Computer Security

(NEIU-CS-260.AI2)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Security fundamentals

  • Module A: Security concepts
  • Module B: Understanding threats
  • Module C: Enterprise security strategy
  • Summary
2

Risk management

  • Module A: Risk management programs 
  • Module B: Security audits
  • Module C: Conducting security assessments
  • Summary
3

Organizational security

  • Module A: Social engineering 
  • Module B: Security policies 
  • Module C: User roles and training 
  • Summary
4

Cryptography

  • Module A: Cryptography concepts
  • Module B: Public key infrastructure
  • Summary
5

Authentication

  • Module A: Authentication factors
  • Module B: Authentication protocols
  • Summary
6

Secure assets

  • Module A: Physical security and safety 
  • Module B: Securing data
  • Summary
7

Securing specialized systems

  • Module A: Securing hosts
  • Module B: Mobile security
  • Summary
8

Secure applications

  • Module A: Application attacks
  • Module B: Securing applications
  • Summary
9

Risk Management and Privacy

  • Analyzing Risk
  • Managing Risk
  • Risk Tracking
  • Disaster Recovery Planning
  • Privacy
  • Summary
  • Exam Essentials

1

Risk management

  • Scanning the Network
  • Cracking a Linux Password Using John the Ripper
  • Cracking Passwords Using Rainbow Tables
  • Viewing Linux Event Logs
  • Viewing Windows Event Logs
2

Organizational security

  • Using Anti-phishing Tools
  • Enforcing Password Policies
  • Using Social Engineering Techniques to Plan an Attack
3

Cryptography

  • Creating Asymmetric Key Pairs
  • Observing an MD5-Generated Hash Value
  • Performing Steganography Using OpenStego
  • Using Symmetric Encryption
  • Creating File Hashes
  • Examining PKI Certificates
4

Authentication

  • Examining Kerberos Settings
  • Installing a RADIUS Server
  • Scheduling a Server Backup
  • Configuring a VPN
  • Configuring a Static TCP/IP Address
  • Tracing Packets Using Wireshark
5

Secure assets

  • Identifying Access Badge Areas
  • Implementing Physical Security
  • Using BitLocker in Windows 10
  • Encrypting Files with EFS
  • Assigning NTFS Permissions
6

Securing specialized systems

  • Configuring a Firewall
  • Clearing the DNS Cache
  • Spoofing a MAC Address with SMAC
  • Performing ARP Spoofing
  • Detecting Virtualization
7

Secure applications

  • Performing SQL Injection in DVWA
  • Exploiting an Overflow Vulnerability
  • Exploiting a TOCTOU Vulnerability
  • Examining Application Vulnerabilities

Related Courses

All Courses
scroll to top