مساعد Cyvitrix
×
أهلاً بك! اكتب سؤالك أو اختر اقتراحاً من الأسفل.
أسئلة مقترحة
واتساب
البريد
إرسال
أنا هنا لمساعدتك
جرّبني
×
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Information System Security Professional - CISSP [ARABIC]
CISSP Course Introduction - Arabic - Updated 2026
1 - CISSP Training Introduction (11:07)
CISSP - Updated February 2026 - Domain 1
2 - CISSP Domain 1 Introduction and Key Concepts Overview (11:02)
3 - The Security Objective and CIA Triad (12:56)
4 - Cyber Security Information Security and Information Assurance (13:56)
5 - ISC2 Code of Ethics (10:58)
6 - Basic Security Terminologies - Security Foundations (12:16)
7 - Abstraction of Cyber Attacks (13:14)
8 - Security Vulnerabilities (10:13)
9 - Bug Bounty Programs (10:54)
10 - Adversaries and Threat Actors (13:33)
11 - APTs TTPs (13:45)
12 - Threat Intel and CERT (13:55)
13 - Digital Risk Protection and Dark Web Monitoring (14:47)
14 - Malware - Worm Virus Trojan (11:59)
15 - Cyber Attacks - DOS DDOS (13:27)
16 - DDOS Protection (14:28)
17 - Cyber Attacks - MiTM - Man In The Middle On-Path Attack (11:39)
18 - Web Application Attacks - OWASP Top 10 (13:45)
19 - CWE Common Weak Enumeration (11:18)
20 - Security vs Privacy and Privacy Regulations (15:24)
21 - Laws and Legal Regulations (10:08)
22 - Federal Laws - 1 (13:28)
23 - Federal Laws - 2 (13:58)
24 - Intellectual Properties (10:19)
25 - Security Standards and Frameworks (16:28)
26 - Maturity Assessment Process (11:41)
27 - Security Controls (13:57)
28 - Security Controls Examples ITGCs and Strong Control Concept (13:16)
29 - Control Objective and Compensating Controls (13:13)
30 - Defense in Depth - Layered Defenses Strategy (14:27)
31 - Abstraction and Security through Obscurity (12:37)
32 - Security Manager Roles (12:00)
33 - Organizational Structure (11:38)
34 - Security Program and Strategy (14:55)
35 - Governance and Management (10:10)
36 - Information Security Governance (13:06)
37 - Policies (9:47)
38 - Standards (11:18)
39 - Procedures and Guidelines (11:28)
40 - Policies Development and Review (15:20)
41 - Risk Management Overview (14:57)
42 - Types of Risk and Risk Levels (10:44)
43 - Risk Management Frameworks (12:11)
44 - Risk Identification (12:04)
45 - Risk Analysis (12:12)
46 - Risk Evaluation and Response (13:43)
47 - Risk Reporting and Monitoring (15:12)
48 - Domain 1 Recap (13:21)
CISSP - Updated February 2026 - Domain 2
49 - CISSP Domain 2 Introduction and Key Concepts Overview (9:18)
50 - Data Lifecycle (9:49)
51 - Data Disposal and Destruction (12:59)
52 - Digital Rights Management (11:42)
53 - Data Security Controls (12:13)
54 - Shadow IT (10:14)
55 - IT Asset Management (12:33)
56 - Roles in Data and Assets Protection (10:48)
57 - RACI Matrix (10:13)
58 - Social Engineering (11:22)
59 - Security Awareness Program (9:51)
60 - Personnel Security Measures (13:38)
61 - Due Care vs Due Diligence (10:26)
62 - Outsourcing (13:38)
63 - Securing Supply chain Risk Management (10:10)
64 - A Real Case Study - Crowdstrike Outage July 2024 (11:31)
65 - Domain 2 Recap (12:19)
CISSP - Updated February 2026 - Domain 3
66 - CISSP Domain 3 Introduction and Key Concepts Overview (11:52)
67 - Cryptography overview (11:37)
68 - Cryptography Key Concepts (11:54)
69 - Symmetric Encryption Overview (10:41)
70 - Asymmetric Encryption Overview (14:56)
71 - Asymmetric Encryption in Action (9:48)
72 - Integrity and Hashing and Salting (12:01)
73 - Digital Signature (8:49)
74 - Digital Certificate (11:58)
75 - PKI - Public Key Infrastructure (12:02)
76 - SSL Pining Certificate Pining (12:13)
77 - SSL MTLS (10:57)
78 - Applications of Encryption (12:32)
79 - Emerging Cryptographic Technologies (11:44)
80 - Secure Design Principals (11:31)
81 - Zero Trust - Trust but Verify (12:53)
82 - Trusted Computing Base (10:51)
83 - Side Channel Attack (11:16)
84 - Information System Modelling tools (9:31)
85 - Security Models BLP BIBA (12:39)
86 - Clark Wilson Brewer Nash and HRU Security Models (12:09)
87 - TCSEC ITSEC and Common Criteria (14:45)
88 - Security Facility Design (12:11)
89 - Physical Security Control (12:34)
90 - Environmental Security (18:55)
91 - Secure Area Policies (11:23)
92 - Domain 3 Recap (12:16)
CISSP - Updated February 2026 - Domain 4
93 - CISSP Domain 4 Introduction and Key Concepts Overview (11:30)
94 - Introduction to IT Networks and Networking Basic Concepts (16:28)
95 - OSI and TCPIP Models overview (16:48)
96 - Explaining OSI Lower Layers - Physical Layer (16:07)
97 - Explaining OSI Lower Layers - Data Link Layer (12:12)
98 - Network Addresses and ARP Protocol (12:23)
99 - Explaining OSI Lower Layers - Network Layer (16:13)
100 - Explaining OSI Higher Layers - Transport to Application (16:08)
