-
Domain 1 – General Security Concepts
29 Lessons-
StartPre-Quiz (What Do You Already Know?
-
PreviewInformation Security & the CIA Triad
-
StartFrameworks, Gap Analysis and IAM
-
StartSecurity Control Types (Categories & Functions)
-
StartRoles, Responsibilities & Organizational Security
-
StartPost-Quiz (What Have You Learnt?)
-
StartPre-Quiz (What do you know?)
-
StartExplain Cryptographic Solutions
-
StartAsymmetric Encryption
-
StartHashing and Digital Signature
-
StartPublic Key Infrastructure (PKI)
-
StartPost-Quiz (What Have You Learnt?)
-
StartPre-Quiz (What Do You Know?)
-
StartDigital Certificates — Explained
-
StartSubject Name Attributes & Certificate Revocation
-
StartKey Management & Crypto-processors
-
StartEncryption Supporting Confidentiality - Part 1
-
StartEncryption Supporting Confidentiality Part 2
-
StartPost-Quiz (What Have You Learnt?)
-
StartPre-Quiz (What do you know?)
-
StartTransport Encryption, Key Exchange & Blockchain
-
StartCOOP Keeping the Lights On
-
PreviewCapacity Planning Risks
-
StartHigh Availability and Clustering
-
StartHA & Deception Strategies
-
StartDiversity in Vendor & Defense in Depth
-
StartPhysical Security: Your First Layer of Defense
-
PreviewGateways and Locks
-
StartChange Management
-
-
Domain 2 - Threat Vulnerability and Mitigations
20 Lessons-
PreviewThreat Actors Part 1
-
StartThreat Actors Part 2
-
StartThreat and Software Vectors
-
StartNetwork Vectors
-
StartPost-Quiz (What Have You Learnt?)
-
StartPre-Quiz(What do you know?)
-
StartLure-Based & Message-Based Vectors
-
StartSupply Chain Attack Surface
-
PreviewSocial Engineering
-
StartPhishing and Pharming
-
StartImplementing Endpoint Security
-
StartAdvanced Endpoint Protection – Configurations and Techniques
-
StartAnalyzing Indicators of Malicious Activity
-
StartAnalyzing Indicators of Malicious Activity Part 2
-
StartPost-Quiz(What Have You Learnt?)
-
StartPre-Quiz (What Do You Know?)
-
StartUnderstanding Physical and Network Attacks
-
StartDNS and Wireless Attacks
-
StartWeb Application Attack Overview
-
StartInjection Attacks
-
-
Domain 3 - Enterprise Network Architecture
26 Lessons-
StartEnterprise Network Architecture
-
PreviewIntroduction to the OSI model – Using real world examples
-
StartSwitching Infrastructure Considerations
-
StartRouting Infrastructure Considerations
-
StartArchitecture Considerations and Air Gapped System
-
StartPost-Quiz (What Have You Learnt?)
-
StartPre-Quiz(What do you know?)
-
StartPort Security
-
StartNetwork Security Device Placement and Monitoring
-
StartFirewall Behavior & Placement
-
StartLayer 4 & 7 Firewalls (and Proxies)
-
StartIDS, IPS, Next Gen Firewalls and Unified Threat Management
-
StartLoad Balancers and Web Application Firewalls
-
StartSecure Remote Connection and Tunneling
-
StartInternet Key Exchange (IKE) — Making Secure Tunnels Work
-
StartSecure Shell (SSH) & Secure Remote Management
-
StartUnderstanding Cloud Infrastructure
-
StartCloud Roles and Responsibilities _Centralized and Decentralized Computing
-
StartResilient Architecture and Cloud virtualization
-
StartCloud Automation Technologies and Software Defined Network (SDN)
-
StartCloud Considerations Continued
-
StartEmbedded Systems and Zero Trust Architecture
-
StartIndustrial Control Systems (ICS) & SCADA Explained
-
PreviewUnderstanding the Internet of Things (IoT)
-
StartDeperimeterization and Zero Trust
-
StartZero Trust Security Deeper Dive
-
-
Domain 4: Security Operations
39 Lessons-
StartAuthentication: Keeping Accounts Safe
-
StartPassword Managers & Multifactor Authentication
-
StartPost-Quiz (What Have You Learnt?)
-
PreviewBiometric and Hard Token Authentication
-
StartPre-Quiz(What Do You Know?)
-
StartSoft Tokens & Passwordless Authentication
-
StartAuthorization and Access Control Models
-
StartRule-Based Access Control & Account Provisioning
-
StartAccount Attributes, Access Policies & Privileged Access Management
-
StartIdentity Management – Local, Network, and Federated Access
-
PreviewSingle Sign On with Kerberos
-
StartSecurity Assertion Markup Language (SAML)
-
StartResiliency and Asset Management
-
StartAsset Protection Concepts
-
StartAdvanced Data Protection and Destruction
-
StartVulnerability Management
-
StartVulnerability Scanning Fundamentals
-
StartUsing Threat Feeds for Smarter Vulnerability Management
-
StartVulnerability Management Procedure
-
StartBaselines, Hardening & NAC
-
StartWi-Fi Security
-
StartPost-Quiz (What Have You Learnt?)
-
StartPre-Quiz (What Do You Know?)
-
StartACL, IDS, IP and Web Filtering
-
StartIDS and IPS Methods
-
StartHardening Specialized Devices
-
StartLocation Services and Mobile Connectivity
-
StartSecure Protocols & Application Development
-
StartPost-Quiz (What Have You Learnt?)
-
StartFile Transfer and Email Security
-
StartWeb Application Security Concepts
-
StartWeb Application Security Concept – Part 2
-
StartIncident Response – Part 1
-
StartIncident Response – Part 2
-
StartDigital Forensics Investigating Cyber Eviden
-
StartUnderstanding Data Sources (Logs) for Incident Response
-
StartManaging Security Data with SIEM
-
StartMonitoring Infrastructure
-
StartIntroduction to Automation and Orchestration
-
-
Domain 5: Security program management and oversight
13 Lessons-
StartPre-Quiz (What Do You Know?)
-
PreviewPolicies, Standards, and Procedures
-
StartLegal Environment
-
StartUnderstanding Risk Management, Audits, and Assessments
-
StartGame -- Reboot Protocol
-
StartRisk Management Strategies
-
StartThird-Party Risk Assessment
-
StartEvaluating Security with Audits, Assessments, and Pen Testing
-
StartUnderstanding Privacy, Sensitivity, and Data Labels
-
StartPrivacy Data_What You Need to Know
-
StartUnderstanding Security Compliance and Data Protection
-
StartPersonnel Policies & Why They Matter
-
StartPost-Quiz (What Have You Learnt?)
-

