Introduction to Computer Security

(CTU-CSS150.AE1)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Introduction to Information Security

  • Evolution of Computing and Its Impact on Security
  • Information Security Objectives
  • Role of the Information Security Manager
  • Information Security Risks
  • Building an Information Security Strategy
  • Implementing Security Controls
  • Data Protection
  • Common Body of Knowledge (CBK)
2

Access Controls and Security Administration

  • Governance
  • Understanding Policy Documents
  • Complying with Laws and Regulations
  • Adopting Standard Frameworks
  • Security Control Verification and Quality Control
3

Risk Management for Compliance

  • Analyzing Risk
  • Risk Treatment and Response
  • Risk Analysis
  • Disaster Recovery Planning
  • Privacy
  • Planning for Business Continuity
  • Project Scope and Planning
  • Business Impact Analysis
  • Continuity Planning
  • Plan Approval and Implementation
  • The Nature of Disaster
  • System Resilience, High Availability, and Fault Tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing and Maintenance
4

Cryptography, Malicious Activity, and Network Security

  • Exploring Cybersecurity  Threats
  • Threat Data and Intelligence
  • Security Requirements in Telecommunications Networks
  • Vulnerability Management
  • Security Vulnerabilities
  • Penetration  Testing
  • Training and Exercises
  • Endpoint Security
  • Network Security
  • Cloud Computing Security
  • Cryptography
  • Code Security
  • Identity and Access Management
5

Training and Certifications

  • Information Security Programs
  • Security Awareness and Training
  • Managing the Information Security Team
  • Managing the Security Budget
  • Integrating Security with Other Business Functions
  • Security Incidents
  • Phases of Incident Response
  • Building the Incident Response Plan
  • Creating an Incident Response Team
  • Coordination and Information Sharing
  • Classifying Incidents
  • Conducting Investigations
  • Plan Training, Testing, and Evaluation

1

Risk Management for Compliance

  • Configuring RAID
  • Taking an Incremental Backup
  • Taking a Full Backup
2

Cryptography, Malicious Activity, and Network Security

  • Using Anti-Phishing Tools
  • Using Nikto
  • Consulting a Vulnerability Database
  • Performing Passive Reconnaissance
  • Performing Active Reconnaissance
  • Creating a VPN Connection
  • Implementing Port Security
  • Creating a Virtual LAN
  • Using Windows Firewall
  • Observing an SHA-Generated Hash Value
  • Observing an MD5-Generated Hash Value
  • Examining Asymmetric Encryption
  • Performing Symmetric Encryption
3

Training and Certifications

  • Completing the Chain of Custody

Related Courses

All Courses
scroll to top