ITE 520 - Cybersecurity Foundations

(ATHNS-ITE520.AB1)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Cryptography

  • Basic Encryption
  • Symmetric Key Cryptography
  • Asymmetric Key Cryptography
  • Certificate Authorities and Key Management
  • Cryptographic Hashing
  • PGP and S/MIME
  • Disk and File Encryption
  • Summary
2

Malware

  • Malware Types
  • Malware Analysis
  • Creating Malware
  • Malware Infrastructure
  • Antivirus Solutions
  • Persistence
  • Summary
3

Security Foundations

  • The Triad
  • Information Assurance and Risk
  • Policies, Standards, and Procedures
  • Organizing Your Protections
  • Security Technology
  • Being Prepared
  • Summary
4

Social Engineering

  • Social Engineering
  • Physical Social Engineering
  • Phishing Attacks
  • Social Engineering for Social Networking
  • Website Attacks
  • Wireless Social Engineering
  • Automating Social Engineering
  • Summary
5

Digital Signatures

  • Digital Signatures
  • Elgamal Digital Signature Scheme
  • Schnorr Digital Signature Scheme
  • Nist Digital Signature Algorithm
  • Elliptic Curve Digital Signature Algorithm
  • RSA-PSS Digital Signature Algorithm
6

User Authentication

  • Remote User-Authentication Principles
  • Remote User-Authentication Using Symmetric Encryption
  • Kerberos
  • Remote User-Authentication Using Asymmetric Encryption
  • Federated Identity Management
7

Transport-Level Security

  • Web Security Considerations
  • Transport Layer Security
  • HTTPS
  • Secure Shell (SSH)
8

Wireless Network Security

  • Wireless Security
  • Mobile Device Security
  • IEEE 802.11 Wireless LAN Overview
  • IEEE 802.11i Wireless LAN Security
9

Electronic Mail Security

  • Internet Mail Architecture
  • Email Formats
  • Email Threats and Comprehensive Email Security
  • S/MIME
  • DNSSEC
  • DNS-Based Authentication of Named Entities
  • Sender Policy Framework
  • Domainkeys Identified Mail
  • Domain-Based Message Authentication, Reporting, and Conformance
10

IP Security

  • IP Security Overview
  • IP Security Policy
  • Encapsulating Security Payload
  • Combining Security Associations
  • Internet Key Exchange
11

Network Endpoint Security

  • Firewalls
  • Intrusion Detection Systems
  • Malicious Software
  • Distributed Denial of Service Attacks
12

Cloud Security

  • Cloud Computing
  • Cloud Security Concepts
  • Cloud Security Risks and Countermeasures
  • Cloud Security as a Service
  • An Open-Source Cloud Security Module
13

Internet of Things (IoT) Security

  • The Internet of Things
  • IoT Security Concepts and Objectives
  • An Open-Source IoT Security Module

1

Cryptography

  • Performing Symmetric Encryption
  • Examining Asymmetric Encryption
  • Using OpenSSL to Create a Public/Private Key Pair
  • Observing an SHA-Generated Hash Value
  • Creating PGP Certification
2

Malware

  • Observing an MD5-Generated Hash Value
  • Using the msfvenom Program
  • Scanning Malware Using Antivirus
3

Security Foundations

  • Creating a Personal Linux Firewall Using iptables
  • Viewing Syslog for Monitoring Logs
  • Using Event Viewer
  • Configuring Audit Policies in Windows
4

Social Engineering

  • Detecting a Phishing Site Using Netcraft
  • Using the SET Tool to Plan an Attack
5

Digital Signatures

  • Installing GPG4win on Windows Server
  • Using OpenSSL to Create a Public/Private Key Pair
6

User Authentication

  • Examining Kerberos Settings
  • Installing the AD FS Role
7

Transport-Level Security

  • Simulating a DoS Attack
  • Configuring an SSH Server
8

Wireless Network Security

  • Configuring Wi-Fi Security Settings
  • Creating a Network Policy for 802.1X
9

Electronic Mail Security

  • Performing a Phishing Attack
  • Configuring DNSSEC
10

IP Security

  • Adding Revision to the Revision History
  • Viewing and Downloading the Policy Templates
  • Opening the Policy Template and Setting the Company Name
  • Reviewing and Modifying the Policy Items
11

Network Endpoint Security

  • Configuring Windows Defender Firewall
  • Performing Intrusion Detection
  • Performing a DDoS Attack Using cmd
12

Internet of Things (IoT) Security

  • Creating an Azure IoT Central Application

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top