CIS2123 - Introduction to CyberSecurity

(RU-CIS2123.AB2)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Introduction

  • Security Challenges
  • Who Should Read This Course
  • What Is Covered in This Course
2

Infrastructure Security in the Real World

  • Security Challenges
  • Summary
3

Understanding Access-Control and Monitoring Systems

  • A Quick Primer on Infrastructure Security
  • Access Control
  • Security Policies
  • Physical Security Controls
  • Access-Control Gates
  • Authentication Systems
  • Remote-Access Monitoring
  • Hands-On Exercises
4

Understanding Video Surveillance Systems

  • Video Surveillance Systems
  • Hands-On Exercises
5

Understanding Intrusion-Detection and Reporting Systems

  • Intrusion-Detection and Reporting Systems
  • Hands-On Exercises
6

Infrastructure Security: Review Questions and Hands-On Exercises

  • Summary Points
  • Security Challenge Scenarios
  • Review Questions
7

Local Host Security in the Real World

  • Security Challenges
  • Summary
8

Securing Devices

  • The Three Layers of Security
  • Securing Host Devices
  • Hands-On Exercises
9

Protecting the Inner Perimeter

  • The Inner Perimeter
  • Hands-On Exercises
10

Protecting Remote Access

  • Protecting Local Computing Devices
  • Implementing Local Protection Tools
  • Using Local Intrusion-Detection Tools
  • Configuring Browser Security Options
  • Defending Against Malicious Software
  • Hardening Operating Systems
  • Overseeing Application Software Security
  • Applying Software Updates and Patches
  • Hands-On Exercises
11

Local Host Security: Review Questions and Hands-On Exercises

  • Summary Points
  • Security Challenge Scenarios
  • Review Questions
12

Local Network Security in the Real World

  • Security Challenges
  • Summary
13

Networking Basics

  • Understanding the Basics of Networking
  • The OSI Networking Model
  • Data Transmission Packets
  • OSI Layer Security
  • Network Topologies
  • Logical Topologies
  • Hands-On Exercises
14

Understanding Networking Protocols

  • The Basics of Networking Protocols
  • Network Control Strategies
  • Hands-On Exercises
15

Understanding Network Servers

  • The Basics of Network Servers
  • Hands-On Exercises
16

Understanding Network Connectivity Devices

  • Network Switches
  • Routers
  • Gateways
  • Network Bridges
  • Wireless Network Connectivity
  • Hands-On Exercises
17

Understanding Network Transmission Media Security

  • The Basics of Network Transmission MEDIA
  • Transmission Media Vulnerabilities
  • Hands-On Exercises
18

Local Network Security: Review Questions

  • Summary Points
  • Security Challenge Scenarios
19

Perimeter Security in the Real World

  • Security Challenges
  • Summary
20

Understanding the Environment

  • The Basics of Internet Security
  • Understanding the Environment
  • Hands-On Exercises
21

Hiding the Private Network

  • Understanding Private Networks
  • Hands-On Exercises
22

Protecting the Perimeter

  • Understanding the Perimeter
  • Firewalls
  • Network Appliances
  • Proxy Servers
  • Demilitarized Zones (DMZs)
  • Honeypots
  • Extranets
  • Hands-On Exercises
23

Protecting Data Moving Through the Internet

  • Securing Data in Motion
  • Cryptography
  • Hands-On Exercises
24

Tools and Utilities

  • Using Basic Tools
  • Monitoring Tools and Software
  • Hands-On Exercises
25

Identifying and Defending Against Vulnerabilities

  • Zero Day Vulnerabilities
  • Software Exploits
  • Social Engineering Exploits
  • Network Threats and Attacks
  • Dictionary Attacks
  • Denial of Service (DoS) Attacks
  • Spam
  • Other Exploits
  • Hands-On Exercises
26

Perimeter Security: Review Questions and Hands-On Exercises

  • Summary Points
  • Security Scenario Review
  • Review Questions
A

Appendix A: NIST Preliminary Cybersecurity Framework

  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

1

Protecting the Inner Perimeter

  • Converting a FAT32 Partition to NTFS Using Disk Management
  • Converting a FAT32 Partition to NTFS Using PowerShell
  • Converting a FAT32 Partition to FAT Using Disk Management
  • Establishing a VPN Connection
  • Configuring Inbound Rules for Firewall
  • Establishing Lockout Policies
  • Configuring Auditing in Windows
  • Using BitLocker Data Encryption Tools
  • Configuring Firewall Settings
  • Encrypting and Decrypting a File Using AES Crypt
  • Creating Folder Permissions
  • Using Microsoft File Encryption Tools
  • Configuring Application Control Policy
  • Establishing User and Group Account
  • Enabling Event Logging
  • Knowing Filesystem in Linux
  • Configuring Share Permissions
  • Adding a Printer
  • Observing the Impact of Moving an Encrypted File
2

Protecting Remote Access

  • Setting Password Policies
  • Capturing the Network Traffic Using Wireshark
  • Creating a TCP Outbound Rule
  • Creating an ICMP Outbound Rule
3

Networking Basics

  • Configuring File and Share Permissions
4

Understanding Networking Protocols

  • Assigning File or Folder Permissions
  • Using the PING Command
  • Configuring Advanced Permissions
  • Using the nbtstat and tracert Utilities
  • Using the arp and netstat Utilities
  • Modifying the Command Prompt Window
  • Knowing MAC, IPv4, and IPv6 addresses
  • Adding a Loopback Adapter and Class A/B/C IPv4 Addresses
5

Understanding Network Servers

  • Monitoring the Denial of Service (DoS) Attack
  • Viewing the Application, Security, and System Logs
  • Scanning Vulnerabilities Using Microsoft Baseline Security Analyzer
  • Adding Users or Groups in a Linux Distribution
6

Understanding the Environment

  • Examining Browsing History Options
  • Configuring Pop-up Blocker Settings
  • Accessing the Security Settings in Internet Explorer
  • Adding a Site to a Security Zone
7

Hiding the Private Network

  • Creating a Virtual Switch
  • Checking Hyper-V Compatibility
  • Enabling Hyper-V in Windows
  • Pinning Hyper-V Manager to the Taskbar
  • Installing a Linux Distribution in Hyper-V
8

Protecting Data Moving Through the Internet

  • Using MD5 Hash Algorithms
9

Tools and Utilities

  • Using the nslookup and tracert Utilities
  • Capturing Packet Using Wireshark
  • Scanning Network Using Nmap
  • Using the ipconfig and ping Commands
10

Identifying and Defending Against Vulnerabilities

  • Creating a New Software Restriction Policy

Related Courses

All Courses
scroll to top