Infrastructure (12:10)
76 - SSL Pining Certificate Pining (12:11)
77 - SSL MTLS (10:59)
78 - Applications of Encryption (12:33)
79 - Emerging Cryptographic Technologies (11:45)
80 - Secure Design Principals (11:32)
81 - Zero Trust - Trust but Verify (12:54)
82 - Trusted Computing Base (10:52)
83 - Side Channel Attack (11:17)
84 - Information System Modelling tools (9:32)
85 - Security Models BLP BIBA (12:40)
86 - Clark Wilson Brewer Nash and HRU Security Models (10:52)
87 - TCSEC ITSEC and Common Criteria (14:46)
88 - Security Facility Design (12:12)
89 - Physical Security Control (12:35)
90 - Environmental Security (18:57)
91 - Secure Area Policies (11:24)
92 - Domain 3 Recap (12:25)
CISSP Arabic Training - Domain 4 - Updated 2026
93 - CISSP Domain 4 Introduction and Key Concepts Overview (11:35)
94 - Introduction to IT Networks and Networking Basic Concepts (16:33)
95 - OSI and TCPIP Models overview (16:49)
96 - Explaining OSI Lower Layers - Physical Layer (16:08)
97 - Explaining OSI Lower Layers - Data Link Layer (12:13)
98 - Network Addresses and ARP Protocol (12:24)
99 - Explaining OSI Lower Layers - Network Layer (16:14)
100 - Explaining OSI Higher Layers - Transport to Application (16:10)
101 - Communication types - Unicast Multicast Broadcast (10:55)
102 - Wireless and Radio Frequency Based Communication (14:23)
103 - Routing and Routed Protocols (13:13)
104-1 - Understanding DNS Records (16:37)
104 - DNS DNSSEC DNS Threats and Mitigation (14:09)
105 - Converged Networks and VoIP POE and QoS (10:50)
106 - Homing and Network Redundancy (12:56)
107 - Air gap In Band and Out of Band OOB (12:14)
108 - SDN - Software Defined Network Overview (12:00)
109 - Practical SDN Applications - SDN - NSX - Slicing (14:50)
110 - Network Load Balancer (11:27)
111 - Network Segmentation (11:21)
112 - Layer 2 Attacks - Wired Network Attacks and Countermeasures (17:18)
113 - Wireless Network Security (17:24)
114 - Firewalls Overview (13:35)
115 - DMZ Screened Subnet and Bastian Host (11:47)
116 - Intrusion Prevention and Intrusion Detection Systems (11:58)
117 - Proxy and Content Filtering (11:56)
118 - Email Security SPF DKIM DMARC ESG (11:24)
119 - Secure Communication Channels or VPNs TLS IPSec (12:38)
121 - OT ICS Security Best Practices and Purdu Model (13:52)
122 - SSL Decryption and Offloading (13:32)
123 - Packet Broker (13:31)
124 - NOC Monitoring of Network (12:36)
125 - Domain 4 Recap (11:24)
CISSP Arabic Training - Domain 5 - Updated 2026
126 - CISSP Domain 5 Introduction (10:35)
127 - IAM Function (15:23)
128 - AAA Overview (16:04)
129 - MFA and Bio-metric Authentication (11:22)
130 - Passwordless Authentication Methods (14:15)
131 - SSO and RSO - Single Sign On and Reduced Sign On (11:22)
132 - Access Control Concepts (11:19)
133 - Authorization and Access control Models (12:06)
134 - Accounting and Auditing (13:24)
135 - Identity Access Management Protocols Solutions (14:17)
136 - LDAP Server - Active Directory (13:29)
137 - Password Attacks and Countermeasures (17:35)
138 - SOD (9:52)
139 - Manage Privileged Accounts (12:59)
140 - Understand PAM Solution (12:36)
141 - Domain 5 Recap (14:13)
CISSP Arabic Training - Domain 6 - Updated 2026
142 - CISSP Domain 6 Introduction and Key Concepts Overview (10:59)
143 - Security Testing and assessment and Auditing (12:23)
