Module 1 Course Introduction
Unit 1 1. Course Introduction  
Unit 2 2. Instructor Introduction  
Module 2 Understanding Risk Management
Unit 1 1. Chapter Introduction  
Unit 2 2. Topic A: Understanding Business and Industry Influences  
Unit 3 3. Ongoing Risk Management  
Unit 4 4. New Products and User Behaviors  
Unit 5 5. Business Models and Strategies  
Unit 6 6. Cloud Technologies  
Unit 7 7. Acquisitions and Mergers  
Unit 8 8. Due Diligence Team  
Unit 9 9. Data Ownership  
Unit 10 10. Data Reclassification  
Unit 11 11. Integrating Diverse Industries  
Unit 12 12. Common Regulations  
Unit 13 13. Geographic Differences  
Unit 14 14. Data Sovereignty  
Unit 15 15. Internal and External Influences  
Unit 16 16. De-perimeterization  
Unit 17 17. Understand Changes in Network Boundaries  
Unit 18 18. Topic B: Policies and Procedures  
Unit 19 19. Understanding Policies and Procedures  
Unit 20 20. Policy Life Cycle  
Unit 21 21. Process Life Cycle  
Unit 22 22. Reviewing Policies and Processes  
Unit 23 23. Common Business Documents  
Unit 24 24. Security for Contracts  
Unit 25 25. Contract Requirements  
Unit 26 26. General Privacy Principles  
Unit 27 27. Standard Security Practices  
Unit 28 28. Demo - Examining Security Policies  
Unit 29 29. Topic C: Risk Mitigation and Control  
Unit 30 30. Introduction to Risk Mitigation  
Unit 31 31. Categorizing Data  
Unit 32 32. Incorporating Stakeholder Input  
Unit 33 33. Aggregate CIA Scores  
Unit 34 34. Selecting and Implementing Controls  
Unit 35 35. Security Control Frameworks  
Unit 36 36. Options for Frameworks  
Unit 37 37. Extreme Scenario Planning  
Unit 38 38. System-Specific Risk Analysis  
Unit 39 39. Qualitative Risk Analysis  
Unit 40 40. Quantitative Risk Analysis  
Unit 41 41. Risk Impact  
Unit 42 42. Likelihood of Threat  
Unit 43 43. Return on Investment  
Unit 44 44. Understanding Payback  
Unit 45 45. Total Cost of Ownership  
Unit 46 46. TCO Guidelines  
Unit 47 47. Translate to Business Terms  
Unit 48 48. Risk Management Strategies  
Unit 49 49. Risk Management Processes  
Unit 50 50. Information and Asset Value and Costs  
Unit 51 51. Vulnerabilities and Threat Identification  
Unit 52 52. Additional Factors  
Unit 53 53. Topic D: Business Continuity Planning  
Unit 54 54. Continuity Planning  
Unit 55 55. BCP Components  
Unit 56 56. BCP Steps  
Unit 57 57. Additional Plans  
Unit 58 58. Conducting Business Impact Analysis  
Unit 59 59. Chapter 01 Review  
Module 3 Network and Security Components and Architecture
Unit 1 1. Chapter Introduction  
Unit 2 2. Topic A: Physical and Virtual Network Security Devices  
Unit 3 3. Unified Threat Management  
Unit 4 4. Analyzing UTM  
Unit 5 5. Intrusion Detection and Prevention  
Unit 6 6. In-Line Network Encryptor  
Unit 7 7. Network Access Control  
Unit 8 8. SIEM  
Unit 9 9. Firewalls  
Unit 10 10. Firewall Architecture  
Unit 11 11. Wireless Controller  
Unit 12 12. Routers and Switches  
Unit 13 13. Proxy Servers  
Unit 14 14. Topic B: Application and Protocol Level Security  
Unit 15 15. Web Application Firewalls  
Unit 16 16. Hardware Security Modules  
Unit 17 17. Vulnerability Scanners  
Unit 18 18. Topic C: Advanced Network Design  
Unit 19 19. Virtual Private Networks  
Unit 20 20. VPN Protocols  
Unit 21 21. IP Security (IPSec)  
Unit 22 22. IPSec Modes  
Unit 23 23. Demo - Examining IPSec Policies  
