CYS1100 - Fundamentals of Information Systems Security

(ANC-CYS1100.AB1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Common Attacks 1

  • Social Engineering Fundamentals
  • User Security Awareness Education
  • Malicious Software (Malware)
  • Password Attacks
  • Physical Attacks
  • Adversarial Artificial Intelligence
  • Supply-Chain Attacks
  • Cloud-based vs. On-premises Attacks
  • Cryptographic Attacks
2

Common Attacks 2

  • Privilege Escalation
  • Cross-Site Scripting (XSS) Attacks
  • Injection Attacks
  • Pointer/Object Dereference
  • Directory Traversal
  • Buffer Overflows
  • Race Conditions
  • Error Handling
  • Improper Input Handling
  • Replay Attacks
  • Request Forgeries
  • Application Programming Interface (API) Attacks
  • Resource Exhaustion
  • Memory Leaks
  • Secure Socket Layer (SSL) Stripping
  • Driver Manipulation
  • Pass the Hash
  • Wireless Attacks
  • On-Path Attacks
  • Layer 2 Attacks
  • Domain Name System (DNS) Attacks
  • Distributed Denial-of-Service (DDoS) Attacks
  • Malicious Code or Script Execution Attacks
3

Common Attacks 3

  • Actors and Threats
  • Attributes of Threat Actors
  • Attack Vectors
  • Threat Intelligence and Threat Intelligence Sources
  • Research Sources
4

Investigation

  • Vulnerability Scan Output
  • SIEM Dashboards
  • Log Files
  • syslog/rsyslog/syslog-ng
  • journalctl
  • NXLog
  • Bandwidth Monitors
  • Metadata
  • NetFlow/sFlow
  • Protocol Analyzer Output
5

Forensics

  • Documentation/Evidence
  • Acquisition
  • On-premises vs. Cloud
  • Integrity
  • Preservation
  • E-discovery
  • Data Recovery
  • Nonrepudiation
  • Strategic Intelligence/Counterintelligence

1

Common Attacks 1

  • Performing Website Reconnaissance
  • Cracking a Password Using the John the Ripper Tool
  • Simulating a DoS Attack
  • Creating a Remote Access Trojan (RAT)
2

Common Attacks 2

  • Performing Session Hijacking Using Burp Suite
  • Exploiting a Website Using SQL Injection
  • Performing ARP Spoofing
3

Common Attacks 3

  • Using SET
4

Investigation

  • Viewing the System Logs
  • Using Windows Event Viewer
5

Forensics

  • Completing the Chain of Custody
  • Analyzing Forensics with Autopsy

Related Courses

All Courses
scroll to top