Example Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- The Power of Control, Different Types of Control (13:26)
- Different Types of Identity / Identification (3:45)
- Account Access Control and Privilege Management (7:27)
- File Access Control (Windows, Linux) (6:22)
- AAA Servers (7:18)
- Different Types of Authentication and Authentication Management (11:32)
- Different Existing Authentication and Authorization Mechanisms (12:56)
- Account Control Practices and Policies (10:16)
- Unlimited Updates
Available in
days
days
after you enroll
- OSI Model (3:56)
- Honeypots, Proxy Servers, Jump Servers, Load Balancers (10:18)
- Routers, Switches, ACL, Loop Protection (5:09)
- Firewalls (5:48)
- Network Segmentation (6:28)
- IDS, IPS, NAC (7:56)
- DNS, DNS Security (6:31)
- IP Addresses (5:32)
- Dynamic Host Configuration Protocol (DHCP) (3:30)
- Virtual Private Network (VPN) (9:04)
- Networking Tools / Commands (22:12)
- File Manipulation Tools / Commands (8:52)
- Forensic Tools / Commands (5:13)
- Course Check-In
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Different Types of Attackers (5:14)
- Different Types of Malware (8:08)
- Social Engineering, Phishing (8:25)
- Network Attacks (7:24)
- Physical Attacks (4:01)
- Password Attacks (7:08)
- Overflow Attacks, Pointer Dereference, Error Handling (6:48)
- Application Attacks, Injection Attacks (8:42)
- Zero Days and Weak Configurations (4:18)
- Hijacking Attacks (2:58)
- Cryptographic Attacks (2:44)
- Third Party Attacks (4:10)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll