UOP-CYB515: Network Security

(UOP-CYB515.AB3)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Network Security and Types of Attacks

  • Introduction
  • The Basics of a Network
  • Basic Network Utilities
  • The OSI Model
  • What Does This Mean for Security?
  • Assessing Likely Threats to the Network
  • Classifications of Threats
  • Likely Attacks
  • Threat Assessment
  • Understanding Security Terminology
  • Choosing a Network Security Approach
  • Network Security and the Law
  • Using Security Resources
  • Introduction to Types of Attacks
  • Understanding Denial of Service Attacks
  • Defending Against Buffer Overflow Attacks
  • Defending Against IP Spoofing
  • Defending Against Session Hijacking
  • Blocking Virus and Trojan Horse Attacks
2

Firewall and Intrusion Detection Systems

  • Introduction
  • What Is a Firewall?
  • Implementing Firewalls
  • Firewall Deployment
  • Selecting and Using a Firewall
  • Using Proxy Servers
  • Introduction to Firewall Practical Applications
  • Using Single Machine Firewalls
  • Windows 10 Firewall
  • User Account Control
  • Linux Firewalls
  • Using Small Office/Home Office Firewalls
  • Using Medium-Sized Network Firewalls
  • Using Enterprise Firewalls
  • Introduction to Intrusion-Detection Systems
  • Understanding IDS Concepts
  • IDS Components and Processes
  • SIEM
  • Evasion Techniques
  • Understanding and Implementing IDSs
  • Understanding and Implementing Honeypots
3

Encryption, VPN and Operating System

  • Introduction
  • The History of Encryption
  • Learning About Modern Encryption Methods
  • Identifying Good Encryption
  • Understanding Digital Signatures and Certificates
  • Understanding and Using Decryption
  • Cracking Passwords
  • Steganography
  • Steganalysis
  • Quantum Computing and Quantum Cryptography
  • Introduction to Virtual Private Networks
  • Basic VPN Technology
  • Using VPN Protocols for VPN Encryption
  • IPsec
  • SSL/TLS
  • Other VPN Protocols
  • Implementing VPN Solutions
  • Introduction to Operating System Hardening
  • Configuring Windows Properly
  • Configuring Linux Properly
  • Patching the Operating System
  • Configuring Browsers
4

Defending Against Attacks and Security Policies

  • Introduction
  • Understanding Virus Attacks
  • Virus Scanners
  • Antivirus Policies and Procedures
  • Additional Methods for Defending Your System
  • What to Do If Your System Is Infected by a Virus
  • Introduction to Defending Against Trojan Horses and Phishing
  • Trojan Horses
  • Phishing
  • Introduction to Security Policies
  • ISO 27002
  • Important Standards
  • Defining User Policies
  • Defining System Administration Policies
  • Defining Access Control
  • Defining Developmental Policies
  • Disaster Recovery
5

Assessing System Security & Security Standards

  • Introduction
  • Risk Assessment Concepts
  • Evaluating the Security Risk
  • Conducting the Initial Assessment
  • Probing the Network
  • Vulnerabilities
  • McCumber Cube
  • Security Documentation
  • Introduction to Security Standards
  • COBIT
  • ISO Standards
  • NIST Standards
  • U.S. DoD Standards
  • Using the Common Criteria
  • Using Security Models
  • U.S. Federal Regulations, Guidelines, and Standards
  • Introduction to Physical Security and Disaster Recovery
  • Physical Security
  • Disaster Recovery
  • Ensuring Fault Tolerance
6

Forensics and Cyber Terrorism

  • Introduction
  • Preparing to Hack
  • The Attack Phase
  • Session Hijacking
  • Wi-Fi Hacking
  • Bluetooth Hacking
  • Introduction to Forensics
  • General Forensics Guidelines
  • FBI Forensics Guidelines
  • Imaging a Drive
  • Finding Evidence on the PC
  • Gathering Evidence from a Cell Phone
  • Forensic Tools to Use
  • Forensic Science
  • To Certify or Not to Certify?
  • Expert Witnesses
  • Additional Types of Forensics
  • Introduction to Cyber Warfare and Terrorism
  • Defending Against Computer-Based Espionage
  • Defending Against Computer-Based Terrorism
  • Choosing Defense Strategies

1

Network Security and Types of Attacks

  • Configuring an IPv6 Address
  • Configuring a CIDR-Based IP Address
  • Viewing the MAC Address on Different Interfaces
  • Using Command-Line Tools
  • Analyzing Malware
  • Conducting a DoS Attack Using a Smurf Attack
  • Performing DoS Attacks with a SYN Flood
  • Defending Against a Buffer Overflow Attack
  • Conducting IP Spoofing
  • Performing Session Hijacking Using Burp Suite
2

Firewall and Intrusion Detection Systems

  • Creating a DMZ Zone
  • Using Windows Firewall
  • Configuring a Proxy Server
  • Configure User Access Control Settings
  • Configuring a Linux Firewall Using iptables
  • Performing IDS Configuration with Snort
  • Setting up a Honeypot
3

Encryption, VPN and Operating System

  • Examining Asymmetric Encryption
  • Performing Symmetric Information
  • Configuring a VPN
  • Configuring IPSec
  • Shutting Down a Service in Windows
  • Using Registry Editor
  • Setting Security Policies
4

Defending Against Attacks and Security Policies

  • Creating a Remote Access Trojan (RAT)
  • Connecting to a Remote Computer Using the Remote Desktop Connection
  • Using eLiTeWrap
  • Using the NetBus Application
  • Performing a Phishing Attack
  • Managing a User Using an Existing Security Policy
5

Assessing System Security & Security Standards

  • Filtering Ports Using Windows Firewall
  • Scanning for Vulnerabilities Using Nikto
  • Using Nmap for Network Scanning
  • Conducting Vulnerability Scanning Using Nessus
  • Performing Vulnerability Scanning Using OpenVAS
  • Using Shodan to Find Webcams
  • Using OWASP ZAP
  • Using the Advanced IP Scanner
  • Examining Open Source Security Testing Methodology Manual
  • Taking a Full Backup
  • Taking an Incremental Backup
6

Forensics and Cyber Terrorism

  • Conducting Passive Scanning Using Netcraft
  • Attacking a Website Using XSS Injection
  • Exploiting a Website Using SQL Injection
  • Cracking Windows Password Using Ophcrack
  • Using FTK Imager
  • Using Operating System Utilities in Windows
  • Using BitLocker
  • Using EtherDetect
  • Capturing a Packet Using Wireshark

Related Courses

All Courses
scroll to top