Cybersecurity-essentials

Coming Soon:

This product will be available from 04-Nov-2019

Here's what you will get

Here's what you will learn

  • Who Should Read This Course
  • What Is Covered in This Course
  • The Essentials Series
  • How to Contact the Author
  • A Quick Primer on Infrastructure Security
  • Access Control
  • Security Policies
  • Physical Security Controls
  • Access-Control Gates
  • Authentication Systems
  • Remote-Access Monitoring
  • Hands-On Exercises
  • Video Surveillance Systems
  • Hands-On Exercises
  • Intrusion-Detection and Reporting Systems
  • Hands-On Exercises
  • Summary Points
  • Security Challenge Scenarios
  • Review Questions
  • Exam Questions
  • The Three Layers of Security
  • Securing Host Devices
  • Hands-On Exercises
  • The Inner Perimeter
  • Hands-On Exercises
  • Protecting Local Computing Devices
  • Implementing Local Protection Tools
  • Using Local Intrusion-Detection Tools
  • Configuring Browser Security Options
  • Defending Against Malicious Software
  • Hardening Operating Systems
  • Overseeing Application Software Security
  • Applying Software Updates and Patches
  • Hands-On Exercises
  • Summary Points
  • Security Challenge Scenarios
  • Review Questions
  • Exam Questions
  • Understanding the Basics of Networking
  • The OSI Networking Model
  • Data Transmission Packets
  • OSI Layer Security
  • Network Topologies
  • Logical Topologies
  • Hands-On Exercises
  • The Basics of Networking Protocols
  • Network Control Strategies
  • Hands-On Exercises
  • The Basics of Network Servers
  • Hands-On Exercises
  • Network Switches
  • Routers
  • Gateways
  • Network Bridges
  • Wireless Network Connectivity
  • Hands-On Exercises
  • The Basics of Network Transmission MEDIA
  • Transmission Media Vulnerabilities
  • Hands-On Exercises
  • Summary Points
  • Security Challenge Scenarios
  • Review Questions
  • The Basics of Internet Security
  • Understanding the Environment
  • Hands-On Exercises
  • Understanding Private Networks
  • Hands-On Exercises
  • Understanding the Perimeter
  • Firewalls
  • Network Appliances
  • Proxy Servers
  • Demilitarized Zones (DMZs)
  • Honeypots
  • Extranets
  • Hands-On Exercises
  • Securing Data in Motion
  • Cryptography
  • Hands-On Exercises
  • Using Basic Tools
  • Monitoring Tools and Software
  • Hands-On Exercises
  • Zero Day Vulnerabilities
  • Software Exploits
  • Social Engineering Exploits
  • Network Threats and Attacks
  • Dictionary Attacks
  • Denial of Service (DoS) Attacks
  • Spam
  • Other Exploits
  • Hands-On Exercises
  • Summary Points
  • Security Scenario Review
  • Review Questions
  • Exam Questions

Hands on Activities (Labs)

68 68
Cybersec-ess
Cybersecurity-essentials