Introduction to Cyber Security

(HM-CYSEC2305.AE1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Securing the Infrastructure

  • Security Challenges
  • A Quick Primer on Infrastructure Security
  • Access Control
  • Security Policies
  • Physical Security Controls
  • Access-Control Gates
  • Authentication Systems
  • Remote-Access Monitoring
  • Video Surveillance Systems
  • Intrusion-Detection and Reporting Systems
  • Hands-On Exercises 1A
  • Hands-On Exercises 1B
  • Hands-On Exercises 1C
  • Security Challenge Scenarios
  • Review Questions
2

Securing Local Hosts

  • Security Challenges
  • The Three Layers of Security
  • Securing Host Devices
  • The Inner Perimeter
  • Protecting Local Computing Devices
  • Implementing Local Protection Tools
  • Using Local Intrusion-Detection Tools
  • Configuring Browser Security Options
  • Defending Against Malicious Software
  • Hardening Operating Systems
  • Overseeing Application Software Security
  • Applying Software Updates and Patches
  • Hands-On Exercises 2A
  • Hands-On Exercises 2B
  • Hands-On Exercises 2C
  • Security Challenge Scenarios
  • Review Questions
3

Networking Basics, Protocols, and Servers

  • Security Challenges
  • Understanding the Basics of Networking
  • The OSI Networking Model
  • Data Transmission Packets
  • OSI Layer Security
  • Network Topologies
  • Logical Topologies
  • The Basics of Networking Protocols
  • Network Control Strategies
  • The Basics of Network Servers
  • Hands-On Exercises 3A
  • Hands-On Exercises 3B
  • Hands-On Exercises 3C
4

Network Connectivity Devices and Transmission Media Security

  • Network Switches
  • Routers
  • Gateways
  • Network Bridges
  • Wireless Network Connectivity
  • The Basics of Network Transmission MEDIA
  • Transmission Media Vulnerabilities
  • Hands-On Exercises 4A
  • Hands-On Exercises 4B
  • Security Challenge Scenarios
5

Understanding the Environment and Hiding the Private Network

  • Security Challenges
  • The Basics of Internet Security
  • Understanding the Environment
  • Understanding Private Networks
  • Hands-On Exercises 5A
  • Hands-On Exercises 5B
6

Protecting the Perimeter and Moving Data

  • Understanding the Perimeter
  • Firewalls
  • Network Appliances
  • Proxy Servers
  • Demilitarized Zones (DMZs)
  • Honeypots
  • Extranets
  • Securing Data in Motion
  • Cryptography
  • Hands-On Exercises 6A
  • Hands-On Exercises 6B
7

Tools and Utilities and Defending against Vulnerabilities

  • Using Basic Tools
  • Monitoring Tools and Software
  • Zero Day Vulnerabilities
  • Software Exploits
  • Social Engineering Exploits
  • Network Threats and Attacks
  • Dictionary Attacks
  • Denial of Service (DoS) Attacks
  • Spam
  • Other Exploits
  • Hands-On Exercises 7A
  • Hands-On Exercises 7B
  • Security Scenario Review
  • Review Questions
A

Appendix A: NIST Preliminary Cybersecurity Framework

  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

1

Securing Local Hosts

  • Converting a FAT32 Partition to NTFS Using Disk Management
  • Converting a FAT32 Partition to NTFS Using PowerShell
  • Converting a FAT32 Partition to FAT Using Disk Management
  • Establishing a VPN Connection
  • Configuring Inbound Rules for Firewall
  • Establishing Lockout Policies
  • Configuring Auditing in Windows
  • Using BitLocker Data Encryption Tools
  • Configuring Firewall Settings
  • Encrypting and Decrypting a File Using AES Crypt
  • Creating Folder Permissions
  • Using Microsoft File Encryption Tools
  • Configuring Application Control Policy
  • Establishing User and Group Account
  • Enabling Event Logging
  • Knowing Filesystem in Linux
  • Configuring Share Permissions
  • Adding a Printer
  • Observing the Impact of Moving an Encrypted File
  • Setting Password Policies
  • Capturing the Network Traffic Using Wireshark
  • Creating a TCP Outbound Rule
  • Creating an ICMP Outbound Rule
2

Networking Basics, Protocols, and Servers

  • Configuring File and Share Permissions
  • Assigning File or Folder Permissions
  • Using the PING Command
  • Configuring Advanced Permissions
  • Using the nbtstat and tracert Utilities
  • Using the arp and netstat Utilities
  • Modifying the Command Prompt Window
  • Knowing MAC, IPv4, and IPv6 addresses
  • Adding a Loopback Adapter and Class A/B/C IPv4 Addresses
  • Monitoring the Denial of Service (DoS) Attack
  • Viewing the Application, Security, and System Logs
  • Scanning Vulnerabilities Using Microsoft Baseline Security Analyzer
  • Adding Users or Groups in a Linux Distribution
3

Understanding the Environment and Hiding the Private Network

  • Examining Browsing History Options
  • Configuring Pop-up Blocker Settings
  • Accessing the Security Settings in Internet Explorer
  • Adding a Site to a Security Zone
  • Creating a Virtual Switch
  • Checking Hyper-V Compatibility
  • Enabling Hyper-V in Windows
  • Pinning Hyper-V Manager to the Taskbar
  • Installing a Linux Distribution in Hyper-V
4

Protecting the Perimeter and Moving Data

  • Using MD5 Hash Algorithms
5

Tools and Utilities and Defending against Vulnerabilities

  • Using the nslookup and tracert Utilities
  • Capturing Packet Using Wireshark
  • Scanning Network Using Nmap
  • Using the ipconfig and ping Commands
  • Creating a New Software Restriction Policy

Related Courses

All Courses
scroll to top