This course teaches the basics regarding Information Security, including a holistic view of modern network security, operating system hardening, firewalls, Encryption, Application Security, Incident Response and Recovery
This course teaches the basics regarding Information Security, including a holistic view of modern network security, operating system hardening, firewalls, Encryption, Application Security, Incident Response and Recovery
This course is aimed to those considering a career in cyber security.
There are no special prerequisites for you to meet to successfully start this course.
Module 1: Information Security
Lessons:
What is Security
Confidentiality, Integrity and Availability triad
Privacy
Non-Repudiation
Types of Attacks
Threats, Vulnerabilities and Risk
Risk Management
Review Questions
Module 2: Identification, Authentication and Authorisation
Lessons:
Identification
Authentication
Password and Multifactor Authentication
Biometrics
Authorization
Review Questions
Module 3: Access Control
Lessons:
Access Control Lists (ACLs)
Access Control Models and Methodologies
Discretionary Access Control
Mandatory Access Control
Role-based Access Control
Review Questions
Module 4: Law and Compliance
Lessons:
Laws and Regulations
Compliance (Regulatory & Industry Compliance)
Review Questions
Module 5: Fundamentals of Encryption
Lessons:
The History of Encryption
Modern Encryption Methods
Windows and Linux Encryption
Hashing
Review Questions
Module 6: Network Infrastructure and Security
Lessons:
IP Protocols
Management Protocols
Routers and Switches
Firewalls
Firewall Implementation
Proxy Servers
Windows Firewalls
Linux Firewalls
Wireless Security
Mobile Device Security
Network Security Tools
Review Questions
Module 7: Microsoft Windows Infrastructure
Lessons:
Active Directory Domain Services
Group Policy Objects
Configuring Windows
Windows Update
Review Questions
Module 8: UNIX / Linux Server
Lessons:
Configuring Linux
Third Party Software Updates
Core Operating System updates
Review Questions
Module 9: Assessing System Security
Lessons:
Risk Assessment
Conducting an Initial Assessment
Probing the Network
Vulnerabilities
Documenting Security
Review Questions
Module 10: Application Security
Lessons:
Software Development Vulnerabilities
Buffer Overflows
Input Validation Attacks
Authentication, Authorisation and Cryptographic Attacks
Web Security
Database Security
Application Security tools
Review Questions
Module 11: Incident Response and Recovery
Lessons:
What is Incident Response
The Incident Response Process Model
Why Incident Response is needed
Disaster Recovery
Business Continuity
Fault Tolerance
Review Questions
Join our newsletter to stay up to date on features and releases.
By subscribing you agree to with our Privacy Policy and provide consent to receive updates from our company.
DefensityOne 2024 | All rights reserved