Course curriculum
-
-
Course Introduction
FREE PREVIEW -
Course Companion Guide
FREE PREVIEW -
The CIA Triad
-
Practice Activity: The CIA Triad
-
Identity and Access Management I
-
Identity and Access Management II
-
Identity Federation
-
Security Governance: Policies, Standards and Procedures
-
Security Governance: GDPR, HIPAA, PCI-DSS and Intellectual Property
-
Cryptography
FREE PREVIEW -
Practice Activity: Cryptography
-
Hashing and Digital Signatures
-
Lab: Hashing
-
Practice Activity: Hashing
-
Quiz (Foundations)
-
-
-
Introduction: OSI and TCP/IP
-
Application and Transport Layers
-
Lab: Email Forensic Investigation
-
Practice Activity: Email Forensic Investigation
-
Domain Name System (DNS)
-
The Network Layer
-
The Link Layer
-
Security Protocols: SSL/TLS, IPSec, VPNs, SSH
-
Lab Setup: MacOS (Apple Silicon Based) - Virtual Box
-
Lab Setup: Windows
-
NMAP: Port Scanning and Demo
-
LAB: NMAP Port Scanning
-
Lab Solution: NMAP Port Scanning
-
NAT: Network Address Translation
-
Firewalls
-
Wireless Networks and Security
-
-
-
Password Attacks
-
DoS and DDoS
-
DNS Attacks
-
Network Attacks
-
Man in the Middle
-
Social Engineering
-
Lab: Phishing Attack and Investigation
-
-
-
Web Application Architecture
-
SQL Injection
-
Lab: SQL Injection
-
Blind SQL Injection
-
Lab: Blind SQL Injection
-
Mitigating SQL Injection Attacks
-
XSS: Cross Site Scripting
-
Vulnerability Management
-
-
-
Malware: Introduction
-
Viruses and Worms
-
Trojans
-
Spyware adware and ransomware
-
Logic Bombs and Rootkits
-
Anti-malware
-
-
-
Cyber Kill Chain: How the Attack Begins
-
Cyber Kill Chain: Progression of Attach and Command and Control
-
Case Study - Cyber Kill Chain
-
The Incident Response Lifecycle
-
intrusion detection systems (IDS)
-
Intrusion Prevention Systems (IPS)
-
SNORT (IPDS)
-
Lab: Writing Snort Rules
-
Lab Solution: Writing Snort Rules
-
Lab: Snort - Monitoring Sensitive Web Access
-
Lab Solution: Snort- Monitoring Sensitive Web Access
-
About this course
- $9.99
- 64 lessons
- 9 hours of video content