Cyber Security

Beginner 0(0 Ratings) 15 Students enrolled
Created by Certy Box Last updated Tue, 02-Mar-2021
What will i learn?

Curriculum for this course
210 Lessons 00:00:00 Hours
Understanding Security Threats
14 Lessons 00:00:00 Hours
  • Capture FTP and HTTP Traffic 00:00:00
  • Lessons Learnt 00:00:00
  • Understanding the Attack Surface 00:00:00
  • Network Hardening Explained 00:00:00
  • Demilitarized Layer 00:00:00
  • Threats vs Vulnerabilities vs Risks 00:00:00
  • Top Security Threats 00:00:00
  • Types of Attacks 00:00:00
  • Physical Security 00:00:00
  • Social Engineering 00:00:00
  • The Importance of the Corporate Security Policy 00:00:00
  • Password Protection Policies 00:00:00
  • Why Never to Ask an Admin for Favors 00:00:00
  • Exercise 00:00:00
  • Security on the Road 00:00:00
  • E-mail Security 00:00:00
  • How to Handle Sensitive Data 00:00:00
  • When and What to Share 00:00:00
  • BYOD and IoT 00:00:00
  • Wireless Networking Challenges 00:00:00
  • Posting on Social Media 00:00:00
  • The Importance of Security Programs 00:00:00
  • Employee Training, Awareness, and Advocacy 00:00:00
  • Balancing Up-Front Costs vs Downtime in the Future 00:00:00
  • Convenience vs Security 00:00:00
  • Exercise 00:00:00
  • Assets,Threats and Vulnerabilities 00:00:00
  • Risk Management 00:00:00
  • Map Risks to Risk Treatments 00:00:00
  • Deploy User Account Security Settings 00:00:00
  • User Account Management 00:00:00
  • HTTP Session Management 00:00:00
  • Configure SSL and TLS Settings 00:00:00
  • Mobile Device Access Control 00:00:00
  • Data Confidentiality 00:00:00
  • Implement Encryption for Data in Motion 00:00:00
  • Implement Encryption for Data at Rest 00:00:00
  • Practical Exercise 00:00:00
  • Security Auditing and Accountability 00:00:00
  • Enable Windows File System Auditing 00:00:00
  • Conduct a Vulnerability Assessment Using Windows 00:00:00
  • Conduct a Vulnerability Assessment Using Linux 00:00:00
  • Mobile Device Access Control 00:00:00
  • Configure Mobile Device Hardening Policies 00:00:00
  • Enable a Smartphone as a Virtual MFA Device 00:00:00
  • Securing Applications 00:00:00
  • Implement File Hashing 00:00:00
  • Incident Response Planning 00:00:00
  • Examine Network Traffic for Security Incidents 00:00:00
  • Exercise 00:00:00
  • OSI Model 00:00:00
  • Network Hardware 00:00:00
  • IPv4 00:00:00
  • IPv6 00:00:00
  • TCP and UDP 00:00:00
  • Use common Windows TCP/IP utilities 00:00:00
  • Use common Linux TCP/IP utilities 00:00:00
  • Network Services 00:00:00
  • Configure and Scan for Open Ports 00:00:00
  • Wired and Wireless Networks 00:00:00
  • Use Common Wireless Tools 00:00:00
  • Internal and External Networks 00:00:00
  • Topology, Service Discovery, and OS Fingerprinting 00:00:00
  • Packet Capturing 00:00:00
  • Network Infrastructure Discovery 00:00:00
  • E-mail and DNS Harvesting 00:00:00
  • Social Engineering and Phishing 00:00:00
  • Cloud Concepts 00:00:00
  • Cloud Service Models 00:00:00
  • Virtualization 00:00:00
  • Cloud Security Options 00:00:00
  • Acceptable Use Policy 00:00:00
  • Data Ownership and Retention Policy 00:00:00
  • Data Classification Policy 00:00:00
  • Password Policy 00:00:00
  • Exercise 00:00:00
  • Threat Overview 00:00:00
  • Threat Classification 00:00:00
  • Personally Identifiable Information 00:00:00
  • Payment Card Information 00:00:00
  • Intellectual Property 00:00:00
  • Data Loss Prevention 00:00:00
  • Prevent Data Storage on Unencrypted Media 00:00:00
  • Scope of Impact 00:00:00
  • Stakeholders 00:00:00
  • Role-based Responsibilities 00:00:00
  • Incident Communication 00:00:00
  • Host Symptoms and Response Actions 00:00:00
  • Network Symptoms and Response Actions 00:00:00
  • Application Symptoms and Response Actions 00:00:00
  • Incident Containment 00:00:00
  • Incident Eradication 00:00:00
  • OEM Documentation 00:00:00
  • Network Documentation 00:00:00
  • Incident Response Plan/call list 00:00:00
  • Incident Documentation 00:00:00
  • Chain of Custody Form 00:00:00
  • Change Control Processes 00:00:00
  • Types of Reports 00:00:00
  • Service Level Agreement 00:00:00
  • Memorandum of Understanding 00:00:00
  • Asset Inventory 00:00:00
  • Exercise 00:00:00
  • SDLC Phases 00:00:00
  • Secure Coding 00:00:00
  • Security Testing 00:00:00