101 - Communication types - Unicast Multicast Broadcast (10:54)
102 - Wireless and Radio Frequency Based Communication (14:22)
103 - Routing and Routed Protocols (13:12)
104-1 - Understanding DNS Records (16:30)
104 - DNS DNSSEC DNS Threats and Mitigation (14:12)
105 - Converged Networks and VoIP POE and QoS (10:47)
106 - Homing and Network Redundancy (12:55)
107 - Air gap In Band and Out of Band OOB (12:11)
108 - SDN - Software Defined Network Overview (11:59)
109 - Practical SDN Applications - SDN - NSX - Slicing (14:49)
110 - Network Load Balancer (11:26)
111 - Network Segmentation (11:20)
112 - Layer 2 Attacks - Wired Network Attacks and Countermeasures (17:24)
113 - Wireless Network Security (17:11)
114 - Firewalls Overview (13:34)
115 - DMZ Screened Subnet and Bastian Host (11:45)
116 - Intrusion Prevention and Intrusion Detection Systems (11:57)
117 - Proxy and Content Filtering (11:55)
118 - Email Security SPF DKIM DMARC ESG (11:30)
119 - Secure Communication Channels or VPNs TLS IPSec (12:37)
125 - Secure Communication Protocols and Secure Channels (14:50)
121 - OT ICS Security Best Practices and Purdu Model (13:51)
122 - SSL Decryption and Offloading (13:31)
123 - Packet Broker (13:39)
124 - NOC Monitoring of Network (12:32)
125 - Domain 4 Recap (11:23)
CISSP - Updated February 2026 - Domain 5
126 - CISSP Domain 5 Introduction (10:35)
127 - IAM Function (15:21)
128 - AAA Overview (15:48)
129 - MFA and Bio-metric Authentication (11:21)
130 - Passwordless Authentication Methods (14:14)
131 - SSO and RSO - Single Sign On and Reduced Sign On (11:21)
132 - Access Control Concepts (11:18)
133 - Authorization and Access control Models (12:05)
134 - Accounting and Auditing (13:23)
135 - Identity Access Management Protocols Solutions (14:16)
136 - LDAP Server - Active Directory (13:28)
137 - Password Attacks and Countermeasures (17:33)
138 - SOD (9:51)
139 - Manage Privileged Accounts (12:57)
140 - Understand PAM Solution (12:35)
141 - Domain 5 Recap (14:12)
CISSP - Updated February 2026 - Domain 7
158 - CISSP Domain 7 Introduction and Key Concepts Overview (11:41)
159 - Change Management Process (14:04)
160 - Release Management (12:32)
161 - Configuration Management (11:28)
162 - Financial Portfolio Capacity and Supplier Management (13:10)
163 - Capex and Opex and ROI and ROSI (12:04)
164 - Incident Management Overview (13:10)
165 - Incident Response Plan (14:20)
166 - Collecting digital Evidences and Forensic (11:00)
167 - Incident Response Training (11:08)
168 - Communication During Incidents (12:10)
169 - Post Incident Activities (9:52)
170 - Incident Response Review and Evaluation (9:34)
171 - Security Operation Centre - SOC (12:16)
172 - SIEM Architecture and Monitoring Protocols (13:51)
173 - Endpoint Security Software (15:03)
174 - EDR and NDR and XDR SOAR (11:46)
175 - File Integrity Monitoring - FIM (12:04)
176 - What is Disaster and BIA (11:09)
177 - Disaster Recovery Plan (11:13)
178 - Business Continuity Plan (12:08)
179 - RPO and RTO and Recovery Metrics (13:55)
180 - Recovery Strategies and Alternate Processing Facilities (12:13)
181 - BCP Testing and Evaluation (12:02)
182 - Data Backup (13:05)
183 - Storage Redundancy using RAID (13:34)
184 - Domain 7 Recap (11:15)
CISSP - Updated February 2026 - Domain 8
185 - CISSP Domain 8 Introduction and Key Concepts Overview (10:39)
186 - Software Development Methodologies (12:31)
187 - DevOps and CICD (11:52)
188 - DevSecOps (11:18)
189 - Software Defined Security SDS (15:54)
190 - Software Testing (13:59)
191 - What is API (13:16)
192 - Version Control System and Code Repository (12:01)
193 - Application Security Testing (12:52)
194 - Secure Code Practices (14:00)
195 - Certification vs Accreditation and Authorize to Operate (12:00)
196 - Software Project Acquisition Steps (10:36)
197 - Project Management Tools - GANTT PERT CPM TIMEBOX (10:28)
198 - Database Overview (11:22)
199 - Database Security (12:54)
200 - Database Resiliency and Data Availability (12:04)
201 - Transport Database Encryption - TDE (12:39)
202 - Virtualization and SDDC (12:44)
203 - Containers and Microservices (12:39)
204 - Serverless Computing (13:16)
205 - Cloud Computing (14:17)
206 - Cloud Deployment Models (12:02)
207 - Cloud Service Models (12:43)
208 - Cloud Shared Responsibility Matrix (13:34)
209 - Cloud Contracts (13:27)
210 - SASE CASB Overview (13:03)
211 - CDN - Content Delivery Network (12:05)
212 - Embedded Systems IoT Edge Computing HPC (11:50)
213 - Quantum Computing Overview (11:13)
214 - Domain 8 Recap (12:17)
Course Closure
215 - CISSP Exam Format and How to get certified and Maintain your CISSP (12:12)
38 - Standards
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock