Introduction to Computer Security

(CTU-CSS150.AE1)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Introduction to Information Security

  • Evolution of Computing and Its Impact on Security
  • Information Security Objectives
  • Role of the Information Security Manager
  • Information Security Risks
  • Building an Information Security Strategy
  • Implementing Security Controls
  • Data Protection
  • Common Body of Knowledge (CBK)
2

Access Controls and Security Administration

  • Governance
  • Understanding Policy Documents
  • Complying with Laws and Regulations
  • Adopting Standard Frameworks
  • Security Control Verification and Quality Control
3

Risk Management for Compliance

  • Analyzing Risk
  • Risk Treatment and Response
  • Risk Analysis
  • Disaster Recovery Planning
  • Privacy
  • Planning for Business Continuity
  • Project Scope and Planning
  • Business Impact Analysis
  • Continuity Planning
  • Plan Approval and Implementation
  • The Nature of Disaster
  • System Resilience, High Availability, and Fault Tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing and Maintenance
4

Cryptography, Malicious Activity, and Network Security

  • Exploring Cybersecurity  Threats
  • Threat Data and Intelligence
  • Security Requirements in Telecommunications Networks
  • Vulnerability Management
  • Security Vulnerabilities
  • Penetration  Testing
  • Training and Exercises
  • Endpoint Security
  • Network Security
  • Cloud Computing Security
  • Cryptography
  • Code Security
  • Identity and Access Management
5

Training and Certifications

  • Information Security Programs
  • Security Awareness and Training
  • Managing the Information Security Team
  • Managing the Security Budget
  • Integrating Security with Other Business Functions
  • Security Incidents
  • Phases of Incident Response
  • Building the Incident Response Plan
  • Creating an Incident Response Team
  • Coordination and Information Sharing
  • Classifying Incidents
  • Conducting Investigations
  • Plan Training, Testing, and Evaluation

1

Risk Management for Compliance

  • Configuring RAID
  • Taking an Incremental Backup
  • Taking a Full Backup
2

Cryptography, Malicious Activity, and Network Security

  • Using Anti-Phishing Tools
  • Using Nikto
  • Consulting a Vulnerability Database
  • Performing Passive Reconnaissance
  • Performing Active Reconnaissance
  • Creating a VPN Connection
  • Implementing Port Security
  • Creating a Virtual LAN
  • Using Windows Firewall
  • Observing an SHA-Generated Hash Value
  • Observing an MD5-Generated Hash Value
  • Examining Asymmetric Encryption
  • Performing Symmetric Encryption
3

Training and Certifications

  • Completing the Chain of Custody

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top