Technical Enterprise Security

(UOP-CYB550.AE2)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Threat Actors and Security Challenges

  • Types of Threat Actors
  • Threat Actor Characteristics
  • Attack Frameworks and Models
  • Attack Surface Determination
  • Security Challenges with Artificial Intelligence
  • Summary
2

Secure Enterprise Architecture & System Assurance (CSLO1)

  • Resilient System Design
  • Software and Hardware Assurance Methods
  • Continuous Integration/Continuous Delivery (CI/CD) Pipelines
  • Secure Architecture Design
  • Summary
3

Identity, PKI, and Zero Trust Security

  • Access Control Technologies
  • Access Control Models
  • Public Key Infrastructure (PKI)
  • Secure Cloud Identity and Access Capabilities
  • Zero Trust in Secure Architecture
4

Secure Access Engineering for the Enterprise (CSLO2)

  • Subject Access Control
  • Secrets Management
  • Conditional Access
  • IAM Components
  • Summary
5

Network, Endpoint, and Hardware Security Engineering (CSLO2)

  • Endpoint and Server Security
  • Network Infrastructure Security Issues
  • Domain Name Security
  • Email Security
  • Hardware Security Techniques
  • Securing Legacy Systems
  • Summary
6

Cryptographic Engineering (CSLO3)

  • Advanced Cryptographic Concepts
  • Cryptographic Use Cases
  • Cryptographic Techniques
  • Summary

1

Threat Actors and Security Challenges

  • Examining MITRE ATT&CK
  • Using the Social Engineering Toolkit
  • Understanding Prompt Injection
2

Secure Enterprise Architecture & System Assurance (CSLO1)

  • Configuring a Standard ACL
  • Configuring a Linux Firewall Using iptables
  • Tracking Vulnerabilities in Software
  • Performing Nmap Port Scanning
  • Conducting Vulnerability Scanning Using Nessus
3

Identity, PKI, and Zero Trust Security

  • Examining PKI Certificates
  • Examining Kerberos Settings
  • Implementing MFA on Mobile Devices
4

Secure Access Engineering for the Enterprise (CSLO2)

  • Creating Linux Users and Groups
  • Creating a Windows Domain User
5

Network, Endpoint, and Hardware Security Engineering (CSLO2)

  • Simulating a DoS Attack
  • Attempting a Zone Transfer
  • Performing Vulnerability Scanning Using OpenVAS
  • Bypassing Command Shell Restrictions
6

Cryptographic Engineering (CSLO3)

  • Creating Asymmetric Key Pairs
  • Performing Symmetric Encryption
  • Observing an MD5-Generated Hash Value
  • Using the SHA Series Algorithm
  • Creating File Hashes

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top