1 | Course Introduction
|
2 | The CIA Triad
|
3 | Essential Security Terms
|
4 | Malicious Software
|
5 | Malware
|
6 | Network Attacks
|
7 | Denial-of-Service
|
8 | Client-Side Attacks
|
9 | Password Attacks
|
10 | Deceptive Attacks
|
11 | Cryptography
|
12 | Symmetric Cryptography
|
13 | Symmetric Encryption Algorithms
|
14 | What a Security Engineer Does
|
15 | Asymmetric Cryptography
|
16 | Asymmetric Encryption Algorithms
|
17 | Hashing
|
18 | Hashing Algorithms
|
19 | Hashing Algorithms (continued)
|
20 | Public Key Infrastructure
|
21 | Cryptography in Action
|
22 | Securing Network Traffic
|
23 | Cryptographic Hardware
|
24 | Authentication Best Practices
|
25 | Multifactor Authentication
|
26 | Certificates
|
27 | LDAP
|
28 | RADIUS
|
29 | Kerberos
|
30 | TACACS+
|
31 | Single Sign-On
|
32 | Path to IT
|
33 | Authorization and Access Control Methods
|
34 | Access Control
|
35 | Access Control List
|
36 | Tracking Usage and Access
|
37 | Important Skills in Security
|
38 | Network Hardening Best Practices
|
39 | Network Hardware Hardening
|
40 | Network Software Hardening
|
41 | WEP Encryption and Why You Shouldn't Use It
|
42 | Let's Get Rid of WEP! WPA/WPA2
|
43 | Wireless Hardening
|
44 | Social Engineering
|
45 | Sniffing the Network
|
46 | Wireshark and tcpdump
|
47 | Intrusion/Detection Prevention Systems
|
48 | Introduction to Defense in Depth
|
49 | Disabling Unnecessary Components
|
50 | Host-Based Firewall
|
51 | Logging and Auditing
|
52 | Anti-malware Protection
|
53 | Disk Encryption
|
54 | Self Learning
|
55 | Software Patch Management
|
56 | Application Policies
|
57 | Security Goals
|
58 | Measuring and Assessing Risk
|
59 | Privacy Policy
|
60 | User Habits
|
61 | Third-Party Security
|
62 | Security Training
|
63 | Grit
|
64 | Incident Reporting and Analysis
|
65 | Incident Response and Recovery
|
66 | Mobile Security and Privacy
|
67 | Security
|