Course curriculum

    1. Course Introduction

      FREE PREVIEW
    2. Course Companion Guide

      FREE PREVIEW
    3. The CIA Triad

    4. Practice Activity: The CIA Triad

    5. Identity and Access Management I

    6. Identity and Access Management II

    7. Identity Federation

    8. Security Governance: Policies, Standards and Procedures

    9. Security Governance: GDPR, HIPAA, PCI-DSS and Intellectual Property

    10. Cryptography

      FREE PREVIEW
    11. Practice Activity: Cryptography

    12. Hashing and Digital Signatures

    13. Lab: Hashing

    14. Practice Activity: Hashing

    15. Quiz (Foundations)

    1. Introduction: OSI and TCP/IP

    2. Application and Transport Layers

    3. Lab: Email Forensic Investigation

    4. Practice Activity: Email Forensic Investigation

    5. Domain Name System (DNS)

    6. The Network Layer

    7. The Link Layer

    8. Security Protocols: SSL/TLS, IPSec, VPNs, SSH

    9. Lab Setup: MacOS (Apple Silicon Based) - Virtual Box

    10. Lab Setup: Windows

    11. NMAP: Port Scanning and Demo

    12. LAB: NMAP Port Scanning

    13. Lab Solution: NMAP Port Scanning

    14. NAT: Network Address Translation

    15. Firewalls

    16. Wireless Networks and Security

    1. Password Attacks

    2. DoS and DDoS

    3. DNS Attacks

    4. Network Attacks

    5. Man in the Middle

    6. Social Engineering

    7. Lab: Phishing Attack and Investigation

    1. Web Application Architecture

    2. SQL Injection

    3. Lab: SQL Injection

    4. Blind SQL Injection

    5. Lab: Blind SQL Injection

    6. Mitigating SQL Injection Attacks

    7. XSS: Cross Site Scripting

    8. Vulnerability Management

    1. Malware: Introduction

    2. Viruses and Worms

    3. Trojans

    4. Spyware adware and ransomware

    5. Logic Bombs and Rootkits

    6. Anti-malware

    1. Cyber Kill Chain: How the Attack Begins

    2. Cyber Kill Chain: Progression of Attach and Command and Control

    3. Case Study - Cyber Kill Chain

    4. The Incident Response Lifecycle

    5. intrusion detection systems (IDS)

    6. Intrusion Prevention Systems (IPS)

    7. SNORT (IPDS)

    8. Lab: Writing Snort Rules

    9. Lab Solution: Writing Snort Rules

    10. Lab: Snort - Monitoring Sensitive Web Access

    11. Lab Solution: Snort- Monitoring Sensitive Web Access

About this course

  • $9.99
  • 64 lessons
  • 9 hours of video content

Discover your potential, starting today