144 - Information System Auditing (9:08)
145 - Vulnerability and Patch Management (9:47)
146 - Penetration Testing (13:08)
147 - Threat Modeling overview (12:00)
148 - Service Organization Controls - SOC Audit (10:51)
149 - PCI DSS Overview (10:29)
150 - PCI DSS Requirements (13:28)
151 - NIST CSF SP-800-53 Overview (11:42)
152 - NIST CSF v20 Deepdive (17:20)
154 - Quality Assurance and Quality Control (11:38)
155 - Performance Management (14:43)
156 - Key Performance Indicators - KPI KGI KCI (14:26)
157 - Domain 6 Recap (11:28)
CISSP Arabic Training - Domain 7 - Updated 2026
158 - CISSP Domain 7 Introduction and Key Concepts Overview (11:41)
159 - Change Management Process (14:05)
160 - Release Management (12:33)
161 - Configuration Management (11:28)
162 - Financial Portfolio Capacity and Supplier Management (13:11)
163 - Capex and Opex and ROI and ROSI (12:04)
164 - Incident Management Overview (13:11)
165 - Incident Response Plan (14:22)
166 - Collecting digital Evidences and Forensic (11:01)
167 - Incident Response Training (11:22)
168 - Communication During Incidents (12:11)
169 - Post Incident Activities (9:55)
170 - Incident Response Review and Evaluation (9:34)
171 - Security Operation Centre - SOC (12:17)
172 - SIEM Architecture and Monitoring Protocols (13:52)
173 - Endpoint Security Software (15:16)
174 - EDR and NDR and XDR SOAR (11:56)
175 - File Integrity Monitoring - FIM (12:05)
176 - What is Disaster and BIA (11:10)
177 - Disaster Recovery Plan (11:14)
178 - Business Continuity Plan (12:09)
179 - RPO and RTO and Recovery Metrics (13:56)
180 - Recovery Strategies and Alternate Processing Facilities (12:14)
181 - BCP Testing and Evaluation (12:03)
182 - Data Backup (13:06)
183 - Storage Redundancy using RAID (13:36)
184 - Domain 7 Recap (11:15)
CISSP Arabic Training - Domain 8 - Updated 2026
185 - CISSP Domain 8 Introduction and Key Concepts Overview (10:40)
186 - Software Development Methodologies (12:32)
187 - DevOps and CICD (11:53)
188 - DevSecOps (11:19)
189 - Software Defined Security SDS (16:20)
190 - Software Testing (14:00)
191 - What is API (13:17)
192 - Version Control System and Code Repository (12:02)
193 - Application Security Testing (12:59)
194 - Secure Code Practices (14:01)
195 - Certification vs Accreditation and Authorize to Operate (12:06)
196 - Software Project Acquisition Steps (10:37)
197 - Project Management Tools - GANTT PERT CPM TIMEBOX (10:37)
198 - Database Overview (11:23)
199 - Database Security (12:55)
200 - Database Resiliency and Data Availability (12:15)
201 - Transport Database Encryption - TDE (12:40)
202 - Virtualization and SDDC (12:45)
203 - Containers and Microservices (12:40)
204 - Serverless Computing (13:17)
205 - Cloud Computing (14:18)
206 - Cloud Deployment Models (12:03)
207 - Cloud Service Models (12:44)
208 - Cloud Shared Responsibility Matrix (13:35)
209 - Cloud Contracts (13:29)
210 - SASE CASB Overview (13:04)
211 - CDN - Content Delivery Network (12:06)
212 - Embedded Systems IoT Edge Computing HPC (11:51)
213 - Quantum Computing Overview (11:14)
214 - Domain 8 Recap (12:17)
About CISSP Exam
215 - CISSP Exam Format and How to get certified and Maintain your CISSP (12:07)
208 - Cloud Shared Responsibility Matrix
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock