Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Core Cyber Security Concepts
1. Attacks, Threats and Vulnerabilities
1. Compare and Contrast Information Security Roles (6:32)
111CON~1
2. Compare and Contrast Security Controls and Framework Types (9:10)
2.1 2.Compare and Contrast Security Controls and Framework Types
3. Types of Threat Actors and Attack Vectors (6:27)
3.1 3.Types of Threat Actors and Attack Vectors
4. Threat Intelligence & Threat Research (9:37)
4.1 4.Threat Intelligence & Threat research Sources
5. Commands used in Assessing Network layout & Security (10:07)
5.1 5. Commands used in Assessing Network layout & Security
6. Security concerns regarding Vulnerabilities (5:38)
6.1 6. Security concerns regarding Vulnerabilities
7. Vulnerability Scanning Techniques and Vulnerability scores & exposures (5:24)
7.1 7.Vulnerability Scanning Techniques and Vulnerability scores & exposures
8. Social Engineering Attacks & Principles (12:08)
8.1 9.Social Engineering Attacks & Principles
9. Malware and Types of malwares (6:51)
9.1 10.Malware and Types of malwares
2. Overview of Penetration Testing
1. Penetration Testing Concepts (13:13)
2. Information gathering (8:35)
2.1 8.Penetration Testing Concepts in detail
3. Scanning (4:16)
4. Exploitation (2:15)
5. Post Exploitation Maintaining access (4:22)
6. Reporting (1:26)
3. Architecture and Design
1. Encryption, Cryptography, types of Cryptography and Cryptographic algorithms (21:14)
1.1 1.Encryption, Cryptography it's types and Cryptographic algorithms
2. Digital Signatures & Digital Certificates (10:29)
2.1 2. Digital Signatures & Digital Certificates
3. Digital Certificate Authorities (3:52)
3.1 3. Digital certificate Authorities
4. Public Key Infastructure (5:36)
4.1 4. Public Key Infrastructure - PKI
5. PKI Management (10:56)
5.1 5. PKI Management
6. Identification, Authentication & Access Control Systems (3:44)
6.1 6.Identification, Authentication & Access Control Systems
7. Knowledge based Authentication (13:54)
8. Technology behind Secure Authentication (8:55)
8.1 8. Technology implementing Secure Authentication
9. Biometric Authentication (16:17)
9.1 9. Biometric Authentication Concepts
4. Implementation
1. Wireless Networks & Security Controls (14:40)
2. Identity Management Controls (8:58)
2.1 11. Identity Management Controls
3. Cloud, Virtualization, BYOD & Security Testing (14:53)
3.1 Cloud, Virtualization, BYOD and Security Testing
4. Implementing Personnel Policies (5:44)
4.1 Implementing Personnel Policies
5. Account Policies & Authorization (4:23)
5.1 12.Implementing Account Policies & Authorization Solutions
5. Operations and Incident Response
1. Incident Management (5:54)
1.1 Incident Management
2. Digital Forensics (5:13)
2.1 Digital Forensics
6. Governance, Risk and Compliance
1. Information Security Governance (6:02)
1.1 Information Security Governance
2. Information Security programs (10:34)
2.1 Information Security Programs
3. Risk Management (5:55)
3.1 Risk Management
3.1 3.Types of Threat Actors and Attack Vectors
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock