CMGTDA/433 Cyber Security

(UOP-CMGTDA-433.AE1)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Competency 1: Cyber Threat Intelligence

  • Cybersecurity Objectives
  • Privacy vs. Security
  • Evaluating Security Risks
  • Building a Secure Network
  • Secure Endpoint Management
  • Penetration Testing
  • Reverse Engineering
  • The Future of Cybersecurity Analytics
  • Threat Data and Intelligence
  • Threat Classification
  • Attack Frameworks
  • Applying Threat Intelligence Organizationwide
  • Mapping and Enumeration
  • Passive Footprinting
  • Gathering Organizational Intelligence
  • Detecting, Preventing, and Responding to Reconnaissance
  • Identifying Vulnerability Management Requirements
  • Configuring and Executing Vulnerability Scans
  • Developing a Remediation Workflow
  • Overcoming Risks of Vulnerability Scanning
  • Vulnerability Scanning Tools
  • Reviewing and Interpreting Scan Reports
  • Validating Scan Results
  • Common Vulnerabilities
  • Understanding Cloud Environments
  • Operating in the Cloud
  • Cloud Infrastructure Security
2

Competency 2: Access Controls

  • Understanding Defense-in-Depth
  • Improving Security by Improving Controls
  • Analyzing Security Architecture
  • Understanding Identity
  • Threats to Identity and Access
  • Identity as a Security Layer
  • Federation and Single Sign-On
  • Software Assurance Best Practices
  • Designing and Coding for Security
  • Software Security Testing
  • Hardware Assurance Best Practices
  • Security Monitoring
  • Security Incidents
  • Phases of Incident Response
  • Building the Foundation for Incident Response
  • Creating an Incident Response Team
  • Coordination and Information Sharing
  • Classifying Incidents
  • Analyzing Network Events
  • Investigating Host-Related Issues
  • Investigating Service and Application-Related Issues
3

Competency 3: Security Policies

  • Building a Forensics Capability
  • Understanding Forensic Software
  • Conducting Endpoint Forensics
  • Network Forensics
  • Cloud, Virtual, and Container Forensics
  • Conducting a Forensic Investigation
  • Forensic Investigation: An Example
  • Containing the Damage
  • Incident Eradication and Recovery
  • Wrapping Up the Response
  • Analyzing Risk
  • Managing Risk
  • Security Controls
  • Understanding Policy Documents
  • Complying with Laws and Regulations
  • Adopting a Standard Framework
  • Implementing Policy-Based Controls
  • Security Control Verification and Quality Control

1

Competency 1: Cyber Threat Intelligence

  • Setting up a Honeypot on Kali Linux
  • Using the iptables Command to Create a Personal Firewall in Linux
  • Using the hping Program
  • Scanning the Local Network
  • Performing Reconnaissance on a Network
  • Identifying Search Options in Metasploit
  • Making Syslog Entries Readable
  • Using nslookup for Passive Reconnaissance
  • Conducting Vulnerability Scanning Using Nessus
  • Using OWASP ZAP
  • Inspecting the Vulnerability in the Echo Server's Source Code
  • Performing Session Hijacking Using Burp Suite
  • Using Nikto
  • Performing Vulnerability Scanning Using OpenVAS
  • Attacking a Website Using XSS Injection
  • Exploiting a Website Using SQL Injection
  • Performing a MITM Attack
  • Detecting Rootkits
2

Competency 2: Access Controls

  • Encrypting and Decrypting Messages Using Kleopatra
  • Encrypting and Decrypting a File Using AES Crypt
  • Downloading and Installing Wireshark
  • Configuring Snort
  • Simulating the DDoS Attack
  • Confirming the Spoofing Attack in Wireshark
  • Capturing a Packet Using Wireshark
  • Performing a Memory-Based Attack
  • Examining Audited Events
  • Enabling Logging for Audited Objects
3

Competency 3: Security Policies

  • Using the MD5 Hash Algorithm
  • Using Apktool to Decode and Analyze the apk file

Related Courses

All Courses
scroll to top