Description
Course Description:
Taught by an expert in information technology and cyber security, this course is a fun way to master the fundamentals of computer security.
Course Objectives:
· Passing the CompTIA Security+ certification exam with confidence
· Understand computer security, its functions, and its components
· Performing basic security configurations
· Become an effective security technician in a business environment
- Instructor: Wattlenet Academy
- Lectures: 197
- Students: 21
- Duration: 40 hours
Class requirements: Internet, Laptop/PC
Course Content
- Overview OF the Course
- Introduction
- Overview of Security
- CIA Triad
- AAA of Security
- Security Threats
- Mitigating Threats
- Hackers
- Threat Actors
- Market research
- Market Research Intro
- How to Find a Hungry-to-Buy Audience
- How to Get Responses to Your Survey
- How to Analyse Your Survey Results
- How to Get Valuable Feedback
- Malware
- Introduction
- Viruses
- Trojans
- Ransomware
- Spyware
- Rootkits
- Spam
- Malware Infections
- Malware Infections
- Common Delivery Methods
- Botnets and Zombies
- Active Interception and Privilege Escalation
- Privilege Escalation
- Backdoors and Logic Bombs
- Symptoms of Infection
- Removing Malware
- Preventing Malware
- Security Applications and Devices
- Introduction
- Software Firewalls
- IDS
- Pop-up Blockers
- Data Loss Prevention (DLP)
- Securing the BIOS
- Securing Storage Devices
- Disk Encryption
- Mobile device Security
- Introduction
- Securing Wireless Devices SEO Metrics
- Mobile Malware
- SIM Cloning & ID Theft
- Double Conversions by Improving Website Speed
- Bluetooth Attacks
- Mobile Device Theft
- Security of Apps
- BYOD
- Hardening Mobile Devices
- Hardening
- Hardening
- Unnecessary Applications
- Restricting Applications
- Unnecessary Services
- Trusted Operating System
- Updates and Patches
- Patch Management
- Group Policies
- File Systems and Hard Drives
- Virtualization
- Introduction
- Hypervisors
- Threats to VMs
- Securing VMs
- Application Security
- Introduction
- Web Browser Security
- Web Browser Concerns
- Web Browser Configuration
- Securing Applications
- Secure Software Development
- Software Development
- SDLC Principles
- Testing Methods
- Software Vulnerabilities and Exploits
- Buffer Overflows
- Buffer Overflow Attack
- XSS and XSRF
- SQL Injection
- Network Design
- Network Security
- The OSI Model
- Switches
- Routers
- Network Zones
- Network Access Control
- VLANs
- Subnetting
- Network Address Translation
- Telephony
- Perimeter Security
- Introduction
- Perimeter Security
- Firewalls
- SOHO Firewall
- Proxy Servers
- Data Loss Prevention
- NIDS and NIPS
- Unified Threat Management
- Cloud Security
- Cloud Computing
- Cloud Types
- As a Service
- Cloud Security
- Defending Servers
- Network Attacks
- Network Attacks
- Ports and Protocols
- Memorization of Ports
- Unnecessary Ports
- Denial of Service
- DDoS
- Stopping a DDoS
- Spoofing
- Hijacking
- Replay Attack
- Transitive Attacks
- DNS Attacks
- ARP Poisoning
- Securing Networks
- Securing Network Devices
- Securing Network Media
- Securing WiFi Devices
- Wireless Encryption
- Wireless Access Points
- Wireless Attacks
- Other Wireless Technologies
- Physical Security
- Overview of Physical Security
- Surveillance
- Door Locks
- Biometric Readers
- Facilities Security
- Facilities Security
- Fire Suppression
- HVAC
- Shielding
- Vehicles
- Authentication
- Authentication Models
- 802.1x
- LDAP and Kerberos
- Remote Desktop Services
- Remote Access Service
- VPN
- RADIUS vs TACACS+
- Access Control
- Access Control Models
- Best Practices
- Users and Groups
- Permissions
- Usernames and Passwords
- User Account Control
- Risk Assessments
- Risk Assessments
- Qualitative Risk
- Quantitative Risk
- Methodologies
- Security Controls
- Vulnerability Management
- Penetration Testing
- OVAL
- Vulnerability Assessments
- Nmap Scanning
- Vulnerability Scanning
- Password Analysis
- Password Cracking
- Monitoring and Auditing
- Monitoring Types
- Performance Baselining
- Protocol Analyzers
- SNMP
- Analytical Tools
- Auditing
- Auditing Files
- Logging
- Log Files
- SIEM
- Cryptography
- Cryptography
- Symmetric vs Asymmetric
- Symmetric Algorithms
- Public Key Cryptography
- Asymmetric Algorithms
- Pretty Good Privacy
- Key Management
- One-Time Pad
- Hashing
- Hashing Attacks
- Increasing Hash Security
- Public Key Infrastructure
- Public Key Infrastructure
- Digital Certificates
- Certificate Authorities
- Web of Trust
- Security Protocols
- Overview
- S/MIME
- SSL and TLS
- SSH
- VPN Protocols
- Setting up a VPN
- Planning for the Worst
- Redundant Power
- Backup Power
- Data Redundancy
- RAIDs
- Network Redundancy
- Server Redundancy
- Redundant Sites
- Data Backup
- Tape Rotation
- Disaster Recovery Plan
- Social Engineering
- Social Engineering
- Pretexting
- Insider Threat
- Phishing
- More Social Engineering
- User Education
- Policies and Procedures
- Overview
- Data Classifications
- PII and PHI
- Security Policies
- User Education
- Vendor Relationships
- Disposal Policies
- Incident Response Procedures
- Data Collection Procedures
- IT Security Frameworks
Tags: cybersecurity, Network Security