This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Core Cyber Security Concepts
1. Attacks, Threats and Vulnerabilities
1. Compare and Contrast Information Security Roles (6:32)
1.1 1.Contrast & Compare Information Security Roles - CompTIA Security+ Attacks, Threats and Vulnerabilities
2. Compare and Contrast Security Controls and Framework Types (9:10)
2.1 2.Compare and Contrast Security Controls and Framework Types
3. Types of Threat Actors and Attack Vectors (6:27)
3.1 3.Types of Threat Actors and Attack Vectors
4. Threat Intelligence & Threat Research (9:37)
4.1 4.Threat Intelligence & Threat research Sources
5. Commands used in Assessing Network layout & Security (10:07)
5.1 5. Commands used in Assessing Network layout & Security
6. Security concerns regarding Vulnerabilities (5:38)
6.1 6. Security concerns regarding Vulnerabilities
7. Vulnerability Scanning Techniques and Vulnerability scores & exposures (5:24)
7.1 7.Vulnerability Scanning Techniques and Vulnerability scores & exposures
8. Social Engineering Attacks & Principles (12:08)
8.1 9.Social Engineering Attacks & Principles
9. Malware and Types of malwares (6:51)
9.1 10.Malware and Types of malwares
2. Overview of Penetration Testing
1. Penetration Testing Concepts (13:13)
2. Information gathering (8:35)
2.1 8.Penetration Testing Concepts in detail
3. Scanning (4:16)
4. Exploitation (2:15)
5. Post Exploitation Maintaining access (4:22)
6. Reporting (1:26)
3. Architecture and Design
1. Encryption, Cryptography, types of Cryptography and Cryptographic algorithms (21:14)
1.1 1.Encryption, Cryptography it's types and Cryptographic algorithms
2. Digital Signatures & Digital Certificates (10:29)
2.1 2. Digital Signatures & Digital Certificates
3. Digital Certificate Authorities (3:52)
3.1 3. Digital certificate Authorities
4. Public Key Infastructure (5:36)
4.1 4. Public Key Infrastructure - PKI
5. PKI Management (10:56)
5.1 5. PKI Management
6. Identification, Authentication & Access Control Systems (3:44)
6.1 6.Identification, Authentication & Access Control Systems
7. Knowledge based Authentication (13:54)
8. Technology behind Secure Authentication (8:55)
8.1 8. Technology implementing Secure Authentication
9. Biometric Authentication (16:17)
9.1 9. Biometric Authentication Concepts
4. Implementation
1. Wireless Networks & Security Controls (14:40)
2. Identity Management Controls (8:58)
2.1 11. Identity Management Controls
3. Cloud, Virtualization, BYOD & Security Testing (14:53)
3.1 Cloud, Virtualization, BYOD and Security Testing
4. Implementing Personnel Policies (5:44)
4.1 Implementing Personnel Policies
5. Account Policies & Authorization (4:23)
5.1 12.Implementing Account Policies & Authorization Solutions
5. Operations and Incident Response
1. Incident Management (5:54)
1.1 Incident Management
2. Digital Forensics (5:13)
2.1 Digital Forensics
6. Governance, Risk and Compliance
1. Information Security Governance (6:02)
1.1 Information Security Governance
2. Information Security programs (10:34)
2.1 Information Security Programs
3. Risk Management (5:55)
3.1 Risk Management
5. Post Exploitation Maintaining access
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock