Module 1 | Course Introduction | |
---|---|---|
Unit 1 | 1. Course Introduction | |
Unit 2 | 2. Instructor Introduction | |
Module 2 | Understanding Risk Management | |
Unit 1 | 1. Chapter Introduction | |
Unit 2 | 2. Topic A: Understanding Business and Industry Influences | |
Unit 3 | 3. Ongoing Risk Management | |
Unit 4 | 4. New Products and User Behaviors | |
Unit 5 | 5. Business Models and Strategies | |
Unit 6 | 6. Cloud Technologies | |
Unit 7 | 7. Acquisitions and Mergers | |
Unit 8 | 8. Due Diligence Team | |
Unit 9 | 9. Data Ownership | |
Unit 10 | 10. Data Reclassification | |
Unit 11 | 11. Integrating Diverse Industries | |
Unit 12 | 12. Common Regulations | |
Unit 13 | 13. Geographic Differences | |
Unit 14 | 14. Data Sovereignty | |
Unit 15 | 15. Internal and External Influences | |
Unit 16 | 16. De-perimeterization | |
Unit 17 | 17. Understand Changes in Network Boundaries | |
Unit 18 | 18. Topic B: Policies and Procedures | |
Unit 19 | 19. Understanding Policies and Procedures | |
Unit 20 | 20. Policy Life Cycle | |
Unit 21 | 21. Process Life Cycle | |
Unit 22 | 22. Reviewing Policies and Processes | |
Unit 23 | 23. Common Business Documents | |
Unit 24 | 24. Security for Contracts | |
Unit 25 | 25. Contract Requirements | |
Unit 26 | 26. General Privacy Principles | |
Unit 27 | 27. Standard Security Practices | |
Unit 28 | 28. Demo - Examining Security Policies | |
Unit 29 | 29. Topic C: Risk Mitigation and Control | |
Unit 30 | 30. Introduction to Risk Mitigation | |
Unit 31 | 31. Categorizing Data | |
Unit 32 | 32. Incorporating Stakeholder Input | |
Unit 33 | 33. Aggregate CIA Scores | |
Unit 34 | 34. Selecting and Implementing Controls | |
Unit 35 | 35. Security Control Frameworks | |
Unit 36 | 36. Options for Frameworks | |
Unit 37 | 37. Extreme Scenario Planning | |
Unit 38 | 38. System-Specific Risk Analysis | |
Unit 39 | 39. Qualitative Risk Analysis | |
Unit 40 | 40. Quantitative Risk Analysis | |
Unit 41 | 41. Risk Impact | |
Unit 42 | 42. Likelihood of Threat | |
Unit 43 | 43. Return on Investment | |
Unit 44 | 44. Understanding Payback | |
Unit 45 | 45. Total Cost of Ownership | |
Unit 46 | 46. TCO Guidelines | |
Unit 47 | 47. Translate to Business Terms | |
Unit 48 | 48. Risk Management Strategies | |
Unit 49 | 49. Risk Management Processes | |
Unit 50 | 50. Information and Asset Value and Costs | |
Unit 51 | 51. Vulnerabilities and Threat Identification | |
Unit 52 | 52. Additional Factors | |
Unit 53 | 53. Topic D: Business Continuity Planning | |
Unit 54 | 54. Continuity Planning | |
Unit 55 | 55. BCP Components | |
Unit 56 | 56. BCP Steps | |
Unit 57 | 57. Additional Plans | |
Unit 58 | 58. Conducting Business Impact Analysis | |
Unit 59 | 59. Chapter 01 Review | |
Module 3 | Network and Security Components and Architecture | |
Unit 1 | 1. Chapter Introduction | |
Unit 2 | 2. Topic A: Physical and Virtual Network Security Devices | |
Unit 3 | 3. Unified Threat Management | |
Unit 4 | 4. Analyzing UTM | |
Unit 5 | 5. Intrusion Detection and Prevention | |
Unit 6 | 6. In-Line Network Encryptor | |
Unit 7 | 7. Network Access Control | |
Unit 8 | 8. SIEM | |
Unit 9 | 9. Firewalls | |
Unit 10 | 10. Firewall Architecture | |
Unit 11 | 11. Wireless Controller | |
Unit 12 | 12. Routers and Switches | |
Unit 13 | 13. Proxy Servers | |
Unit 14 | 14. Topic B: Application and Protocol Level Security | |
Unit 15 | 15. Web Application Firewalls | |
Unit 16 | 16. Hardware Security Modules | |
Unit 17 | 17. Vulnerability Scanners | |
Unit 18 | 18. Topic C: Advanced Network Design | |
Unit 19 | 19. Virtual Private Networks | |
Unit 20 | 20. VPN Protocols | |
Unit 21 | 21. IP Security (IPSec) | |
Unit 22 | 22. IPSec Modes | |
Unit 23 | 23. Demo - Examining IPSec Policies | |
