Course curriculum

    1. 1.0 Introduction to the Course

    2. 1.1 Fundamental Security Concepts

    3. 1.2 Zero Trust

    4. 1.3 Deception and Disruption

    5. 1.3.1 ACTIVITY - Testing a Honeypot

    6. 1.4 Security Controls

    7. 1.5 Change Management and Security

    8. 1.6 Cryptography Basics

    9. 1.6.1 ACTIVITY - Examining Symmetric Encryption

    10. 1.7 Asymmetric Encryption

    11. 1.7.1 ACTIVITY - Exploring Asymmetric Encryption

    12. 1.8 Hashing

    13. 1.8.1 ACTIVITY - Verifying Integrity with Hashing

    14. 1.9 Digital Certificates

    15. 1.10 Public Key Infrastructure

    16. 1.11 Data and Keys

    17. 1.12 Crypto Implementations

    18. 1.13 Blockchain

    19. 1.14 Non-Cryptographic Data Protection

    1. 2.1 Threat Actors and Motivations

    2. 2.2 Threat Vectors

    3. 2.2.1 ACTIVITY - O.MG Cable Baiting

    4. 2.2.2 O.MG-No Cable

    5. 2.3 Social Engineering

    6. 2.4 Operating System Vulnerabilities and Attacks

    7. 2.5 Application Vulnerabilities and Attacks

    8. 2.5.1 ACTIVITY - Performing a Buffer Overflow

    9. 2.6 Web-based Vulnerabilities and Attacks

    10. 2.6.1 ACTIVITY - Abusing Unsanitized Input

    11. 2.6.2 ACTIVITY - Grabbing Passwords with SQL Injection

    12. 2.6.3 ACTIVITY - Swiping a Token with XSS

    13. 2.7 Other Vulnerabilities

    14. 2.8 Common Malicious Activity Indicators

    15. 2.9 Insider Threat Indicators

    16. 2.10 Social Engineering Indicators

    17. 2.10.1 ACTIVITY - Capturing Credentials through Social Engineering

    18. 2.11 Malware Activity Indicators

    19. 2.12 Operating System Attack Indicators

    20. 2.13 Application Attack Indicators

    21. 2.13.1 ACTIVITY - Recognizing Directory Traversal

    22. 2.14 Physical Attack Indicators

    23. 2.14.1 ACTIVITY - Quickly Cloning an RFID Badge

    24. 2.15 Network Attack Indicators

    25. 2.15.1 ACTIVITY - Crashing a Target with DoS

    26. 2.16 Cryptographic Attack Indicators

    27. 2.17 Password Attack Indicators

    28. 2.17.1 ACTIVITY - Password Cracking

    29. 2.18 Network Segmentation

    30. 2.19 Access Control

    31. 2.20 Enterprise Device Hardening

    1. 3.1 Network Segmentation

    2. 3.1.1 ACTIVITY - Segementing a Network

    3. 3.2 High Availability

    4. 3.3 Virtualization

    5. 3.3.1 ACTIVITY - Deploying Docker Containers

    6. 3.4 Cloud

    7. 3.5 Serverless Computing

    8. 3.6 IoT

    9. 3.7 ICS SCADA

    10. 3.7.1 ACTIVITY - Operating a SCADA System

    11. 3.8 RTOS and Embedded Systems

    12. 3.9 Reducing the Attack Surface

    13. 3.10 Firewalls

    14. 3.11 IDS IPS.mp4

    15. 3.12 Secure Communications - Access

    16. 3.13 Port Security

    17. 3.14 SD-WAN and SASE

    18. 3.15 Data Classifications

    19. 3.16 Protecting Data Types

    20. 3.17 Data Considerations

    21. 3.18 Redundancy

    22. 3.19 Alternate Sites

    23. 3.20 Multiple Platforms

    24. 3.21 Business Continuity

    1. 4.1 Secure Baselines

    2. 4.2 Attack Surface Reduction

    3. 4.3 Wireless Installation

    4. 4.4 Wireless Security Settings

    5. 4.5 Mobile Solutions

    6. 4.5.1 ACTIVITY - Pwning a Mobile Device

    7. 4.6 Application Security Management

    8. 4.7 Asset Management

    9. 4.8 Vulnerability Management

    10. 4.9 Monitoring Activities

    11. 4.10 Monitoring Tools

    12. 4.10.1 ACTIVITY - Scanning a Network for Vulnerabilities

    13. 4.11 Firewall Configuration

    14. 4.11.1 ACTIVITY - Configuring Firewall Rules

    15. 4.12 Intrusion Detection Configuration

    16. 4.13 Web Traffic Filtering

    17. 4.14 Operating System Policy

    18. 4.14.1 ACTIVITY - Examining Windows Group Policy

    19. 4.15 Network Service Security

    20. 4.16 Data Loss Protection

    21. 4.16.1 ACTIVITY - Checking File Integrity

    22. 4.17 Network Access Control

    23. 4.17.1 ACTIVITY - Require Multifactor Authentication

    24. 4.18 Identity Management

    25. 4.19 Access Management

    26. 4.19.1 ACTIVITY - Implementing Access Control

    27. 4.20 Security Automation

    28. 4.21 Incident Response

    29. 4.22 Digital Forensics

    1. 5.1 Elements of Effective Security Governance

    2. 5.2 Elements of the Risk Management Process

    3. 5.3 Third Party Risk Assessment and Management

    4. 5.4 Effective Security Compliance

    5. 5.5 Audits and Assessments

    6. 5.5.1 ACTIVITY - Conducting OSIN

    7. 5.5.2 ACTIVITY - Performing Active Reconnaissance

    8. 5.6 Security Awareness Practices

    9. 5.7 Course Outro

    1. Final Quiz

About this course

  • £695.00
  • 176 lessons
  • 32.5 hours of video content

Discover your potential, starting today