CYB-310 Security Fundamentals

(AIUS-CYB-310-V2.AI2)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Security Basics, Risk Management and Organizational Security

  • Module A: Security concepts
  • Module B: Understanding threats
  • Module C: Enterprise security strategy
  • Module D: Risk management programs
  • Module E: Security audits
  • Module F: Conducting security assessments
  • Module G: Social engineering
  • Module H: Security policies
  • Module I: User roles and training
2

Cryptography and Network Connectivity

  • Module A: Cryptography concepts
  • Module B: Public key infrastructure
  • Module C: Network attacks
  • Module D: Packet flow
3

Secure Network Configuration, Authentication and Access Control

  • Module A: Network security components
  • Module B: Secure network protocols
  • Module C: Hardening networks
  • Module D: Authentication factors
  • Module E: Authentication protocols
  • Module F: Access control principles
  • Module G: Account management
4

Enterprise architecture, Secure Assets and Securing Specialized Systems

  • Module A: System vulnerabilities
  • Module B: System architecture
  • Module C: Physical security and safety
  • Module D: Securing data
  • Module E: Securing hosts
  • Module F: Mobile security
5

Secure Applications, Disaster Recovery and Threat Detection and Response

  • Module A: Application attacks
  • Module B: Securing applications
  • Module C: Secure operations
  • Module D: Resilience and recovery
  • Module E: Security monitoring
  • Module F: Incident response procedures

1

Security Basics, Risk Management and Organizational Security

  • Gathering Site Information
  • Using the theHarvester Tool
  • Cracking a Linux Password Using John the Ripper
  • Footprinting a Website
  • Using Anti-phishing Tools
  • Using Social Engineering Techniques to Plan an Attack
2

Cryptography and Network Connectivity

  • Creating Asymmetric Key Pairs
  • Observing an MD5-Generated Hash Value
  • Performing Steganography Using OpenStego
  • Using Symmetric Encryption
  • Creating File Hashes
  • Examining PKI Certificates
  • Creating Certificates with OpenSSL
  • Spoofing a MAC Address with SMAC
  • Cracking Passwords Using Rainbow Tables
  • Cracking Passwords
  • Capturing Credentials On-path
  • Launching a DoS Attack
  • Configuring a Network Firewall
  • Using Uncomplicated Firewall in Linux
3

Secure Network Configuration, Authentication and Access Control

  • Securing a Wi-Fi Hotspot
  • Binding a Site Using IIS
  • Configuring a VPN
  • Requesting PKI Certificates
  • Scanning the Network
  • Examining Active Directory Objects
  • Examining Kerberos Settings
  • Installing a RADIUS Server
  • Creating Linux Users and Groups
  • Enforcing Password Policies
  • Delegating Control in Active Directory
  • Creating a Windows Domain User
4

Enterprise architecture, Secure Assets and Securing Specialized Systems

  • Examining Spyware
  • Detecting Virtualization
  • Identifying Access Badge Areas
  • Implementing Physical Security
  • Using BitLocker in Windows 10
  • Encrypting Files with EFS
  • Assigning NTFS Permissions
  • Creating a Security Template
  • Enforcing a Security Template
5

Secure Applications, Disaster Recovery and Threat Detection and Response

  • Performing an XSS Attack in DVWA
  • Performing SQL Injection in DVWA
  • Exploiting an Overflow Vulnerability
  • Exploiting a TOCTOU Vulnerability
  • Examining Application Vulnerabilities
  • Scheduling a Server Backup
  • Viewing Linux Event Logs
  • Viewing Windows Event Logs

Related Courses

All Courses
scroll to top