Chat

Suggestions:

Mystic Lotus

IT Security: Defense against the digital dark arts



Google Cloud Platform IT Security: Defense against the digital dark arts

Be A RAINBOW in Someone's Cloud.









1

Course Introduction




2

The CIA Triad




3

Essential Security Terms




4

Malicious Software




5

Malware




6

Network Attacks




7

Denial-of-Service




8

Client-Side Attacks




9

Password Attacks




10

Deceptive Attacks




11

Cryptography




12

Symmetric Cryptography




13

Symmetric Encryption Algorithms




14

What a Security Engineer Does




15

Asymmetric Cryptography




16

Asymmetric Encryption Algorithms




17

Hashing




18

Hashing Algorithms




19

Hashing Algorithms (continued)




20

Public Key Infrastructure




21

Cryptography in Action




22

Securing Network Traffic




23

Cryptographic Hardware




24

Authentication Best Practices




25

Multifactor Authentication




26

Certificates




27

LDAP




28

RADIUS




29

Kerberos




30

TACACS+




31

Single Sign-On




32

Path to IT




33

Authorization and Access Control Methods




34

Access Control




35

Access Control List




36

Tracking Usage and Access




37

Important Skills in Security




38

Network Hardening Best Practices




39

Network Hardware Hardening




40

Network Software Hardening




41

WEP Encryption and Why You Shouldn't Use It




42

Let's Get Rid of WEP! WPA/WPA2




43

Wireless Hardening




44

Social Engineering




45

Sniffing the Network




46

Wireshark and tcpdump




47

Intrusion/Detection Prevention Systems




48

Introduction to Defense in Depth




49

Disabling Unnecessary Components




50

Host-Based Firewall




51

Logging and Auditing




52

Anti-malware Protection




53

Disk Encryption




54

Self Learning




55

Software Patch Management




56

Application Policies




57

Security Goals




58

Measuring and Assessing Risk




59

Privacy Policy




60

User Habits




61

Third-Party Security




62

Security Training




63

Grit




64

Incident Reporting and Analysis




65

Incident Response and Recovery




66

Mobile Security and Privacy




67

Security