Cybersecurity and Network Defense

(MTHDU-CYBNET.AB1)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Introduction

2

Understanding Cybersecurity Policy and Governance

  • Information Security vs. Cybersecurity Policies
  • Looking at Policy Through the Ages
  • Cybersecurity Policy
  • Cybersecurity Policy Life Cycle
  • Summary
3

Cybersecurity Policy Organization, Format, and Styles

  • Policy Hierarchy
  • Writing Style and Technique
  • Policy Format
  • Summary
4

Cybersecurity Framework

  • Confidentiality, Integrity, and Availability
  • NIST's Cybersecurity Framework
  • Summary
5

Governance and Risk Management

  • Understanding Cybersecurity Policies
  • Cybersecurity Risk
  • Summary
6

Asset Management and Data Loss Prevention

  • Information Assets and Systems
  • Information Classification
  • Labeling and Handling Standards
  • Information Systems Inventory
  • Understanding Data Loss Prevention Technologies
  • Summary
7

Human Resources Security

  • The Employee Life Cycle
  • The Importance of Employee Agreements
  • The Importance of Security Education and Training
  • Summary
8

Physical and Environmental Security

  • Understanding the Secure Facility Layered Defense Model
  • Protecting Equipment
  • Summary
9

Communications and Operations Security

  • Standard Operating Procedures
  • Operational Change Control
  • Malware Protection
  • Data Replication
  • Secure Messaging
  • Activity Monitoring and Log Analysis
  • Service Provider Oversight
  • Threat Intelligence and Information Sharing
  • Summary
10

Access Control Management

  • Access Control Fundamentals
  • Infrastructure Access Controls
  • User Access Controls
  • Summary
11

Information Systems Acquisition, Development, and Maintenance

  • System Security Requirements
  • Secure Code
  • Cryptography
  • Summary
12

Cybersecurity Incident Response

  • Incident Response
  • What Happened? Investigation and Evidence Handling
  • Data Breach Notification Requirements
  • Summary
13

Business Continuity Management

  • Emergency Preparedness
  • Business Continuity Risk Management
  • The Business Continuity Plan
  • Plan Testing and Maintenance
  • Summary
14

Regulatory Compliance for Financial Institutions

  • The Gramm-Leach-Bliley Act
  • New York's Department of Financial Services Cybersecurity Regulation (23 NYCRR Part 500)
  • What Is a Regulatory Examination?
  • Personal and Corporate Identity Theft
  • Summary
15

Regulatory Compliance for the Health-Care Sector

  • The HIPAA Security Rule
  • The HITECH Act and the Omnibus Rule
  • Understanding the HIPAA Compliance Enforcement Process
  • Summary
16

PCI Compliance for Merchants

  • Protecting Cardholder Data
  • PCI Compliance
  • Summary
17

NIST Cybersecurity Framework

  • Introducing the NIST Cybersecurity Framework Components
  • The Framework Core
  • Framework Implementation Tiers ("Tiers")
  • NIST's Recommended Steps to Establish or Improve a Cybersecurity Program
  • NIST's Cybersecurity Framework Reference Tool
  • Adopting the NIST Cybersecurity Framework in Real Life
  • Summary
A

Appendix A: Cybersecurity Program Resources

19

Introduction to Network Security

  • Introduction
  • The Basics of a Network
  • Basic Network Utilities
  • The OSI Model
  • What Does This Mean for Security?
  • Assessing Likely Threats to the Network
  • Classifications of Threats
  • Likely Attacks
  • Threat Assessment
  • Understanding Security Terminology
  • Choosing a Network Security Approach
  • Network Security and the Law
  • Using Security Resources
  • Summary
  • Test Your Skills
20

Types of Attacks

  • Introduction
  • Understanding Denial of Service Attacks
  • Defending Against Buffer Overflow Attacks
  • Defending Against IP Spoofing
  • Defending Against Session Hijacking
  • Blocking Virus and Trojan Horse Attacks
  • Summary
  • Test Your Skills
21

Fundamentals of Firewalls

  • Introduction
  • What Is a Firewall?
  • Implementing Firewalls
  • Selecting and Using a Firewall
  • Using Proxy Servers
  • Summary
  • Test Your Skills
22

Firewall Practical Applications

  • Introduction
  • Using Single Machine Firewalls
  • Windows 10 Firewall
  • User Account Control
  • Linux Firewalls
  • Using Small Office/Home Office Firewalls
  • Using Medium-Sized Network Firewalls
  • Using Enterprise Firewalls
  • Summary
  • Test Your Skills
23

Intrusion-Detection Systems

  • Introduction
  • Understanding IDS Concepts
  • IDS Components and Processes
  • Understanding and Implementing IDSs
  • Understanding and Implementing Honeypots
  • Summary
  • Test Your Skills
24

Encryption Fundamentals

  • Introduction
  • The History of Encryption
  • Learning About Modern Encryption Methods
  • Identifying Good Encryption
  • Understanding Digital Signatures and Certificates
  • Understanding and Using Decryption
  • Cracking Passwords
  • Steganography
  • Steganalysis
  • Quantum Computing and Quantum Cryptography
  • Summary
  • Test Your Skills
25

Virtual Private Networks

  • Introduction
  • Basic VPN Technology
  • Using VPN Protocols for VPN Encryption
  • IPSec
  • SSL/TLS
  • Implementing VPN Solutions
  • Summary
  • Test Your Skills
26

