Cybersecurity

(MSU-CYBSEC.AIP2)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Security fundamentals

  • Module A: Security concepts
  • Module B: Understanding threats
  • Module C: Enterprise security strategy
  • Summary
2

Risk management

  • Module A: Risk management programs 
  • Module B: Security audits
  • Module C: Conducting security assessments
  • Summary
3

Organizational security

  • Module A: Social engineering 
  • Module B: Security policies 
  • Module C: User roles and training 
  • Summary
4

Cryptography

  • Module A: Cryptography concepts
  • Module B: Public key infrastructure
  • Summary
5

Network connectivity

  • Module A: Network attacks
  • Module B: Packet flow
  • Summary
6

Secure network configuration

  • Module A: Network security components
  • Module B: Secure network protocols
  • Module C: Hardening networks
  • Summary
7

Authentication

  • Module A: Authentication factors
  • Module B: Authentication protocols
  • Summary
8

Access control

  • Module A: Access control principles
  • Module B: Account management
  • Summary
9

Enterprise architecture

  • Module A: System vulnerabilities
  • Module B: System architecture
  • Summary
10

Secure assets

  • Module A: Physical security and safety 
  • Module B: Securing data
  • Summary
11

Securing specialized systems

  • Module A: Securing hosts
  • Module B: Mobile security
  • Summary
12

Secure applications

  • Module A: Application attacks
  • Module B: Securing applications
  • Summary
13

Disaster planning and recovery

  • Module A: Secure operations
  • Module B: Resilience and recovery
  • Summary
14

Threat detection and response

  • Module A: Security monitoring
  • Module B: Incident response procedures
  • Summary
15

Malicious Software

  • Types of Malicious Software (Malware)
  • Advanced Persistent Threat
  • Propagation—Infected Content—Viruses
  • Propagation—Vulnerability Exploit—Worms
  • Propagation—Social Engineering—Spam e-mail, Trojans
  • Payload—System Corruption
  • Payload—Attack Agent—Zombie, Bots
  • Payload—Information Theft—Keyloggers, Phishing, Spyware
  • Payload—Stealthing—Backdoors, Rootkits
  • Countermeasures
  • Distributed Denial of Service Attacks
  • Review Questions, and Problems
16

Intruders

  • Intruders
  • Intrusion Detection
  • Password Management
  • Review Questions, and Problems
17

Firewalls

  • The Need for Firewalls
  • Firewall Characteristics and Access Policy
  • Types of Firewalls
  • Firewall Basing
  • Firewall Location and Configurations
  • Review Questions, and Problems
A

Appendix D: TCP/IP and OSI

  • Protocols And Protocol Architectures
  • The TCP/IP Protocol Architecture
  • The Role Of An Internet Protocol
  • IPV4
  • IPV6
  • The OSI Protocol Architecture

1

Risk management

  • Gathering Site Information
  • Using the theHarvester Tool
  • Cracking a Linux Password Using John the Ripper
  • Footprinting a Website
2

Organizational security

  • Using Anti-phishing Tools
  • Using Social Engineering Techniques to Plan an Attack
3

Cryptography

  • Creating Asymmetric Key Pairs
  • Observing an MD5-Generated Hash Value
  • Performing Steganography Using OpenStego
  • Using Symmetric Encryption
  • Creating File Hashes
  • Examining PKI Certificates
  • Creating Certificates with OpenSSL
4

Network connectivity

  • Spoofing a MAC Address with SMAC
  • Cracking Passwords Using Rainbow Tables
  • Cracking Passwords
  • Capturing Credentials On-path
  • Launching a DoS Attack
  • Configuring a Network Firewall
  • Using Uncomplicated Firewall in Linux
5

Secure network configuration

  • Securing a Wi-Fi Hotspot
  • Binding a Site Using IIS
  • Configuring a VPN
  • Requesting PKI Certificates
  • Scanning the Network
6

Authentication

  • Examining Active Directory Objects
  • Examining Kerberos Settings
  • Installing a RADIUS Server
7

Access control

  • Creating Linux Users and Groups
  • Enforcing Password Policies
  • Delegating Control in Active Directory
  • Creating a Windows Domain User
8

Enterprise architecture

  • Examining Spyware
  • Detecting Virtualization
9

Secure assets

  • Identifying Access Badge Areas
  • Implementing Physical Security
  • Using BitLocker in Windows 10
  • Encrypting Files with EFS
  • Assigning NTFS Permissions
10

Securing specialized systems

  • Creating a Security Template
  • Enforcing a Security Template
11

Secure applications

  • Performing an XSS Attack in DVWA
  • Performing SQL Injection in DVWA
  • Exploiting an Overflow Vulnerability
  • Exploiting a TOCTOU Vulnerability
  • Examining Application Vulnerabilities
12

Disaster planning and recovery

  • Scheduling a Server Backup
13

Threat detection and response

  • Viewing Linux Event Logs
  • Viewing Windows Event Logs
14

Malicious Software

  • Creating a Remote Access Trojan (RAT)
  • Installing Antivirus Software
  • Configuring IPSec
  • Testing an Antivirus Program
  • Simulating a DoS Attack
  • Simulating a DDoS Attack
15

Intruders

  • Understanding Local Privilege Escalation
  • Setting Up a Honeypot
16

Firewalls

  • Using Windows Firewall
  • Whitelisting an IP Address in the Windows Firewall
  • Creating Outbound and Inbound Rules for a Firewall

Related Courses

All Courses
scroll to top