Introduction to Cybersecurity-Course Introduction
Course Introduction
()
Introduction to Cybersecurity-Overview
Module Objectives
()
Define Cybersecurity
()
Inspect the CIA Triad
()
Defend with Security Controls
()
Control Types Quiz
()
Reasons for Strong Defenses
()
Identify Assets To Protect
()
End User Devices
()
Match the Terms
()
Module Summary
()
Laws, Policies, and Frameworks-Overview
Module Objectives
()
GRC In the Organization
()
Cybersecurity Roles and Groups
()
Managing Risk
()
Match the Terms
()
Commonly Used Frameworks and Standards
()
Laws Policies Frameworks Quiz
()
Module Summary
()
Threats, Attacks, and Vulnerabilities-Overview
Module Objectives
()
Examining the Elements Of Risk
()
Demo Using CVE and CWE
()
Common Vulnerability Scoring System
()
Lab: Using CVSS to Score a Vulnerability
()
Identifying Threat Actors
()
Match the Terms
()
Inspecting Types Of Attacks
()
Demo SQL Injection In Action
()
Cross-site Scripting
()
Demo Cross-site Scripting in Action
()
Client-side Attacks
()
Demo Sniffing Cleartext Credentials with Wireshark
()
Other Network Attacks
()
Social Engineering
()
Threats Attacks and Vulnerabilities Quiz
()
Module Summary
()
Cybersecurity Defenses-Overview
Module Objectives
()
Securing the Organization
()
Authenticating and Authorizing Access
()
User Security Training
()
Protecting the Endpoints
()
Match the Terms
()
Defending Networks
()
Lab: Zero Trust in Action
()
Implementing Secure Applications
()
Securing the Cloud
()
Securing Data with Cryptography
()
Demo Hashing and Collisions
()
Encryption
()
Demo Symmetric Key Encryption Using Cryptool
()
Public Key Encryption
()
Lab: Asymmetric Encryption to Sign and Verify Data
()
Cybersecurity Defenses Quiz
()
Module Summary
()
Ensuring Organization Security-Overview
Module Objectives
()
Managing Ongoing Risk
()
Performing Security Assessments
()
Demo Port Scanning Using Nmap
()
Vulnerability Scanners
()
Demo Web Application Scanning Using Vega
()
Vulnerability Management Lifecycle
()
Match the Terms
()
Utilizing Threat Models and Tools
()
Lab: Exploring ATT&CK from MITRE
()
Continuous Diagnostics and Mitigation
()
Ensuring Organization Security Quiz
()
Module Summary
()
Summary-Overview
Course Summary
()