UOP-CMGT245 - IS Security Concepts

(UOP-CMGT245)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Assessing Risk and Monitoring Networks

  • Threat Assessment
  • Risk Assessment
  • Developing Policies, Standards, and Guidelines
  • Frameworks, Best Practices, and Configuration Guides
  • Secure Network Architecture Concepts
  • Secure Systems Design
  • Designing with Security in Mind
2

Managing Identity and Access

  • Using Tools to Assess Your Network
  • Troubleshooting Common Security Issues
  • Security Technologies
  • Identity and Access Management Concepts
  • Install and Configure Identity and Access Services
  • File and Database Security
3

Securing Against Threats

  • Wireless Vulnerabilities to Know
  • Wireless Commonsense
  • Wireless Attack Analogy
  • Working with Cloud Computing
  • Working with Virtualization
  • Security and the Cloud
  • Threat Actors and Attributes
  • Use of Open Source Intelligence
  • Types of Vulnerabilities
  • Embedded Systems Security
  • Application Vulnerabilities
  • Secure Programming
  • Other Application Security Issues
  • Code Issues
4

Detecting Vulnerabilities and Cryptography Basics

  • An Overview of Cryptography
  • Modern Cryptography
  • Using Cryptographic Systems
  • Understanding Cryptography Standards and Protocols
  • Public Key Infrastructure
  • Using Public Key Infrastructure
  • Authentication
  • Threat and Attack Terminology
  • Living in a World of Viruses
  • Malware and Crypto-Malware
  • Understanding Various Types of Application/Service Attacks
  • Understanding Social Engineering
  • Understanding Physical Security
  • Various Control Types
  • Data Security and Privacy Practices
5

Security Administration and Disaster Recovery

  • Connection Types
  • Mobile Devices
  • Account Management Concepts
  • Penetration Testing
  • Issues Associated with Business Continuity
A

Appendix A: 3D Game Simulation

7

About

1

Assessing Risk and Monitoring Networks

  • Configuring a Perimeter Firewall
  • Installing the Web Server IIS Server Role
  • Using Network Monitoring
  • Configuring Remote Access VPN
  • Using Windows Defender
2

Managing Identity and Access

  • Detecting a Phishing Site Using Netcraft
  • Preventing Zone Transfers
  • Viewing Results of Live Hosts
  • Verifying Network Services
  • Observing Traffic Patterns Using Wireshark
  • Analyzing Protocols with Wireshark
  • Securing Default Accounts
  • Assigning Permissions to Folders
  • Managing Windows Firewall
  • Configuring Windows Firewall
  • Enabling Intrusion Prevention and Detection
  • Implementing Data Execution Prevention
  • Configuring Kerberos Policy Settings
  • Enabling Audit Policies
  • Enabling Object Access Auditing
  • Configuring Audit Group Policy
  • Installing Remote Access Services
  • Configuring a Static TCP/IP Address
3

Securing Against Threats

  • Installing and Configuring NLB
  • Configuring NLB Operations
  • Creating a Virtual Machine
  • Importing a Virtual Machine
  • Configuring Secondary Virtual Hard Disk
  • Creating a Virtual Switch
4

Detecting Vulnerabilities and Cryptography Basics

  • Observing MD5 Hash
  • Using OpenSSL to Create a Public/Private Key Pair
  • Adding a Certificate to MMC
  • Configuring SSL Connections
  • Configuring the SSL Port Setting
  • Using BitLocker in Windows 10
  • Working with Task Manager
  • Viewing Running Processes on a Linux-based Machine
  • Enabling Debug Logging on the DNS Server
  • Simulating a DoS Attack
  • Spoofing MAC Address with SMAC
  • Performing for ARP Spoofing
5

Security Administration and Disaster Recovery

  • Resetting a Password
  • Configuring Group Policy Settings
  • Creating a Fine-Grained Password Policy
  • Restricting Local Accounts
  • Creating a User Account and Configuring Restrictions
  • Configuring Account Policies
  • Managing a User Account
  • Running a Security Scan to Identify Vulnerabilities
  • Remediating Vulnerabilities on the Local Workstation
  • Remediating Vulnerabilities on the Network 
  • Installing Windows Server Backup
  • Creating a Backup Schedule
  • Creating a Backup Once

Related Courses

All Courses
scroll to top