CMGT430v9: Enterprise Security

(UOP-CMGT430v9.AE1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Cryptographic Tools and Techniques, and Security Solutions

  • The History of Cryptography
  • Cryptographic Services
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hybrid Encryption
  • Hashing
  • Digital Signatures
  • Public Key Infrastructure
  • Implementation of Cryptographic Solutions
  • Cryptographic Attacks
  • Advanced Network Design
  • TCP/IP
  • Secure Communication Solutions
  • Secure Facility Solutions
  • Secure Network Infrastructure Design
2

Host Security and Securing Virtualized, Distributed, and Shared Computing

  • Enterprise Security
  • Cloud Computing
  • Virtualization
  • Virtual LANs
  • Virtual Networking and Security Components
  • Enterprise Storage
  • Firewalls and Network Access Control
  • Host-Based Firewalls
  • Persistent Agent
  • Non-Persistent Agent
  • Agent-Based Technology
  • Agentless-Based Technology
  • Trusted Operating Systems
  • Endpoint Security Solutions
  • Anti-Malware
  • Host Hardening
  • Asset Management
  • Data Exfiltration
  • Intrusion Detection and Prevention
  • Network Management, Monitoring, and Security Tools
3

Application Security, Penetration Testing and Risk Management

  • Application Security Design Considerations
  • Specific Application Issues
  • Application Sandboxing
  • Application Security Frameworks
  • Software Assurance
  • Development Approaches
  • Secure Coding Standards
  • Documentation
  • Validation and Acceptance Testing
  • Application Exploits
  • Privilege Escalation
  • Improper Storage of Sensitive Data
  • Secure Cookie Storage and Transmission
  • Context-Aware Management
  • Malware Sandboxing
  • Pivoting
  • Open-Source Intelligence
  • Memory Dumping
  • Client-Side Processing vs. Server-Side Processing
  • Security Assessments and Penetration Testing
  • Red, Blue, and White Teaming
  • Vulnerability Assessment Areas
  • Security Assessment and Penetration Test Tools
  • Risk Terminology
  • Identifying Vulnerabilities
  • Operational Risks
  • The Risk Assessment Process
  • Best Practices for Risk Assessments
  • Summary
4

Policies, Procedures, and Incident Response, Security Research and Analysis

  • A High-Level View of Documentation
  • Business Documents Used to Support Security
  • Documents and Controls Used for Sensitive Information
  • Training and Awareness for Users
  • Auditing Requirements and Frequency
  • The Incident Response Framework
  • Incident and Emergency Response
  • Applying Research Methods to Determine Industry Trends and Their Impact on the Enterprise
  • Analyze Scenarios to Secure the Enterprise
5

Enterprise Security Integration and Security Controls for Communication and Collaboration

  • Integrate Enterprise Disciplines to Achieve Secure Solutions
  • Integrate Hosts, Storage, Networks, and Applications into a Secure Enterprise Architecture
  • Integrate Mobility Management
  • Selecting the Appropriate Control to Secure Communications and Collaboration Solutions
  • Integrate Advanced Authentication and Authorization Technologies to Support Enterprise Objectives
  • Implement Security Activities across the Technology Life Cycle
  • Physical Security Tools for Security Assessment
A

Appendix: 3D Avatar-based Simulation

1

Cryptographic Tools and Techniques, and Security Solutions

  • Using the MD Series Algorithm
  • Using the SHA Series Algorithm
  • Connecting to an SSH Server
  • Using Steganography
  • Installing Remote Access Server (RAS)
  • Observe an SHA256-Generated Hash Value
  • Spoofing MAC Address
  • Using Packet Filtering to Restrict Sites
  • Capturing the ICMP Packets with Wireshark
  • Attempting a Zone Transfer
  • Installing and Configuring AD DS
2

Host Security and Securing Virtualized, Distributed, and Shared Computing

  • Creating a Virtual Switch
  • Installing a Virtual Machine
  • Creating a Firewall Rule
  • Configuring Iptables
  • Testing an Antivirus Program
  • Using PuTTY
  • Running a Security Scanner to Identify Vulnerabilities
  • Bypassing Command Shell Restrictions
  • Using Netcat for Reverse Shell
3

Application Security, Penetration Testing and Risk Management

  • Attacking a Website using XSS Injection
  • Conducting Cross-site Request Forgery (CSRF or XSRF) Attacks
  • Using Exiftool
  • Using Burpsuite
  • Exploiting a Website Using SQL Injection
  • Performing ARP Poisoning
  • Scanning TCP Ports
  • Cracking a Password Using the John the Ripper Tool
  • Tracking Vulnerabilities in Software
  • Reviewing Security Policy
4

Policies, Procedures, and Incident Response, Security Research and Analysis

  • Using Netstat
  • Using TCPdump
  • Cracking Windows Password using Ophcrack
5

Enterprise Security Integration and Security Controls for Communication and Collaboration

  • Using the NetBus Application
  • Using Social Engineering Toolkit

Why Do Learners Love This Course?

amazing course I love the Labs

Amber R.
internet website rater

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top