Course Introduction
Introduction
Module 1:General Security Concepts
General Security Concepts
Security+ Exam Domains
Basic Terminology
Additional Security Goals
Host Security
Additional Security Concepts
Module Close
Module 2: Organizational Security
Organizational Security
What is a Security Program
Operational Process
Password Policies
Demo - Password Policies
Social Engineering
Security Policies
Concepts the Support Policies
Human Resources Policies
Module Close
Module 3:Privacy, Ethics and Legal issues
Privacy, Ethics and Legal issues
Cybercrime
Reactions to Cybercrime Part1
Reactions to Cybercrime Part2
Module Close
Module 4 Cryptography
Cryptography
Cryptography Explained
Ciphers
Cryptographic Math and Hashing
Algorithms and Encryption Part1
Algorithms and Encryption Part2
Algorithms and Encryption Part3
Symmetric and Asymmetric Working Together
Digital Signatures
Module Close
Module 5: Public Key Infrastructure
Public Key Infrastructure
Basics of Public Key Infrastructures
Certificate Hierarchies
Trust and Certificate Verification
Types of Certificates and Extensions
Certificate Revocation List
Key Protection
Key Recovery
Trust Models
Module Close
Module 6 Standards and Protocols
Standards and Protocols
Standards and Protocols Supporting PKI
SSL and TLS
S/MIME
IPsec
Common Criteria - CC
Module Close
Module 7 Physical Security
Physical Security
Physical Security Measures
Access Controls and Monitoring
Biometrics
Module Close
Module 8 Infrastructure Security
Infrastructure Security
Infrastructure Security - Printers and Workstations
Servers and Devices
VLANs and Firewalls
Securing Wireless Access Points
VPN - Network Access Control
Network Monitoring
Handling Big Data and Physical Security
Security Zones, VLANs and NAT
Virtualization and Cloud Computing
Module Close
Module 9 Authentication and Remote Access
Authentication and Remote Access
Remote Access and Kerberos
Alternatives to Passwords
Other Protocols
Federated Authentication
HOTP and TOTP
Remote Access Protocols Authentication
Module Close
Module 10 Wireless Security
Wireless Security
Wireless Networking
Bluetooth
Controlling the Radio Waves
WPA Encryption
Module Close
Module 11 Intrusion Detection Systems
Intrusion Detection Systems
Intrusion Detection Systems - HIDs
HIDs Advancements and Anti-Virus
Demo - Windows Defender
Network-Based IDSs
Content-Based Signatures and Proxy Servers
Protocol Analyzers
Anti-Spam Techniques
Module Close
Module 12 Security Baselines
Security Baselines
Overview of Baselines
Operating System Hardening
Demo - Windows Update
Network Hardening
Application Hardening and Patch Management Part1
Application Hardening and Patch Management Part2
Module Close
Module 13 Attacks and Malicious Software
Attacks and Malicious Software
Avenues of Attack
Minimizing Possible Avenues of Attack
DDOS Mitigation
Null Sessions and Privilege Escalation
IP Address Spoofing
Replay Attacks and TCP/IP Hijacking
Password Attacks and Software Exploitation
Viruses
Other Malware
Module Close
Module 14 E-mail and Instant Messaging
E-mail and Instant Messaging
End User Issues with Email
Enterprise Mitigation Techniques
Module Close
Module 15 Web Components
Web Components
Web Components and Concerns
HTTP and HTTPS
Code-Based Vulnerabilities
Mitigations and Cookies
Application-Based Weaknesses
Module Close
Module 16 Disaster Recovery and Business Continuity
Disaster Recovery and Business Continuity
Disaster Recovery
Backups
Storage Considerations
Raid
Module Close
Module 17 Risk Management
Risk Management
Risk Management Key Terms
Risk Management Process
General Risk Management Model
Software Engineering Institute Model
Common Objective Approach
Security Integration Issues with Third Parties
Module Close
Module 18 Change Management
Change Management
Change Management Procedures
Change Management Workflow
Maintaining Code Integrity
Module Close
Module 19 Privilege Management
Privilege Management
Privilege Management Details
Centralized Management
Access Control Models
Module Close
Module 20 Computer Forensics
Computer Forensics
Computer Forensics and Evidence
The Investigative Process
Module Close