Unit 24 24. Secure Sockets Layer (SSL)  
Unit 25 25. Transport Layer Security (TLS  
Unit 26 26. Additional Security Protocols  
Unit 27 27. Authentication Protocols  
Unit 28 28. Topic D: Network Solutions for Data Flow  
Unit 29 29. Data Loss Prevention  
Unit 30 30. Data Flow Enforcement  
Unit 31 31. Network Flow  
Unit 32 32. Topic E: Secure Baselines of Networking and Security Components  
Unit 33 33. Securing Device Configurations  
Unit 34 34. Access Control Lists (ACLs)  
Unit 35 35. ACL Rule Sets  
Unit 36 36. Change Monitoring  
Unit 37 37. Configuration Lockdown  
Unit 38 38. Availability Controls  
Unit 39 39. Disk Availability  
Unit 40 40. Key Availability Terms  
Unit 41 41. Topic F: Advanced Configuration of Network Devices  
Unit 42 42. Additional Configurations  
Unit 43 43. Transport Security  
Unit 44 44. Trunking Security  
Unit 45 45. Port Security  
Unit 46 46. Ports and Sockets  
Unit 47 47. Security Zones  
Unit 48 48. Network Segmentation  
Unit 49 49. Network Access Control  
Unit 50 50. NAC Concepts  
Unit 51 51. Network Enabled Devices  
Unit 52 52. Automation Systems  
Unit 53 53. Physical Security  
Unit 54 54. Chapter 02 Review  
Module 4 Implementing Advanced Authentication and Cryptographic Techniques
Unit 1 1. Chapter Introduction  
Unit 2 2. Topic A: Understanding Authentication and Authorization Concepts  
Unit 3 3. Authentication  
Unit 4 4. The Importance of Identity  
Unit 5 5. Additional Password Options  
Unit 6 6. Demo - Enforcing Strong Passwords  
Unit 7 7. Biometric Authentication  
Unit 8 8. Biometric Considerations  
Unit 9 9. Beyond Single Factor  
Unit 10 10. Certificate Authentication  
Unit 11 11. Authorization  
Unit 12 12. Open Authorization  
Unit 13 13. XACML  
Unit 14 14. SPML  
Unit 15 15. Authorization Concepts  
Unit 16 16. Trust Models  
Unit 17 17. Topic B: Cryptographic Techniques  
Unit 18 18. Introduction to Cryptography  
Unit 19 19. Cryptographic Techniques  
Unit 20 20. Key Stretching  
Unit 21 21. Hashing  
Unit 22 22. Message Digest (MD) Algorithms  
Unit 23 23. Secure Hash Algorithm (SHA)  
Unit 24 24. Digital Signatures  
Unit 25 25. Message Authentication  
Unit 26 26. Code Signing  
Unit 27 27. Additional Concepts  
Unit 28 28. Protecting Data in Transit  
Unit 29 29. Protecting Data in Memory  
Unit 30 30. Protecting Data at Rest  
Unit 31 31. Symmetric Algorithms  
Unit 32 32. Asymmetric Algorithms  
Unit 33 33. Encryption Methods  
Unit 34 34. Topic C: Cryptographic Implementations  
Unit 35 35. Crypto Options  
Unit 36 36. Additional Crypto Options  
Unit 37 37. Cryptographic Applications  
Unit 38 38. Crypto Considerations  
Unit 39 39. Stream vs. Block Ciphers  
Unit 40 40. Block Cipher Modes  
Unit 41 41. Public Key Infrastructure  
Unit 42 42. Primary PKI Functions  
Unit 43 43. Additional PKI Concepts  
Unit 44 44. Chapter 03 Review  
Module 5 Implementing Security for Systems, Applications, and Storage
Unit 1 1. Chapter Introduction  
Unit 2 2. Topic A: Security for Host Devices  
Unit 3 3. Trusted OS  
Unit 4 4. Trusted OS Options  
Unit 5 5. Security Software  
Unit 6 6. Additional Host-Based Software Options  
Unit 7 7. Demo - Configuring a Host-Based Firewall  
Unit 8 8. Auditing  
Unit 9 9. Demo - Configuring Audit Policies  
Unit 10 10. Endpoint Detection Response  
Unit 11 11. Host Hardening  
Unit 12 12. Group Policy  
Unit 13 13. Demo - Configuring Group Policy Security  
Unit 14 14. Command Shell Restrictions  
Unit 15 15. Out-of-Band Management  
Unit 16 16. Dedicated Interfaces  
Unit 17 17. External I/O Restrictions  
Unit 18 18. Wireless Technologies  
Unit 19 19. Wi-Fi Components  
Unit 20 20. 802.11 Standards  
Unit 21 21. Wireless Security  
Unit 22 22. Securing Other Host Devices  
Unit 23 23. Boot Security  
Unit 24 24. Additional Boot Security Options  
Unit 25 25. Topic B: Mobile Device Security  
Unit 26 26. Enterprise Mobility Management  
Unit 27 27. MDM Concepts  
Unit 28 28. Management Options  
Unit 29 29. Context Aware Management  
Unit 30 30. Security and Privacy  
Unit 31 31. Physical Security Options  
Unit 32 32. Additional Mobile Device Concepts  
Unit 33 33. Authentication Options  
Unit 34 34. Mobile Devices  
Unit 35 35. Wearable Security Implications  
Unit 36 36. Topic C: Software Security Controls  
Unit 37 37. Application Security Design Considerations  
Unit 38 38. Application Issues  
Unit 39 39. Application Issues continued  
Unit 40 40. Data Remnants  
Unit 41 41. Securing Applications  
Unit 42 42. Using JSON and REST  
Unit 43 43. Browser Extensions  
Unit 44 44. Application Vulnerabilities  
Unit 45 45. Chapter 04 Review  
Module 6 Implementing Security for Cloud and Virtualization Technologies
Unit 1 1. Chapter Introduction  
Unit 2 2. Topic A: Cloud and Virtualization Technology  
Unit 3 3. Cloud Computing and Virtualization  
Unit 4 4. Cloud Options  
Unit 5 5. Security Considerations  
Unit 6 6. Cloud Service Models  
Unit 7 7. Demo - Examining Cloud Service Models  
Unit 8 8. Security and Virtualization  
Unit 9 9. Cloud-Augmented Security Services  
Unit 10 10. Security as a Service  
Unit 11 11. Virtualization Vulnerabilities  
Unit 12 12. Topic B: Securing Remote Access and Collaboration  
Unit 13 13. Remote Access  
Unit 14 14. Dial-Up Access  
Unit 15 15. Virtual Private Networks  
Unit 16 16. Remote Access Purposes  
Unit 17 17. Security Considerations  
Unit 18 18. Unified Collaboration Tools  
Unit 19 19. Web Conferencing  
Unit 20 20. Video Conferencing  
Unit 21 21. Storage and Document Collaboration  
Unit 22 22. Unified Communication  
Unit 23 23. Instant Messaging  
Unit 24 24. Presence  
Unit 25 25. E-Mail  
Unit 26 26. Chapter 05 Review  
Module 7 Utilizing Security Assessments and Incident Response
Unit 1 1. Chapter Introduction  
Unit 2 2. Topic A: Security Assessments  
Unit 3 3. Importance of Security Assessments  
Unit 4 4. Malware Sandboxing  
Unit 5 5. Memory Dumping  
Unit 6 6. Runtime Debugging  
Unit 7 7. Reconnaissance  
Unit 8 8. Fingerprinting  
Unit 9 9. Code Review  
Unit 10 10. Social Engineering  
Unit 11 11. Public Information  
Unit 12 12. Demo - Accessing Public Information  
Unit 13 13. Penetration Test  
Unit 14 14. Vulnerability Assessment  
Unit 15 15. Assessment Styles  
Unit 16 16. Topic B: Security Assessment Tools  
Unit 17 17. Network Tool Types  
Unit 18 18. Security Content Automation Protocol (SCAP)  
Unit 19 19. Common Vulnerability Scoring System (CVSS)  
Unit 20 20. Fuzzing  
Unit 21 21. Exploit Kits  
Unit 22 22. Host Tools  
Unit 23 23. Additional Host Tools  
Unit 24 24. Physical Security Tools  
Unit 25 25. Topic C: Incident Response and Recovery  
Unit 26 26. E-discovery  
Unit 27 27. Data Breach  
Unit 28 28. Incident Response Process  
Unit 29 29. Chapter 06 Review  
Unit 30 30. Course Closure  
Powered By WP Courseware