Cybersecurity Essentials | Training of Trainer of Cybersecurity By Admin Post a Comment Training of TrainerGet ConnectedIntroduction to CybersecurityCybersecurity EssentialsIntroduction IoTNetworking Essentials✨Cybersecurity Essentials | skillsforall.comMy Knowledge Check (beta)Course IntroductionCourse IntroductionModule 1: Cybersecurity Threats, Vulnerabilities, and Attacks1.0. Introduction1.1. Common Threats1.2. Deception1.3. Cyber Attacks1.4. Wireless and Mobile Device Attacks1.5. Application Attacks1.6. Cybersecurity Threats, Vulnerabilities, and Attacks SummaryModule 2: Securing Networks2.0. Introduction2.1. Current State of Affairs2.2. Who is Attacking Our Network?2.3. Securing Networks SummaryModule 3: Attacking the Foundation3.0. Introduction3.1. IP PDU Details3.2. IP Vulnerabilities3.3. TCP and UDP Vulnerabilities3.4. Attacking the Foundation SummaryModule 4: Attacking What We Do4.0. Introduction4.1. IP Services4.2. Enterprise Services4.3. Mitigating Common Network Attacks4.4. Attacking What We Do SummaryModule 5: Wireless Network Communication5.0. Introduction5.1. Wireless Communications5.2. WLAN Threats5.3. Secure WLANs5.4. Wireless Network Communication SummaryModule 6: Network Security Infrastructure6.0. Introduction6.1. Security Devices6.2. Security Services6.3. Network Security Infrastructure SummaryCheckpoint Exam: Network SecurityCheckpoint ExamModule 7: The Windows Operating System7.0. Introduction7.1. Windows History7.2. Windows Architecture and Operations7.3. Windows Configuration and Monitoring7.4. Windows Security7.5. The Windows Operating System SummaryModule 8: Linux Overview8.0. Introduction8.1. Linux Basics8.2. Working in the Linux Shell8.3. Linux Servers and Clients8.4. Basic Server Administration8.5. The Linux File System8.6. Working with the Linux GUI8.7. Working on a Linux Host8.8. Linux Basics SummaryModule 9: System and Endpoint Protection9.0. Introduction9.1. Defending Systems and Devices9.2. Antimalware Protection9.3. Host-Based Intrusion Prevention9.4. Application Security9.5. System and Endpoint Protection SummaryModule 10: Cybersecurity Principles, Practices, and Processes10.0. Introduction10.1. The Three Dimensions10.2. States of Data10.3. Cybersecurity Countermeasures10.4. Cybersecurity Principles, Practices, and Processes SummaryCheckpoint Exam: OS and Endpoint SecurityCheckpoint ExamModule 11: Understanding Defense11.0. Introduction11.1. Defense-in-Depth11.2. Cybersecurity Operations Management11.3. Security Policies, Regulations, and Standards11.4. Understanding Defense SummaryModule 12: System and Network Defense12.0. Introduction12.1. Physical Security12.2. Application Security12.3. Network Hardening: Services and Protocols12.4. Network Hardening: Segmentation12.5. Hardening Wireless and Mobile Devices12.6. Cybersecurity Resilience12.7. Embedded and Specialized Systems12.8. System and Network Defense SummaryModule 13: Access Control13.0. Introduction13.1. Access Controls13.2. Access Control Concepts13.3. Account Management13.4. AAA usage and operation13.5. Access Control SummaryCheckpoint Exam: Principles, Practices, and Processes of Network DefenseCheckpoint ExamModule 14: Access Control Lists14.0. Introduction14.1. Introduction to Access Control Lists14.2. Wildcard Masking14.3. Configure ACLs14.4. Named Standard IPv4 ACL Syntax14.5. Implement ACLs14.6. Mitigate Attacks with ACLs14.7. IPv6 ACLs14.8. Access Control Lists SummaryModule 15: Firewall Technologies15.0. Introduction15.1. Secure Networks with Firewalls15.2. Firewalls in Network Design15.3. Firewall Technologies SummaryModule 16: Zone-Based Policy Firewalls16.0. Introduction16.1. ZPF Overview16.2. ZPF Operation16.3. Configure a ZPF16.4. Zone-Based Firewalls SummaryModule 17: Cloud Security17.0. Introduction17.1. Virtualization and Cloud Computing17.2. The Domains of Cloud Security17.3. Cloud Infrastructure Security17.4. Cloud Application Security17.5. Cloud Data Security17.6. Protecting VMs17.7. Cloud Security SummaryModule 18: Cryptography18.0. Introduction18.1. Confidentiality18.2. Obscuring Data18.3. Integrity and Authenticity18.4. Using Hashes18.5. Public Key Cryptography18.6. Authorities and the PKI Trust System18.7. Applications and Impacts of Cryptography18.8. Cryptography SummaryCheckpoint Exam: Firewalls, Cryptography, and Cloud Security.Checkpoint ExamModule 19: Technologies and Protocols19.0. Introduction19.1. Monitoring Common Protocols19.2. Security Technologies19.3. Technologies and Protocols SummaryModule 20: Network Security Data20.0. Introduction20.1. Types of Security Data20.2. End Device Logs20.3. Network Logs20.4. Network Security Data SummaryModule 21: Evaluating Alerts21.0. Introduction21.1. Sources of Alerts21.2. Overview of Alert Evaluation21.3. Evaluating Alerts SummaryCheckpoint Exam: Evaluating Security AlertsCheckpoint ExamModule 22: Governance and Compliance22.0. Introduction22.1. Governance22.2. The Ethics of Cybersecurity22.3. IT Security Management Framework22.4. Governance and Compliance SummaryModule 23: Network Security Testing23.0. Introduction23.1. Security Assessments23.2. Network Security Testing Techniques23.3. Network Security Testing Tools23.4. Penetration Testing23.5. Network Security Testing SummaryModule 24: Threat Intelligence24.0. Introduction24.1. Information Sources24.2. Threat Intelligence Services24.3. Threat Intelligence SummaryModule 25: Endpoint Vulnerability Assessment25.0. Introduction25.1. Network and Server Profiling25.2. Common Vulnerability Scoring System (CVSS)25.3. Secure Device Management25.4. Endpoint Vulnerability Assessment SummaryModule 26: Risk Management and Security Controls26.0. Introduction26.1. Risk Management26.2. Risk Assessment26.3. Security Controls26.4. Risk Management and Security Controls SummaryCheckpoint Exam: Vulnerability Assessment and Risk ManagementCheckpoint ExamModule 27: Digital Forensics and Incident Analysis and Response27.0. Introduction27.1. Evidence Handling and Attack Attribution27.2. The Cyber Kill Chain27.3. The Diamond Model of Intrusion Analysis27.4. Incident Response27.5. Disaster Recovery27.6. Digital Forensics and Incident Analysis and Response SummaryCheckpoint Exam: Incident ResponseCheckpoint ExamCybersecurity Essentials Course Final ExamCourse Final ExamEnd of Course Survey Share : Post a Comment for "Cybersecurity Essentials | Training of Trainer of Cybersecurity"
Post a Comment for "Cybersecurity Essentials | Training of Trainer of Cybersecurity"