  • Host Hardening 00:00:00
  • Patching Overview 00:00:00
  • Use SCCM to Deploy Patches 00:00:00
  • File System Permissions 00:00:00
  • Network Access Control 00:00:00
  • VLAN 00:00:00
  • Determining Resource Access 00:00:00
  • Honeypots 00:00:00
  • Jump Box 00:00:00
  • IT Security Governance 00:00:00
  • Regulatory Compliance 00:00:00
  • Standards and Technology 00:00:00
  • International standards for organisation 00:00:00
  • ITIL 00:00:00
  • TOGAF 00:00:00
  • Logical Controls 00:00:00
  • Physical Controls 00:00:00
  • Configure Router ACL Rules 00:00:00
  • Administrative Controls 00:00:00
  • Compensating Controls 00:00:00
  • Continuous Monitoring of Controls 00:00:00
  • Hardware Trust 00:00:00
  • Penetration Testing 00:00:00
  • Exercise 00:00:00
  • Cryptography Primer 00:00:00
  • Symmetric Cryptography 00:00:00
  • Asymmetric Cryptography 00:00:00
  • Public Key Infrastructure 00:00:00
  • Request a PKI Certificate from a Windows CA 00:00:00
  • Use Windows EFS File Encryption 00:00:00
  • Fingerprinting and Hashing 00:00:00
  • File Hashing in Linux 00:00:00
  • File Hashing in Windows 00:00:00
  • Authentication 00:00:00
  • Configure Multifactor Authentication for VPN Clients 00:00:00
  • Authorization 00:00:00
  • RADIUS, TACACS+ 00:00:00
  • User Provisioning and Deprovisioning 00:00:00
  • Identity Federation 00:00:00
  • Server Vulnerabilities 00:00:00
  • Endpoint Vulnerabilities 00:00:00
  • Vulnerability Scanning Overview 00:00:00
  • Vulnerability Scanning Settings 00:00:00
  • SCAP 00:00:00
  • Scan for Vulnerabilities using Nessus 00:00:00
  • Common Vulnerability Scanning Tools 00:00:00
  • Scan for Vulnerabilities using Microsoft Baseline Security Analyzer 00:00:00
  • Review Vulnerability Scan Results 00:00:00
  • Vulnerability Remediation 00:00:00
  • Network Vulnerabilities 00:00:00
  • Mobile Device Vulnerabilities 00:00:00
  • Exercise 00:00:00
  • Firewalling Overview 00:00:00
  • Firewall Rules 00:00:00
  • Packet Filtering Firewalls 00:00:00
  • Configure a Packet Filtering Firewall 00:00:00
  • Proxy Servers 00:00:00
  • Security Appliances 00:00:00
  • Web Application Firewall 00:00:00
  • Intrusion Detection and Prevention Overview 00:00:00
  • Host Intrusion Detection Systems 00:00:00
  • Network Intrusion Detection Systems 00:00:00
  • Network Intrusion Prevention Systems 00:00:00
  • Malware Overview 00:00:00
  • Virus 00:00:00
  • Worms 00:00:00
  • Spyware, Adware 00:00:00
  • Ransomware 00:00:00
  • Antimalware 00:00:00
  • User Training and Awareness 00:00:00
  • Digital Forensics Overview 00:00:00
  • Digital Forensics Hardware 00:00:00
  • Digital Forensics Software 00:00:00
  • Digital Forensics and Data at Rest 00:00:00
  • Common Digital Forensic Tools 00:00:00
  • Mobile Device Forensics 00:00:00
  • Creating a Physical Memory Dump 00:00:00
  • Viewing Deleted Files on a Hard Disk 00:00:00
  • Exercise 00:00:00
  • Hiring and Background Checks 00:00:00
  • User Onboarding and Offboarding 00:00:00
  • Personnel Management Best Practices 00:00:00
  • Threats, Vulnerabilities, and Exploits 00:00:00
  • Spoofing 00:00:00
  • Packet Forgery using Kali Linux 00:00:00
  • Cross-site Scripting 00:00:00
  • Root Kits 00:00:00
  • Privilege Escalation 00:00:00
  • Common Exploit Tools 00:00:00
  • Metasploits Framework 00:00:00
  • Kali Linux 00:00:00
  • Password Cracking 00:00:00
  • Reasons for Monitoring 00:00:00
  • Common Monitoring Tools 00:00:00
  • Linux OS Monitoring Tools 00:00:00
  • Windows OS Monitoring Tools 00:00:00
  • Windows Event Log Forwarding 00:00:00
  • SIEM 00:00:00
  • SCADA and ICS 00:00:00
  • Monitoring Network Bandwidth 00:00:00
  • Point-in-time Data Analysis 00:00:00
  • Data Correlation and Analytics 00:00:00
  • Detailed Log Analysis 00:00:00
  • Exercise 00:00:00
Requirements
+ View more
Description
+ View more
Other related courses
00:00:00 Hours
Updated Mon, 10-Jun-2019
0 0 $12500
00:00:00 Hours
Updated Tue, 15-Jun-2021
0 57 $25000
00:00:00 Hours
Updated Tue, 19-Mar-2024
0 29 $0
00:00:00 Hours
0 35 $0
00:00:00 Hours
Updated Thu, 19-May-2022
0 16 $0
About the instructor
  • 0 Reviews
  • 785 Students
  • 152 Courses
+ View more
Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews
Buy now
Includes:
  • 00:00:00 Hours On demand videos
  • 210 Lessons
  • Full lifetime access
  • Access on mobile and tv