ITE 520 - Cybersecurity Foundations

(ATHNS-ITE520.AB1)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Cryptography

  • Basic Encryption
  • Symmetric Key Cryptography
  • Asymmetric Key Cryptography
  • Certificate Authorities and Key Management
  • Cryptographic Hashing
  • PGP and S/MIME
  • Disk and File Encryption
  • Summary
2

Malware

  • Malware Types
  • Malware Analysis
  • Creating Malware
  • Malware Infrastructure
  • Antivirus Solutions
  • Persistence
  • Summary
3

Security Foundations

  • The Triad
  • Information Assurance and Risk
  • Policies, Standards, and Procedures
  • Organizing Your Protections
  • Security Technology
  • Being Prepared
  • Summary
4

Social Engineering

  • Social Engineering
  • Physical Social Engineering
  • Phishing Attacks
  • Social Engineering for Social Networking
  • Website Attacks
  • Wireless Social Engineering
  • Automating Social Engineering
  • Summary
5

Digital Signatures

  • Digital Signatures
  • Elgamal Digital Signature Scheme
  • Schnorr Digital Signature Scheme
  • Nist Digital Signature Algorithm
  • Elliptic Curve Digital Signature Algorithm
  • RSA-PSS Digital Signature Algorithm
6

User Authentication

  • Remote User-Authentication Principles
  • Remote User-Authentication Using Symmetric Encryption
  • Kerberos
  • Remote User-Authentication Using Asymmetric Encryption
  • Federated Identity Management
7

Transport-Level Security

  • Web Security Considerations
  • Transport Layer Security
  • HTTPS
  • Secure Shell (SSH)
8

Wireless Network Security

  • Wireless Security
  • Mobile Device Security
  • IEEE 802.11 Wireless LAN Overview
  • IEEE 802.11i Wireless LAN Security
9

Electronic Mail Security

  • Internet Mail Architecture
  • Email Formats
  • Email Threats and Comprehensive Email Security
  • S/MIME
  • DNSSEC
  • DNS-Based Authentication of Named Entities
  • Sender Policy Framework
  • Domainkeys Identified Mail
  • Domain-Based Message Authentication, Reporting, and Conformance
10

IP Security

  • IP Security Overview
  • IP Security Policy
  • Encapsulating Security Payload
  • Combining Security Associations
  • Internet Key Exchange
11

Network Endpoint Security

  • Firewalls
  • Intrusion Detection Systems
  • Malicious Software
  • Distributed Denial of Service Attacks
12

Cloud Security

  • Cloud Computing
  • Cloud Security Concepts
  • Cloud Security Risks and Countermeasures
  • Cloud Security as a Service
  • An Open-Source Cloud Security Module
13

Internet of Things (IoT) Security

  • The Internet of Things
  • IoT Security Concepts and Objectives
  • An Open-Source IoT Security Module

1

Cryptography

  • Performing Symmetric Encryption
  • Examining Asymmetric Encryption
  • Using OpenSSL to Create a Public/Private Key Pair
  • Observing an SHA-Generated Hash Value
  • Creating PGP Certification
2

Malware

  • Observing an MD5-Generated Hash Value
  • Using the msfvenom Program
  • Scanning Malware Using Antivirus
3

Security Foundations

  • Creating a Personal Linux Firewall Using iptables
  • Viewing Syslog for Monitoring Logs
  • Using Event Viewer
  • Configuring Audit Policies in Windows
4

Social Engineering

  • Detecting a Phishing Site Using Netcraft
  • Using the SET Tool to Plan an Attack
5

Digital Signatures

  • Installing GPG4win on Windows Server
  • Using OpenSSL to Create a Public/Private Key Pair
6

User Authentication

  • Examining Kerberos Settings
  • Installing the AD FS Role
7

Transport-Level Security

  • Simulating a DoS Attack
  • Configuring an SSH Server
8

Wireless Network Security

  • Configuring Wi-Fi Security Settings
  • Creating a Network Policy for 802.1X
9

Electronic Mail Security

  • Performing a Phishing Attack
  • Configuring DNSSEC
10

IP Security

  • Adding Revision to the Revision History
  • Viewing and Downloading the Policy Templates
  • Opening the Policy Template and Setting the Company Name
  • Reviewing and Modifying the Policy Items
11

Network Endpoint Security

  • Configuring Windows Defender Firewall
  • Performing Intrusion Detection
  • Performing a DDoS Attack Using cmd
12

Internet of Things (IoT) Security

  • Creating an Azure IoT Central Application

Related Courses

All Courses
scroll to top