Cybersecurity Essentials
(Cybersec-ess)
/ ISBN: 978-1-64459-103-1
This course includes
Lessons
TestPrep
LiveLab
Mentoring (Add-on)
Cybersecurity Essentials
Enroll yourself in the Cybersecurity Essentials course and lab to master the concepts and methodologies being used in the field of cybersecurity. The lab provides a hands-on learning experience in a safe and online environment. The cybersecurity course and lab will help you learn the cybersecurity basics and teach you how to work with infrastructure security, network security, security devices, local network security, and access control monitoring systems.
Lessons
-
27+ Lessons
-
154+ Quizzes
-
686+ Flashcards
-
686+ Glossary of terms
TestPrep
-
79+ Pre Assessment Questions
-
83+ Post Assessment Questions
LiveLab
-
51+ LiveLab
-
52+ Video tutorials
- Security Challenges
- Who Should Read This Course
- What Is Covered in This Course
- Security Challenges
- Summary
- A Quick Primer on Infrastructure Security
- Access Control
- Security Policies
- Physical Security Controls
- Access-Control Gates
- Authentication Systems
- Remote-Access Monitoring
- Hands-On Exercises
- Video Surveillance Systems
- Hands-On Exercises
- Intrusion-Detection and Reporting Systems
- Hands-On Exercises
- Summary Points
- Security Challenge Scenarios
- Review Questions
- Security Challenges
- Summary
- The Three Layers of Security
- Securing Host Devices
- Hands-On Exercises
- The Inner Perimeter
- Hands-On Exercises
- Protecting Local Computing Devices
- Implementing Local Protection Tools
- Using Local Intrusion-Detection Tools
- Configuring Browser Security Options
- Defending Against Malicious Software
- Hardening Operating Systems
- Overseeing Application Software Security
- Applying Software Updates and Patches
- Hands-On Exercises
- Summary Points
- Security Challenge Scenarios
- Review Questions
- Security Challenges
- Summary
- Understanding the Basics of Networking
- The OSI Networking Model
- Data Transmission Packets
- OSI Layer Security
- Network Topologies
- Logical Topologies
- Hands-On Exercises
- The Basics of Networking Protocols
- Network Control Strategies
- Hands-On Exercises
- The Basics of Network Servers
- Hands-On Exercises
- Network Switches
- Routers
- Gateways
- Network Bridges
- Wireless Network Connectivity
- Hands-On Exercises
- The Basics of Network Transmission MEDIA
- Transmission Media Vulnerabilities
- Hands-On Exercises
- Summary Points
- Security Challenge Scenarios
- Security Challenges
- Summary
- The Basics of Internet Security
- Understanding the Environment
- Hands-On Exercises
- Understanding Private Networks
- Hands-On Exercises
- Understanding the Perimeter
- Firewalls
- Network Appliances
- Proxy Servers
- Demilitarized Zones (DMZs)
- Honeypots
- Extranets
- Hands-On Exercises
- Securing Data in Motion
- Cryptography
- Hands-On Exercises
- Using Basic Tools
- Monitoring Tools and Software
- Hands-On Exercises
- Zero Day Vulnerabilities
- Software Exploits
- Social Engineering Exploits
- Network Threats and Attacks
- Dictionary Attacks
- Denial of Service (DoS) Attacks
- Spam
- Other Exploits
- Hands-On Exercises
- Summary Points
- Security Scenario Review
- Review Questions
- Identify
- Protect
- Detect
- Respond
- Recover
Hands on Activities (Live Labs)
- Converting a FAT32 Partition to NTFS Using Disk Management
- Converting a FAT32 Partition to NTFS Using PowerShell
- Converting a FAT32 Partition to FAT Using Disk Management
- Establishing a VPN Connection
- Configuring Inbound Rules for Firewall
- Establishing Lockout Policies
- Configuring Auditing in Windows
- Using BitLocker Data Encryption Tools
- Configuring Firewall Settings
- Encrypting and Decrypting a File Using AES Crypt
- Creating Folder Permissions
- Using Microsoft File Encryption Tools
- Configuring Application Control Policy
- Establishing User and Group Account
- Enabling Event Logging
- Knowing Filesystem in Linux
- Configuring Share Permissions
- Adding a Printer
- Observing the Impact of Moving an Encrypted File
- Setting Password Policies
- Capturing the Network Traffic Using Wireshark
- Creating a TCP Outbound Rule
- Creating an ICMP Outbound Rule
- Configuring File and Share Permissions
- Assigning File or Folder Permissions
- Using the PING Command
- Configuring Advanced Permissions
- Using the Nbtstat and Tracert Utilities
- Using the ARP and Netstat Utilities
- Modifying the Command Prompt Window
- Knowing MAC, IPv4, and IPv6 addresses
- Adding a Loopback Adapter and Class A/B/C IPv4 Addresses
- Monitoring the Denial of Service (DoS) Attack
- Viewing the Application, Security, and System Logs
- Scanning Vulnerabilities Using Microsoft Baseline Security Analyzer
- Adding Users or Groups in a Linux Distribution
- Examining Browsing History Options
- Configuring Pop-up Blocker Settings
- Accessing the Security Settings in Internet Explorer
- Adding a Site to a Security Zone
- Creating a Virtual Switch
- Checking Hyper-V Compatibility
- Enabling Hyper-V in Windows
- Pinning Hyper-V Manager to the Taskbar
- Installing a Linux Distribution in Hyper-V
- Using MD5 Hash Algorithms
- Using the Nslookup and Tracert Utilities
- Capturing Packet Using Wireshark
- Scanning Network Using Nmap
- Using the Ipconfig and Ping Commands
- Creating a New Software Restriction Policy
×