SEC285: Security

(DV-SEC285.AI2)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Security Fundamentals & Risk Management

  • Module A: Security concepts
  • Module B: Understanding threats
  • Module C: Enterprise security strategy
  • Module D: Risk management programs
  • Module E: Security audits
  • Module F: Conducting security assessments
2

Organizational Security & Cryptography

  • Module A: Social engineering 
  • Module B: Security policies 
  • Module C: User roles and training 
  • Module D: Cryptography concepts
  • Module E: Public key infrastructure
3

Network Connectivity & Secure Network Configurations

  • Module A: Network attacks
  • Module B: Packet flow
  • Module C: Network security components
  • Module D: Secure network protocols
  • Module E: Hardening networks
4

Authentication & Access Control

  • Module A: Authentication factors
  • Module B: Authentication protocols
  • Module C: Access control principles
  • Module D: Account management
5

Enterprise Architecture & Secure Assets

  • Module A: System vulnerabilities
  • Module B: System architecture
  • Module C: Physical security and safety
  • Module D: Securing data
6

Securing Specialized Systems and Applications

  • Module A: Securing hosts
  • Module B: Mobile security
  • Module C: Application attacks
  • Module D: Securing applications
7

Disaster planning and recovery & Threat detection

  • Module A: Secure operations
  • Module B: Resilience and recovery
  • Module C: Security monitoring
  • Module D: Incident response procedures

1

Security Fundamentals & Risk Management

  • Footprinting a Website
2

Organizational Security & Cryptography

  • Creating Asymmetric Key Pairs
  • Using Symmetric Encryption
  • Creating File Hashes
  • Creating Certificates with OpenSSL
3

Network Connectivity & Secure Network Configurations

  • Cracking Passwords
  • Configuring a Network Firewall
  • Securing a Wi-Fi Hotspot
  • Requesting PKI Certificates
  • Scanning the Network
4

Authentication & Access Control

  • Installing a RADIUS Server
  • Creating Linux Users and Groups
  • Enforcing Password Policies
  • Creating a Windows Domain User
5

Enterprise Architecture & Secure Assets

  • Examining Spyware
  • Detecting Virtualization
  • Assigning NTFS Permissions
6

Securing Specialized Systems and Applications

  • Performing an XSS Attack in DVWA
  • Performing SQL Injection in DVWA
  • Exploiting an Overflow Vulnerability
  • Exploiting a TOCTOU Vulnerability
7

Disaster planning and recovery & Threat detection

  • Scheduling a Server Backup
  • Viewing Linux Event Logs
  • Viewing Windows Event Logs

Related Courses

All Courses
scroll to top