Unit 24 | 24. Secure Sockets Layer (SSL) | |
Unit 25 | 25. Transport Layer Security (TLS | |
Unit 26 | 26. Additional Security Protocols | |
Unit 27 | 27. Authentication Protocols | |
Unit 28 | 28. Topic D: Network Solutions for Data Flow | |
Unit 29 | 29. Data Loss Prevention | |
Unit 30 | 30. Data Flow Enforcement | |
Unit 31 | 31. Network Flow | |
Unit 32 | 32. Topic E: Secure Baselines of Networking and Security Components | |
Unit 33 | 33. Securing Device Configurations | |
Unit 34 | 34. Access Control Lists (ACLs) | |
Unit 35 | 35. ACL Rule Sets | |
Unit 36 | 36. Change Monitoring | |
Unit 37 | 37. Configuration Lockdown | |
Unit 38 | 38. Availability Controls | |
Unit 39 | 39. Disk Availability | |
Unit 40 | 40. Key Availability Terms | |
Unit 41 | 41. Topic F: Advanced Configuration of Network Devices | |
Unit 42 | 42. Additional Configurations | |
Unit 43 | 43. Transport Security | |
Unit 44 | 44. Trunking Security | |
Unit 45 | 45. Port Security | |
Unit 46 | 46. Ports and Sockets | |
Unit 47 | 47. Security Zones | |
Unit 48 | 48. Network Segmentation | |
Unit 49 | 49. Network Access Control | |
Unit 50 | 50. NAC Concepts | |
Unit 51 | 51. Network Enabled Devices | |
Unit 52 | 52. Automation Systems | |
Unit 53 | 53. Physical Security | |
Unit 54 | 54. Chapter 02 Review | |
Module 4 | Implementing Advanced Authentication and Cryptographic Techniques | |
Unit 1 | 1. Chapter Introduction | |
Unit 2 | 2. Topic A: Understanding Authentication and Authorization Concepts | |
Unit 3 | 3. Authentication | |
Unit 4 | 4. The Importance of Identity | |
Unit 5 | 5. Additional Password Options | |
Unit 6 | 6. Demo - Enforcing Strong Passwords | |
Unit 7 | 7. Biometric Authentication | |
Unit 8 | 8. Biometric Considerations | |
Unit 9 | 9. Beyond Single Factor | |
Unit 10 | 10. Certificate Authentication | |
Unit 11 | 11. Authorization | |
Unit 12 | 12. Open Authorization | |
Unit 13 | 13. XACML | |
Unit 14 | 14. SPML | |
Unit 15 | 15. Authorization Concepts | |
Unit 16 | 16. Trust Models | |
Unit 17 | 17. Topic B: Cryptographic Techniques | |
Unit 18 | 18. Introduction to Cryptography | |
Unit 19 | 19. Cryptographic Techniques | |
Unit 20 | 20. Key Stretching | |
Unit 21 | 21. Hashing | |
Unit 22 | 22. Message Digest (MD) Algorithms | |
Unit 23 | 23. Secure Hash Algorithm (SHA) | |
Unit 24 | 24. Digital Signatures | |
Unit 25 | 25. Message Authentication | |
Unit 26 | 26. Code Signing | |
Unit 27 | 27. Additional Concepts | |
Unit 28 | 28. Protecting Data in Transit | |
Unit 29 | 29. Protecting Data in Memory | |
Unit 30 | 30. Protecting Data at Rest | |
Unit 31 | 31. Symmetric Algorithms | |
Unit 32 | 32. Asymmetric Algorithms | |
Unit 33 | 33. Encryption Methods | |
Unit 34 | 34. Topic C: Cryptographic Implementations | |
Unit 35 | 35. Crypto Options | |
Unit 36 | 36. Additional Crypto Options | |
Unit 37 | 37. Cryptographic Applications | |
Unit 38 | 38. Crypto Considerations | |
Unit 39 | 39. Stream vs. Block Ciphers | |
Unit 40 | 40. Block Cipher Modes | |
Unit 41 | 41. Public Key Infrastructure | |
Unit 42 | 42. Primary PKI Functions | |
Unit 43 | 43. Additional PKI Concepts | |
Unit 44 | 44. Chapter 03 Review | |
Module 5 | Implementing Security for Systems, Applications, and Storage | |
Unit 1 | 1. Chapter Introduction | |
Unit 2 | 2. Topic A: Security for Host Devices | |
Unit 3 | 3. Trusted OS | |
Unit 4 | 4. Trusted OS Options | |
Unit 5 | 5. Security Software | |
Unit 6 | 6. Additional Host-Based Software Options | |
Unit 7 | 7. Demo - Configuring a Host-Based Firewall | |
Unit 8 | 8. Auditing | |
Unit 9 | 9. Demo - Configuring Audit Policies | |
Unit 10 | 10. Endpoint Detection Response | |
Unit 11 | 11. Host Hardening | |
Unit 12 | 12. Group Policy | |
Unit 13 | 13. Demo - Configuring Group Policy Security | |