Operating System Hardening

  • Introduction
  • Configuring Windows Properly
  • Configuring Linux Properly
  • Patching the Operating System
  • Configuring Browsers
  • Summary
  • Test Your Skills
27

Defending Against Virus Attacks

  • Introduction
  • Understanding Virus Attacks
  • Virus Scanners
  • Antivirus Policies and Procedures
  • Additional Methods for Defending Your System
  • What to Do If Your System Is Infected by a Virus
  • Summary
  • Test Your Skills
28

Defending against Trojan Horses, Spyware, and Adware

  • Introduction
  • Trojan Horses
  • Spyware and Adware
  • Summary
  • Test Your Skills
29

Security Policies

  • Introduction
  • Defining User Policies
  • Defining System Administration Policies
  • Defining Access Control
  • Defining Developmental Policies
  • Summary
  • Test Your Skills
  • Projects
30

Assessing System Security

  • Introduction
  • Risk Assessment Concepts
  • Evaluating the Security Risk
  • Conducting the Initial Assessment
  • Probing the Network
  • Vulnerabilities
  • McCumber Cube
  • Security Documentation
  • Summary
  • Test Your Skills
31

Security Standards

  • Introduction
  • COBIT
  • ISO Standards
  • NIST Standards
  • U.S. DoD Standards
  • Using the Orange Book
  • Using the Rainbow Series
  • Using the Common Criteria
  • Using Security Models
  • U.S. Federal Regulations, Guidelines, and Standards
  • Summary
  • Test Your Skills
32

Physical Security and Disaster Recovery

  • Introduction
  • Physical Security
  • Disaster Recovery
  • Ensuring Fault Tolerance
  • Summary
  • Test Your Skills
33

Techniques Used by Attackers

  • Introduction
  • Preparing to Hack
  • The Attack Phase
  • Wi-Fi Hacking
  • Summary
  • Test Your Skills
34

Introduction to Forensics

  • Introduction
  • General Forensics Guidelines
  • FBI Forensics Guidelines
  • Finding Evidence on the PC
  • Gathering Evidence from a Cell Phone
  • Forensic Tools to Use
  • Forensic Science
  • To Certify or Not to Certify?
  • Summary
  • Test Your Skills
35

Cyber Terrorism

  • Introduction
  • Defending Against Computer-Based Espionage
  • Defending Against Computer-Based Terrorism
  • Choosing Defense Strategies
  • Summary
  • Test Your Skills

1

Introduction to Network Security

  • Assigning Different Classes of IP Addresses
  • Viewing the MAC Address on Different Interfaces
  • Understanding Protocols
  • Tracing Route Using tracert
  • Using the netstat Command
2

Types of Attacks

  • Conducting a DoS Attack Using a SYN Flood
  • Conducting a DoS Attack Using the Smurf Attack
  • Defending Against a Buffer Overflow Attack
  • Defending against IP Spoofing
  • Performing Session Hijacking Using Burp Suite
  • Installing Antivirus Software
  • Scanning and Classifying Different Types of Viruses
3

Fundamentals of Firewalls

  • Creating ACL in the Router
  • Using Windows Firewall
  • Creating a DMZ Zone
4

Firewall Practical Applications

  • Configuring User Access Control Settings
  • Configuring a Linux Firewall Using the Iptable
  • Using the Cisco ASA Firewall
5

Intrusion-Detection Systems

  • Intercepting Packets
  • Configuring Snort
  • Setting Up a Honeypot
6

Encryption Fundamentals

  • Using a Symmetric Algorithm
  • Using an Asymmetric Algorithm
  • Observing a Digital Certificate
  • Creating a PGP Certification
  • Using the John the Ripper Tool
  • Using Rainbow Tables
  • Hiding Text Using Steganography
7

Virtual Private Networks

  • Setting Up a VPN Server with Windows Server 2016
  • Creating an L2TP VPN Using Openswan
  • Configuring IPSec
8

Operating System Hardening

  • Configuring a User Account
  • Setting Security Policies
  • Using Registry Editor
  • Configuring the Security Setting in a Popular Browser
  • Using Encryption File System
  • Restricting the Null Session
  • Shutting Down a Service in Windows
9

Defending Against Virus Attacks

  • Creating a Remote Access Trojan (RAT)
  • Performing Malware Scanning
10

Defending against Trojan Horses, Spyware, and Adware

  • Using the NetBus Application
  • Using eLiTeWrap
  • Using an Anti-Spyware Tool
11

Security Policies

  • Defining User Access Control
  • Managing a User Using an Existing Security Policy
  • Examining Security Policy
  • Creating a Security Policy
12

Assessing System Security

  • Filtering Ports Using Windows Firewall
  • Using the Advanced IP Scanner
  • Conducting Vulnerability Scanning Using Nessus
  • Using MBSA
  • Configuring Windows Update
13

Security Standards

  • Observing the Security Event Log
14

Techniques Used by Attackers

  • Conducting Passive Scanning Using Netcraft
  • Conducting Active Scanning Using Nsauditor
  • Using ShareEnum
  • Performing Active Scanning Using Nmap
  • Cracking Windows Password Using Ophcrack
  • Performing the SQL Injection
15

Introduction to Forensics

  • Observing the Windows Log
  • Retrieving Deleted Files Using Disk Digger
  • Performing Logical Imaging Using AccessData FTK Imager
16

Cyber Terrorism

  • Using BitLocker in Windows 10
  • Using EtherDetect

Related Courses

All Courses
scroll to top