Cybersecurity Essentials

Coming Soon:

This product will be available from 04-Nov-2019

Use the Cybersecurity Essentials course and lab to learn the concepts and methodologies being used in the field of cybersecurity. Lab simulates real-world, hardware, software and command line interface environments and can be mapped to any text-book, course or training. The course and lab cover exam objectives and teach you how to work with infrastructure security, network security, security devices, local network security, and access control monitoring systems.

Here's what you will get

Here's what you will learn

  • Who Should Read This Course
  • What Is Covered in This Course
  • A Quick Primer on Infrastructure Security
  • Access Control
  • Security Policies
  • Physical Security Controls
  • Access-Control Gates
  • Authentication Systems
  • Remote-Access Monitoring
  • Hands-On Exercises
  • Video Surveillance Systems
  • Hands-On Exercises
  • Intrusion-Detection and Reporting Systems
  • Hands-On Exercises
  • Summary Points
  • Security Challenge Scenarios
  • Review Questions
  • The Three Layers of Security
  • Securing Host Devices
  • Hands-On Exercises
  • The Inner Perimeter
  • Hands-On Exercises
  • Protecting Local Computing Devices
  • Implementing Local Protection Tools
  • Using Local Intrusion-Detection Tools
  • Configuring Browser Security Options
  • Defending Against Malicious Software
  • Hardening Operating Systems
  • Overseeing Application Software Security
  • Applying Software Updates and Patches
  • Hands-On Exercises
  • Summary Points
  • Security Challenge Scenarios
  • Review Questions
  • Understanding the Basics of Networking
  • The OSI Networking Model
  • Data Transmission Packets
  • OSI Layer Security
  • Network Topologies
  • Logical Topologies
  • Hands-On Exercises
  • The Basics of Networking Protocols
  • Network Control Strategies
  • Hands-On Exercises
  • The Basics of Network Servers
  • Hands-On Exercises
  • Network Switches
  • Routers
  • Gateways
  • Network Bridges
  • Wireless Network Connectivity
  • Hands-On Exercises
  • The Basics of Network Transmission MEDIA
  • Transmission Media Vulnerabilities
  • Hands-On Exercises
  • Summary Points
  • Security Challenge Scenarios
  • Review Questions
  • The Basics of Internet Security
  • Understanding the Environment
  • Hands-On Exercises
  • Understanding Private Networks
  • Hands-On Exercises
  • Understanding the Perimeter
  • Firewalls
  • Network Appliances
  • Proxy Servers
  • Demilitarized Zones (DMZs)
  • Honeypots
  • Extranets
  • Hands-On Exercises
  • Securing Data in Motion
  • Cryptography
  • Hands-On Exercises
  • Using Basic Tools
  • Monitoring Tools and Software
  • Hands-On Exercises
  • Zero Day Vulnerabilities
  • Software Exploits
  • Social Engineering Exploits
  • Network Threats and Attacks
  • Dictionary Attacks
  • Denial of Service (DoS) Attacks
  • Spam
  • Other Exploits
  • Hands-On Exercises
  • Summary Points
  • Security Scenario Review
  • Review Questions

Hands on Activities (Labs)

68 68
Cybersec-ess
Cybersecurity Essentials
ISBN : 9781644591031