CYB-310 Security Fundamentals

(AIUS-CYB-310-V2.AI)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Introduction

2

Security fundamentals

  • Module A: Security concepts
  • Module B: Understanding threats
  • Module C: Enterprise security strategy
  • Summary
3

Risk management

  • Module A: Risk management programs 
  • Module B: Security audits
  • Module C: Conducting security assessments
  • Summary
4

Organizational security

  • Module A: Social engineering 
  • Module B: Security policies 
  • Module C: User roles and training 
  • Summary
5

Cryptography

  • Module A: Cryptography concepts
  • Module B: Public key infrastructure
  • Summary
6

Network connectivity

  • Module A: Network attacks
  • Module B: Packet flow
  • Summary
7

Secure network configuration

  • Module A: Network security components
  • Module B: Secure network protocols
  • Module C: Hardening networks
  • Summary
8

Authentication

  • Module A: Authentication factors
  • Module B: Authentication protocols
  • Summary
9

Access control

  • Module A: Access control principles
  • Module B: Account management
  • Summary
10

Enterprise architecture

  • Module A: System vulnerabilities
  • Module B: System architecture
  • Summary
11

Secure assets

  • Module A: Physical security and safety 
  • Module B: Securing data
  • Summary
12

Securing specialized systems

  • Module A: Securing hosts
  • Module B: Mobile security
  • Summary
13

Secure applications

  • Module A: Application attacks
  • Module B: Securing applications
  • Summary
14

Disaster planning and recovery

  • Module A: Secure operations
  • Module B: Resilience and recovery
  • Summary
15

Threat detection and response

  • Module A: Security monitoring
  • Module B: Incident response procedures
  • Summary

1

Risk management

  • Gathering Site Information
  • Footprinting a Website
2

Organizational security

  • Using Anti-phishing Tools
3

Cryptography

  • Creating File Hashes
  • Creating Asymmetric Key Pairs
  • Using Symmetric Encryption
  • Creating Certificates with OpenSSL
  • Examining PKI Certificates
4

Network connectivity

  • Cracking Passwords
  • Capturing Credentials On-path
  • Launching a DoS Attack
  • Configuring a Network Firewall
  • Using Uncomplicated Firewall in Linux
5

Secure network configuration

  • Securing a Wi-Fi Hotspot
  • Requesting PKI Certificates
  • Scanning the Network
6

Authentication

  • Examining Active Directory Objects
  • Examining Kerberos Settings
  • Installing a RADIUS Server
7

Access control

  • Creating Linux Users and Groups
  • Creating a Windows Domain User
  • Enforcing Password Policies
  • Delegating Control in Active Directory
8

Enterprise architecture

  • Examining Spyware
  • Detecting Virtualization
9

Secure assets

  • Assigning NTFS Permissions
10

Securing specialized systems

  • Enforcing a Security Template
  • Creating a Security Template
11

Secure applications

  • Performing an XSS Attack in DVWA
  • Performing SQL Injection in DVWA
  • Exploiting a TOCTOU Vulnerability
  • Exploiting an Overflow Vulnerability
  • Examining Application Vulnerabilities
12

Disaster planning and recovery

  • Scheduling a Server Backup
13

Threat detection and response

  • Viewing Linux Event Logs
  • Viewing Windows Event Logs

Related Courses

All Courses
scroll to top