CMGT433 - Cyber Security

(UOP-CMGT433.AE1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Cybersecurity, Threat Intelligence and Reconnaissance

  • Cybersecurity Objectives
  • Privacy vs. Security
  • Evaluating Security Risks
  • Building a Secure Network
  • Secure Endpoint Management
  • Penetration Testing
  • Reverse Engineering
  • The Future of Cybersecurity Analytics
  • Threat Data and Intelligence
  • Threat Classification
  • Attack Frameworks
  • Applying Threat Intelligence Organizationwide
  • Mapping and Enumeration
  • Passive Footprinting
  • Gathering Organizational Intelligence
  • Detecting, Preventing, and Responding to Reconnaissance
2

Vulnerability and Cloud Security

  • Identifying Vulnerability Management Requirements
  • Configuring and Executing Vulnerability Scans
  • Developing a Remediation Workflow
  • Overcoming Risks of Vulnerability Scanning
  • Vulnerability Scanning Tools
  • Reviewing and Interpreting Scan Reports
  • Validating Scan Results
  • Common Vulnerabilities
  • Understanding Cloud Environments
  • Operating in the Cloud
  • Cloud Infrastructure Security
3

Security

  • Understanding Defense-in-Depth
  • Improving Security by Improving Controls
  • Analyzing Security Architecture
  • Understanding Identity
  • Threats to Identity and Access
  • Identity as a Security Layer
  • Federation and Single Sign-On
  • Software Assurance Best Practices
  • Designing and Coding for Security
  • Software Security Testing
  • Hardware Assurance Best Practices
4

Security Operations, Incident Response and Indicators of Compromise

  • Security Monitoring
  • Security Incidents
  • Phases of Incident Response
  • Building the Foundation for Incident Response
  • Creating an Incident Response Team
  • Coordination and Information Sharing
  • Classifying Incidents
  • Analyzing Network Events
  • Investigating Host-Related Issues
  • Investigating Service and Application-Related Issues
5

Analysis, Risk management and Policy

  • Building a Forensics Capability
  • Understanding Forensic Software
  • Conducting Endpoint Forensics
  • Network Forensics
  • Cloud, Virtual, and Container Forensics
  • Conducting a Forensic Investigation
  • Forensic Investigation: An Example
  • Containing the Damage
  • Incident Eradication and Recovery
  • Wrapping Up the Response
  • Analyzing Risk
  • Managing Risk
  • Security Controls
  • Understanding Policy Documents
  • Complying with Laws and Regulations
  • Adopting a Standard Framework
  • Implementing Policy-Based Controls
  • Security Control Verification and Quality Control

1

Cybersecurity, Threat Intelligence and Reconnaissance

  • Setting up a Honeypot on Kali Linux
  • Using the iptables Command to Create a Personal Firewall in Linux
  • Using the hping Program
  • Scanning the Local Network
  • Performing Reconnaissance on a Network
  • Identifying Search Options in Metasploit
  • Making Syslog Entries Readable
  • Using nslookup for Passive Reconnaissance
2

Vulnerability and Cloud Security

  • Conducting Vulnerability Scanning Using Nessus
  • Using OWASP ZAP
  • Inspecting the Vulnerability in the Echo Server's Source Code
  • Performing Session Hijacking Using Burp Suite
  • Using Nikto
  • Performing Vulnerability Scanning Using OpenVAS
  • Exploiting a Website Using SQL Injection
  • Performing a MITM Attack
  • Detecting Rootkits
3

Security

  • Attacking a Website Using XSS Injection
  • Encrypting and Decrypting Messages Using Kleopatra
  • Encrypting and Decrypting a File Using AES Crypt
4

Security Operations, Incident Response and Indicators of Compromise

  • Downloading and Installing Wireshark
  • Configuring Snort
  • Simulating the DDoS Attack
  • Confirming the Spoofing Attack in Wireshark
  • Capturing a Packet Using Wireshark
  • Performing a Memory-Based Attack
  • Examining Audited Events
  • Enabling Logging for Audited Objects
5

Analysis, Risk management and Policy

  • Using the MD5 Hash Algorithm
  • Using Apktool to Decode and Analyze the apk file

Related Courses

All Courses
scroll to top