Unit 14 | 14. Command Shell Restrictions | |
Unit 15 | 15. Out-of-Band Management | |
Unit 16 | 16. Dedicated Interfaces | |
Unit 17 | 17. External I/O Restrictions | |
Unit 18 | 18. Wireless Technologies | |
Unit 19 | 19. Wi-Fi Components | |
Unit 20 | 20. 802.11 Standards | |
Unit 21 | 21. Wireless Security | |
Unit 22 | 22. Securing Other Host Devices | |
Unit 23 | 23. Boot Security | |
Unit 24 | 24. Additional Boot Security Options | |
Unit 25 | 25. Topic B: Mobile Device Security | |
Unit 26 | 26. Enterprise Mobility Management | |
Unit 27 | 27. MDM Concepts | |
Unit 28 | 28. Management Options | |
Unit 29 | 29. Context Aware Management | |
Unit 30 | 30. Security and Privacy | |
Unit 31 | 31. Physical Security Options | |
Unit 32 | 32. Additional Mobile Device Concepts | |
Unit 33 | 33. Authentication Options | |
Unit 34 | 34. Mobile Devices | |
Unit 35 | 35. Wearable Security Implications | |
Unit 36 | 36. Topic C: Software Security Controls | |
Unit 37 | 37. Application Security Design Considerations | |
Unit 38 | 38. Application Issues | |
Unit 39 | 39. Application Issues continued | |
Unit 40 | 40. Data Remnants | |
Unit 41 | 41. Securing Applications | |
Unit 42 | 42. Using JSON and REST | |
Unit 43 | 43. Browser Extensions | |
Unit 44 | 44. Application Vulnerabilities | |
Unit 45 | 45. Chapter 04 Review | |
Module 6 | Implementing Security for Cloud and Virtualization Technologies | |
Unit 1 | 1. Chapter Introduction | |
Unit 2 | 2. Topic A: Cloud and Virtualization Technology | |
Unit 3 | 3. Cloud Computing and Virtualization | |
Unit 4 | 4. Cloud Options | |
Unit 5 | 5. Security Considerations | |
Unit 6 | 6. Cloud Service Models | |
Unit 7 | 7. Demo - Examining Cloud Service Models | |
Unit 8 | 8. Security and Virtualization | |
Unit 9 | 9. Cloud-Augmented Security Services | |
Unit 10 | 10. Security as a Service | |
Unit 11 | 11. Virtualization Vulnerabilities | |
Unit 12 | 12. Topic B: Securing Remote Access and Collaboration | |
Unit 13 | 13. Remote Access | |
Unit 14 | 14. Dial-Up Access | |
Unit 15 | 15. Virtual Private Networks | |
Unit 16 | 16. Remote Access Purposes | |
Unit 17 | 17. Security Considerations | |
Unit 18 | 18. Unified Collaboration Tools | |
Unit 19 | 19. Web Conferencing | |
Unit 20 | 20. Video Conferencing | |
Unit 21 | 21. Storage and Document Collaboration | |
Unit 22 | 22. Unified Communication | |
Unit 23 | 23. Instant Messaging | |
Unit 24 | 24. Presence | |
Unit 25 | 25. E-Mail | |
Unit 26 | 26. Chapter 05 Review | |
Module 7 | Utilizing Security Assessments and Incident Response | |
Unit 1 | 1. Chapter Introduction | |
Unit 2 | 2. Topic A: Security Assessments | |
Unit 3 | 3. Importance of Security Assessments | |
Unit 4 | 4. Malware Sandboxing | |
Unit 5 | 5. Memory Dumping | |
Unit 6 | 6. Runtime Debugging | |
Unit 7 | 7. Reconnaissance | |
Unit 8 | 8. Fingerprinting | |
Unit 9 | 9. Code Review | |
Unit 10 | 10. Social Engineering | |
Unit 11 | 11. Public Information | |
Unit 12 | 12. Demo - Accessing Public Information | |
Unit 13 | 13. Penetration Test | |
Unit 14 | 14. Vulnerability Assessment | |
Unit 15 | 15. Assessment Styles | |
Unit 16 | 16. Topic B: Security Assessment Tools | |
Unit 17 | 17. Network Tool Types | |
Unit 18 | 18. Security Content Automation Protocol (SCAP) | |
Unit 19 | 19. Common Vulnerability Scoring System (CVSS) | |
Unit 20 | 20. Fuzzing | |
Unit 21 | 21. Exploit Kits | |
Unit 22 | 22. Host Tools | |
Unit 23 | 23. Additional Host Tools | |
Unit 24 | 24. Physical Security Tools | |
Unit 25 | 25. Topic C: Incident Response and Recovery | |
Unit 26 | 26. E-discovery | |
Unit 27 | 27. Data Breach | |
Unit 28 | 28. Incident Response Process | |
Unit 29 | 29. Chapter 06 Review | |
Unit 30 | 30. Course Closure |
Powered By WP Courseware