SWD2110: Computer Security Fundamentals

(ANC-SWD2110.AB1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Computer Security, Networks, and the Internet

  • Introduction to Computer Security
  • How Seriously Should You Take Threats to Network Security?
  • Identifying Types of Threats
  • Assessing the Likelihood of an Attack on Your Network
  • Basic Security Terminology
  • Concepts and Approaches
  • How Do Legal Issues Impact Network Security?
  • Online Security Resources
  • Introduction - Networks and the Internet
  • Network Basics
  • How the Internet Works
  • History of the Internet
  • Basic Network Utilities
  • Other Network Devices
  • Advanced Network Communications Topics
2

Denial of Service Attacks, Malware, Techniques Used By Hackers

  • Introduction - Denial of Service Attacks
  • DoS Attacks
  • Illustrating an Attack
  • Common Tools Used for DoS Attacks
  • DoS Weaknesses
  • Specific DoS Attacks
  • Real-World Examples of DoS Attacks
  • How to Defend Against DoS Attacks
  • Introduction - Malware
  • Viruses
  • Trojan Horses
  • The Buffer-Overflow Attack
  • Spyware
  • Other Forms of Malware
  • Detecting and Eliminating Viruses and Spyware
  • Introduction - Techniques Used By Hackers
  • Basic Terminology
  • The Reconnaissance Phase
  • Actual Attacks
  • Malware Creation
  • Penetration Testing
  • The Dark Web
3

Encryption

  • Introduction
  • Cryptography Basics
  • History of Encryption
  • Modern Cryptography Methods
  • Public Key (Asymmetric) Encryption
  • PGP
  • Legitimate Versus Fraudulent Encryption Methods
  • Digital Signatures
  • Hashing
  • MAC and HMAC
  • Steganography
  • Cryptanalysis
  • Cryptography Used on the Internet
  • Quantum Computing Cryptography
4

Computer Security Technology and Policies

  • Introduction - Computer Security Technology
  • Virus Scanners
  • Firewalls
  • Antispyware
  • IDSs
  • Digital Certificates
  • SSL/TLS
  • Virtual Private Networks
  • Wi-Fi Security
  • Introduction - Security Policies
  • What Is a Policy?
  • Defining User Policies
  • Defining System Administration Policies
  • Defining Access Control
  • Development Policies
  • Standards, Guidelines, and Procedures
  • Disaster Recovery
  • Important Laws
5

Forensics and Cybersecurity Engineering

  • Introduction to Forensics
  • General Guidelines
  • Finding Evidence on the PC
  • Finding Evidence in System Logs
  • Getting Back Deleted Files
  • Operating System Utilities
  • The Windows Registry
  • Mobile Forensics: Cell Phone Concepts
  • The Need for Forensic Certification
  • Expert Witnesses
  • Additional Types of Forensics
  • Introduction - Cybersecurity Engineering
  • Defining Cybersecurity Engineering
  • SecML

1

Computer Security, Networks, and the Internet

  • Using nslookup for Passive Reconnaissance
  • Using tracert
2

Denial of Service Attacks, Malware, Techniques Used By Hackers

  • Performing DoS Attacks with a SYN Flood
  • Protecting from the DOS Attack
  • Exploiting the Cross-site Request Forgery (CSRF or XSRF) Attacks
  • Exploiting a Website using SQL Injection
3

Encryption

  • Creating PGP Certification
  • Observing the SHA-Generated Hash Value
4

Computer Security Technology and Policies

  • Configuring Iptables to Block ICMP Packets
  • Creating a Policy for Restricting Installations
5

Forensics and Cybersecurity Engineering

  • Observing the Security Event log
  • Using openfiles and net sessions
  • Exporting the Registry Keys

Related Courses

All Courses
scroll to top