Example Curriculum
Introduction
Available in
days
days
after you enroll
Introduction to Security Basics
Available in
days
days
after you enroll
Authentication and Access Control
Available in
days
days
after you enroll
- The Power of Control, Different Types of Control (13:26)
- Different Types of Identity / Identification (3:45)
- Account Access Control and Privilege Management (7:27)
- File Access Control (Windows, Linux) (6:22)
- AAA Servers (7:18)
- Different Types of Authentication and Authentication Management (11:32)
- Different Existing Authentication and Authorization Mechanisms (12:56)
- Account Control Practices and Policies (10:16)
- Unlimited Updates
Secure Network Design and Concept
Available in
days
days
after you enroll
- OSI Model (3:56)
- Honeypots, Proxy Servers, Jump Servers, Load Balancers (10:18)
- Routers, Switches, ACL, Loop Protection (5:09)
- Firewalls (5:48)
- Network Segmentation (6:28)
- IDS, IPS, NAC (7:56)
- DNS, DNS Security (6:31)
- IP Addresses (5:32)
- Dynamic Host Configuration Protocol (DHCP) (3:30)
- Virtual Private Network (VPN) (9:04)
- Networking Tools / Commands (22:12)
- File Manipulation Tools / Commands (8:52)
- Forensic Tools / Commands (5:13)
- Course Check-In
Security Protocols
Available in
days
days
after you enroll
Wireless and Mobile Security
Available in
days
days
after you enroll
Virtualization and Cloud Security
Available in
days
days
after you enroll
Physical Security and Facilities Security
Available in
days
days
after you enroll
Monitoring, Scanning, Hacking
Available in
days
days
after you enroll
Threats, Attacks, Vulnerabilities
Available in
days
days
after you enroll
- Different Types of Attackers (5:14)
- Different Types of Malware (8:08)
- Social Engineering, Phishing (8:25)
- Network Attacks (7:24)
- Physical Attacks (4:01)
- Password Attacks (7:08)
- Overflow Attacks, Pointer Dereference, Error Handling (6:48)
- Application Attacks, Injection Attacks (8:42)
- Zero Days and Weak Configurations (4:18)
- Hijacking Attacks (2:58)
- Cryptographic Attacks (2:44)
- Third Party Attacks (4:10)
System Hardening and Application Testing
Available in
days
days
after you enroll
Risk Management
Available in
days
days
after you enroll
Incident Responding and Forensics
Available in
days
days
after you enroll
Cryptography and Public Key Infrastructure (PKI)
Available in
days
days
after you enroll
Practice Test
Available in
days
days
after you enroll
Where To Go From Here?
Available in
days
days
after you enroll