Description
Course 01 – Identifying Security Fundamentals 1hr 20m
Topic A – Identify Information Security Concepts
Demo 1 – Identifying Information Security Basics
Topic B – Identify Basic Security Controls
Demo 1 – Identifying Basic Security Controls
Topic C – Identify Basic Authentication and Authorization Concepts
Demo 1 – Identifying Basic Authentication and Authorization Concepts
Topic D – Identify Basic Cryptography Concepts
Demo 1 – Identifying Basic Cryptography Concepts
Course 02 – Analyzing Risk 45m
Topic A – Analyze Organizational Risk
Demo 1 – Analyzing Risks to the Organization
Topic B – Malware
Demo 1 – Performing a Business Impact Analysis
Course 03 – Identifying Security Threats 2hr 48m
Topic A – Identify Types of Attackers
Demo 1 – Identifying Types of Attackers
Topic B – Identify Social Engineering Attacks
Demo 1 – Identifying Social Engineering Attacks
Topic C – Identify Malware
Demo 1 – Identifying Types of Malware
Topic D – Identify Software-Based Threats Demo 1 – Identifying Password Attacks
Topic E – Identify Network-Based Threats Demo 1 – Identifying Threats to DNS
Demo 2 – Identifying Port Scanning Threats
Topic F – Identify Wireless Threats Demo 1 – Identifying Wireless Threats
Topic G – Identify Physical Threats Demo 1 – Identifying Physical Threats
Course 04 – Conducting Security Assessments 1hr 3m
Topic A – Configure Security Parameters on Network Devices and Technologies
Demo 1 – Configuring Firewall Parameters
Demo 2 – Configuring a Network Intrusion Detection System
Topic B – Network Design Elements and Components
Topic C – Implement Networking Protocols and Services
Demo 1 – Securing Network Traffic Using IP Security
Course 05 – Implementing Host and Software Security 1hr 17m
Topic A – Access Control and Authentication Services
Demo 1 – Backing Up Active Directory
Topic B – Implement Account Management Security Controls
Demo 1 – Account Management Security Controls
Course 06 – Implementing Network Security 57m
Topic A – Install a CA Hierarchy
Demo 1 – Installing a Certificate Authority
Topic B – Enroll Certificates
Demo 1 – Enrolling for Certificates
Topic C – Secure Network Traffic by Using Certificates
Topic D – Renew Certificates
Topic E – Back Up and Restore Certificates and Private Keys
Topic F – Revoke Certificates
Demo 1 – Revoking Certificates
Course 07 – Managing Identity and Access Security 50m
Topic A – Physical Security
Topic B – Legal Compliance
Topic C – Security Awareness and Training
Topic D – Integrate Systems and Data with Third Parties
Course 08 – Implementing Cryptography 50m
Topic A – Risk Analysis
Topic B – Implement Vulnerability Assessment Tools and Techniques
Topic C – Scan for Vulnerabilities
Demo 1 – Scanning for Port Vulnerabilities
Demo 2 – Scanning for Password Vulnerabilities
Topic D – Mitigation and Deterrent Techniques
Demo 1 – Capturing Network Data
Course 09 – Implementing Operational Security 33m
Topic A – Respond to Security Incidents
Topic B – Recover from a Security Incident
Course 10 – Addressing Security Issues 50m
Topic A – Business Continuity
Topic B – Plan for Disaster Recovery
Demo 1 – Creating a RAID Array Through Software
Topic C – Execute DRPs and Procedures
Course 11 – Ensuring Business Continuity 50m
Topic A – Business Continuity
Topic B – Plan for Disaster Recovery
Demo 1 – Creating a RAID Array Through Software
Topic C – Execute DRPs and Procedures
Training Final Exam