CYS4110 - Network Defense and Countermeasures

(ANC-CYS4110.AB1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Introduction to Network Security and Types of Attacks

  • The Basics of a Network
  • Basic Network Utilities
  • The OSI Model
  • What Does This Mean for Security?
  • Assessing Likely Threats to the Network
  • Classifications of Threats
  • Likely Attacks
  • Threat Assessment
  • Understanding Security Terminology
  • Choosing a Network Security Approach
  • Network Security and the Law
  • Using Security Resources
  • Understanding Denial of Service Attacks
  • Defending Against Buffer Overflow Attacks
  • Defending Against IP Spoofing
  • Defending Against Session Hijacking
  • Blocking Virus and Trojan Horse Attacks
  • Test Your Skills
2

Fundamentals of Firewalls and Intrusion-Detection Systems

  • What Is a Firewall?
  • Implementing Firewalls
  • Selecting and Using a Firewall
  • Using Proxy Servers
  • Using Single Machine Firewalls
  • Windows 10 Firewall
  • User Account Control
  • Linux Firewalls
  • Using Small Office/Home Office Firewalls
  • Using Medium-Sized Network Firewalls
  • Using Enterprise Firewalls
  • Understanding IDS Concepts
  • IDS Components and Processes
  • Understanding and Implementing IDSs
  • Understanding and Implementing Honeypots
  • Test Your Skills
3

Encryption Fundamentals, Virtual Private Networks, and Operating System Hardening

  • The History of Encryption
  • Learning About Modern Encryption Methods
  • Identifying Good Encryption
  • Understanding Digital Signatures and Certificates
  • Understanding and Using Decryption
  • Cracking Passwords
  • Steganography
  • Steganalysis
  • Quantum Computing and Quantum Cryptography
  • Basic VPN Technology
  • Using VPN Protocols for VPN Encryption
  • IPSec
  • SSL/TLS
  • Implementing VPN Solutions
  • Configuring Windows Properly
  • Configuring Linux Properly
  • Patching the Operating System
  • Configuring Browsers
  • Test Your Skills
4

Assessing System Security and Disaster Recovery

  • Defining User Policies
  • Defining System Administration Policies
  • Defining Access Control
  • Defining Developmental Policies
  • Projects
  • Risk Assessment Concepts
  • Evaluating the Security Risk
  • Conducting the Initial Assessment
  • Probing the Network
  • Vulnerabilities
  • McCumber Cube
  • Security Documentation
  • COBIT
  • ISO Standards
  • NIST Standards
  • U.S. DoD Standards
  • Using the Orange Book
  • Using the Rainbow Series
  • Using the Common Criteria
  • Using Security Models
  • U.S. Federal Regulations, Guidelines, and Standards
  • Physical Security
  • Disaster Recovery
  • Ensuring Fault Tolerance
  • Test Your Skills
5

Defending Against Virus Attacks and Introduction to Forensics

  • Understanding Virus Attacks
  • Virus Scanners
  • Antivirus Policies and Procedures
  • Additional Methods for Defending Your System
  • What to Do If Your System Is Infected by a Virus
  • Trojan Horses
  • Spyware and Adware
  • Preparing to Hack
  • The Attack Phase
  • Wi-Fi Hacking
  • General Forensics Guidelines
  • FBI Forensics Guidelines
  • Finding Evidence on the PC
  • Gathering Evidence from a Cell Phone
  • Forensic Tools to Use
  • Forensic Science
  • To Certify or Not to Certify?
  • Defending Against Computer-Based Espionage
  • Defending Against Computer-Based Terrorism
  • Choosing Defense Strategies
  • Test Your Skills

1

Introduction to Network Security and Types of Attacks

  • Conducting a DoS Attack Using a SYN Flood
  • Conducting a DoS Attack Using the Smurf Attack
  • Defending against IP Spoofing
2

Fundamentals of Firewalls and Intrusion-Detection Systems

  • Creating ACL in the Router
  • Creating a DMZ Zone
  • Using the Cisco ASA Firewall
  • Intercepting Packets
3

Encryption Fundamentals, Virtual Private Networks, and Operating System Hardening

  • Observing a Digital Certificate
  • Creating a PGP Certification
  • Setting Up a VPN Server with Windows Server 2016
  • Setting Security Policies
4

Assessing System Security and Disaster Recovery

  • Examining Security Policy
  • Creating a Security Policy
  • Using the Advanced IP Scanner
  • Observing the Security Event Log
5

Defending Against Virus Attacks and Introduction to Forensics

  • Performing Active Scanning Using Nmap
  • Cracking Windows Password Using Ophcrack
  • Performing the SQL Injection
  • Retrieving Deleted Files Using Disk Digger

Related Courses

All Courses
scroll to top