Helpful Videos for SecurityX
Below you will find video resources broken down by each SecurityX Domain.
During your review of the Exam Objectives, if you do not feel complete confidence in your knowledge of a domain subject area, take advantage of this resource. Many individuals have found the video resources to be an exceptional augmentation tool during the exam study process.
VIDEO TOPIC | VIDEO LINK | DOMAIN |
Implement the Appropriate Governance Components | https://www.youtube.com/watch?v=qZtQDbqBqlQ&list=PL95xBJ1juUTquLvRDPoNg7V-T95fRiZUZ&index=22 | 1 |
Perform Risk Management | https://www.youtube.com/watch?v=dFlgJTqRniw&list=PL95xBJ1juUTquLvRDPoNg7V-T95fRiZUZ&index=21 | 1 |
Explain How Compliance Affects Information Security | https://www.youtube.com/watch?v=huTNsnTpYDY&list=PL95xBJ1juUTquLvRDPoNg7V-T95fRiZUZ&index=20 | 1 |
Given a Scenario, Perform Threat-Modeling Activities | https://www.youtube.com/watch?v=fJtp3yOBaJo&list=PL95xBJ1juUTquLvRDPoNg7V-T95fRiZUZ&index=19 | 1 |
Summarize the Secuiryt Challenges Associated with AI | https://www.youtube.com/watch?v=53BImenoFrw&list=PL95xBJ1juUTquLvRDPoNg7V-T95fRiZUZ&index=18 | 1 |
VIDEO TOPIC | VIDEO LINK | DOMAIN |
Analyze Requirements to Design Resilient Systems | https://www.youtube.com/watch?v=H3CnBiMO9Dc&list=PL95xBJ1juUTquLvRDPoNg7V-T95fRiZUZ&index=17 | 2 |
Implement Security in the Early Stages of the Systems | https://www.youtube.com/watch?v=zeR5iNaMJUE&list=PL95xBJ1juUTquLvRDPoNg7V-T95fRiZUZ&index=16 | 2 |
Integrate Controls in the Design of an Architecture | https://www.youtube.com/watch?v=uhXAGgKHPWM&list=PL95xBJ1juUTquLvRDPoNg7V-T95fRiZUZ&index=15 | 2 |
Apply Concepts to the Design of Access and Authentication | https://www.youtube.com/watch?v=YaghBCwRpMg&list=PL95xBJ1juUTquLvRDPoNg7V-T95fRiZUZ&index=14 | 2 |
Securely Implement Cloud Capabilities | https://www.youtube.com/watch?v=ky-9LV7PhrY&list=PL95xBJ1juUTquLvRDPoNg7V-T95fRiZUZ&index=13 | 2 |
Integrate Zero Trust Concepts into Architecture Design | https://www.youtube.com/watch?v=1-VqNlo3gq4&list=PL95xBJ1juUTquLvRDPoNg7V-T95fRiZUZ&index=12 | 2 |
VIDEO TOPIC | VIDEO LINK | DOMAIN |
Analyze Data to Enable Monitoring Activities | https://www.youtube.com/watch?v=PNHFV4x6VjU&list=PL95xBJ1juUTquLvRDPoNg7V-T95fRiZUZ&index=3 | 4 |
Analyze Vulnerabilities and Attacks | https://www.youtube.com/watch?v=Vtt-GMCW_0s&list=PL95xBJ1juUTquLvRDPoNg7V-T95fRiZUZ&index=2 | 4 |
Apply threat-hunting and threat intelligence concepts | https://www.youtube.com/watch?v=lap3k09ACpM&list=PL95xBJ1juUTquLvRDPoNg7V-T95fRiZUZ | 4 |