Security Fundamentals-Course Introduction
Introduction to the ATA Program
()
Overview of ATA Track
()
Advice for Completing the ATA Program
()
Security Course Syllabus
()
Security Fundamentals-The Information Security Cycle
Security
()
Risk
()
Security Management Process
()
Security Fundamentals-Physical Security
Physical Security
()
Physical Security Controls
()
Environmental Exposures
()
Security Fundamentals-Security Fundamentals Lab
Analyze Risk for a Physical Facility
Security Fundamentals-Security Fundamentals Review and Graded Assessment
Security Fundamentals Review
()
Authentication and Account Management-Authentication
Authentication
()
Authentication Factors
()
Strong Passwords
()
Authentication and Account Management-Account Management
Multiple and Shared Accounts
()
Account Management
()
Single Sign-On
()
Access Control
()
Authentication and Account Management-Authentication and Account Management Lab
Develop Authentication and Access Control Policies
Authentication and Account Management-Authentication and Account Management Review and Graded Assessment
Authentication and Account Management Review
()
Device Security-Endpoint Security
Hardening Endpoints
()
Patch Management
()
Application Control
()
Device Security-Mobile Device Security
Mobile Devices
()
Location Services
()
Application Control
()
Device Security-Device Security Lab
Personal Security Assessment
Device Security-Device Security Review and Graded Assessment
Device Security Review
()
Encryption-Cryptography Fundamentals
Cryptography Overview
()
Symmetric Encryption
()
Asymmetric Encryption
()
Hashes
()
Encryption-Certificates
Digital Certificates
()
Digital Signatures
()
HTTPS Example
()
Encryption-Public Key Infrastructure (PKI)
Public Key Infrastructure
()
Certificate Life Cycle
()
Key Escrow
()
Encryption-Cryptography Fundamentals Lab
Examining Certificates
Encryption-Cryptography Fundamentals Review and Graded Assessment
Cryptography Fundamentals Review
()
Network Security-Defense in Depth
Network Components
Defense in Depth
()
Firewalls
()
Intrusion Detection and Prevention Systems
()
Network Security-Wireless Networks
Wireless Networks
()
802.11 Standards
Implementing Wireless
()
Securing Wireless
()
Network Security-Extending the Network Perimeter
Remote Access
()
Remote Access Protocols
()
Cloud Computing
()
Network Security-Network Security Lab
Install Packet Tracer
Exploring NAT
Configuring VLANs
Configure Wireless
Network Security-Network Security Review and Graded Assessment
Network Security Review
()
Security Management-Assessing Vulnerabilities
Vulnerability Scanning
()
Ethical Hacking
()
Security Utilities
Security Management-Risk Management
Data Security
()
Security Documents
()
Typical Security Policies
()
Risk
()
Compliance
()
Security Management-Security Management Lab
Explore Vulnerabilities
Security Management-Security Management Review and Graded Assessment
Security Management Review
()
Security Threats-Social Engineering and Web Attacks
Attackers
()
Social Engineering
()
Web Attacks
()
Security Threats-Malware and Other Attacks
Malware
()
Software/Network Attacks
()
Wireless Attacks
()
Password Attacks
()
Security Threats-Security Threats Lab
Explore Hacking
Security Threats-Security Threats Review and Graded Assessment
Security Threats Review
()
Managing Security Incidents-Respond to Security Incidents
Security Incident Management
Incident Response Plans
Stages of Incident Response
Forensics
Managing Security Incidents-Business Continuity
Business Continuity Plan
Redundancy
Testing
Managing Security Incidents-Execute DRPs and Procedures
Disaster Recovery Process
RAID
Backups
Managing Security Incidents-Respond to Security Incidents Lab
Perform Forensics
Managing Security Incidents-Respond to Security Incidents Review and Graded Assessment
Respond to Security Incidents Review
()
Capstone-Capstone
Capstone Introduction
()
Capstone Instructions
()
PowerPoint Tutorial
()