INT2240 - Security Concepts (INT2240)

(ANC-INT2240.AB1)
Lessons
Lab
Get A Free Trial

Skills You’ll Get

1

Computer Systems Security

  • Security 101
  • Think Like a Hacker
  • Threat Actor Types and Attributes
  • Review Key Topics
  • Malicious Software Types
  • Delivery of Malware
  • Preventing and Troubleshooting Malware
  • Complete the Real-World Scenarios
  • Implementing Security Applications
  • Securing Computer Hardware and Peripherals
  • Securing Mobile Devices
  • Complete the Real-World Scenarios
2

Social engineering, Redundancy and Disaster Recovery, OS Harding and Virtualization

  • Social Engineering
  • User Education
  • Facilities Security
  • Complete the Real-World Scenarios
  • Redundancy Planning
  • Disaster Recovery Planning and Procedures
  • Complete the Real-World Scenarios
  • Hardening Operating Systems
  • Virtualization Technology
  • Complete the Real-World Scenarios
  • Securing the Browser
  • Securing Other Applications
  • Secure Programming
  • Complete the Real-World Scenarios
3

Risk Assessment, Monitoring, Auditing, Physical Security, Authentication, Access Control

  • Conducting Risk Assessments
  • Assessing Vulnerability with Security Tools
  • Complete the Real-World Scenarios
  • Monitoring Methodologies
  • Using Tools to Monitor Systems and Networks
  • Conducting Audits
  • Complete the Real-World Scenarios
  • Physical Security
  • Authentication Models and Components
  • Complete the Real-World Scenarios
  • Access Control Models Defined
  • Rights, Permissions, and Policies
  • Complete the Real-World Scenarios
4

Network

  • Network Design
  • Cloud Security and Server Defense
  • Complete the Real-World Scenarios
  • Ports and Protocols
  • Malicious Attacks
  • Complete the Real-World Scenarios
  • Firewalls and Network Security
  • NIDS Versus NIPS
  • Complete the Real-World Scenarios
  • Securing Wired Networks and Devices
  • Securing Wireless Networks
  • Complete the Real-World Scenarios
5

Encryption

  • Cryptography Concepts
  • Encryption Algorithms
  • Hashing Basics
  • Complete the Real-World Scenarios
  • Public Key Infrastructure
  • Security Protocols
  • Complete the Real-World Scenarios
  • Legislative and Organizational Policies
  • Incident Response Procedures
  • IT Security Frameworks
  • Complete the Real-World Scenarios

1

Computer Systems Security

  • Managing Windows Firewall
  • Encrypting Files with EFS
  • Configuring Windows Firewall
2

Social engineering, Redundancy and Disaster Recovery, OS Harding and Virtualization

  • Installing Windows Server Backup
  • Creating a Backup Schedule
  • Creating a Backup Once
  • Configuring Group Policy Settings
  • Configuring Audit Group Policy
3

Risk Assessment, Monitoring, Auditing, Physical Security, Authentication, Access Control

  • Running a Security Scan to Identify Vulnerabilities
  • Remediating Vulnerabilities on the Local Workstation
  • Using Network Monitoring
  • Analyzing Protocols with Wireshark
  • Enabling Audit Policies
4

Network

  • Configuring a Perimeter Firewall
  • Spoofing MAC Address with SMAC
  • Detecting a Phishing Site Using Netcraft
  • Securing Default Accounts
  • Creating a Fine-Grained Password Policy
5

Encryption

  • Observing MD5 Hash
  • Configuring SSL Connections
  • Using OpenSSL to Create a Public/Private Key Pair
  • Adding a Certificate to MMC

Related Courses

All Courses
scroll to top