Zenler Player
Your course is loading. Hang tight.
Security+ Fun: Pass the Exam, Learn the Job
Back to curriculum
0% Complete
0% Complete
Pre-Quiz (What Do You Already Know?
Information Security & the CIA Triad
Frameworks, Gap Analysis and IAM
Security Control Types (Categories & Functions)
Roles, Responsibilities & Organizational Security
Post-Quiz (What Have You Learnt?)
Pre-Quiz (What do you know?)
Explain Cryptographic Solutions
Asymmetric Encryption
Hashing and Digital Signature
Public Key Infrastructure (PKI)
Post-Quiz (What Have You Learnt?)
Pre-Quiz (What Do You Know?)
Digital Certificates — Explained
Subject Name Attributes & Certificate Revocation
Key Management & Crypto-processors
Encryption Supporting Confidentiality - Part 1
Encryption Supporting Confidentiality Part 2
Post-Quiz (What Have You Learnt?)
Pre-Quiz (What do you know?)
Transport Encryption, Key Exchange & Blockchain
COOP Keeping the Lights On
Capacity Planning Risks
High Availability and Clustering
HA & Deception Strategies
Diversity in Vendor & Defense in Depth
Physical Security: Your First Layer of Defense
Gateways and Locks
Change Management
Threat Actors Part 1
Threat Actors Part 2
Threat and Software Vectors
Network Vectors
Post-Quiz (What Have You Learnt?)
Pre-Quiz(What do you know?)
Lure-Based & Message-Based Vectors
Supply Chain Attack Surface
Social Engineering
Phishing and Pharming
Implementing Endpoint Security
Advanced Endpoint Protection – Configurations and Techniques
Analyzing Indicators of Malicious Activity
Analyzing Indicators of Malicious Activity Part 2
Post-Quiz(What Have You Learnt?)
Pre-Quiz (What Do You Know?)
Understanding Physical and Network Attacks
DNS and Wireless Attacks
Web Application Attack Overview
Injection Attacks
Enterprise Network Architecture
Introduction to the OSI model – Using real world examples
Switching Infrastructure Considerations
Routing Infrastructure Considerations
Architecture Considerations and Air Gapped System
Post-Quiz (What Have You Learnt?)
Pre-Quiz(What do you know?)
Port Security
Network Security Device Placement and Monitoring
Firewall Behavior & Placement
Layer 4 & 7 Firewalls (and Proxies)
IDS, IPS, Next Gen Firewalls and Unified Threat Management
Load Balancers and Web Application Firewalls
Secure Remote Connection and Tunneling
Internet Key Exchange (IKE) — Making Secure Tunnels Work
Secure Shell (SSH) & Secure Remote Management
Understanding Cloud Infrastructure
Cloud Roles and Responsibilities _Centralized and Decentralized Computing
Resilient Architecture and Cloud virtualization
Cloud Automation Technologies and Software Defined Network (SDN)
Cloud Considerations Continued
Embedded Systems and Zero Trust Architecture
Industrial Control Systems (ICS) & SCADA Explained
Understanding the Internet of Things (IoT)
Deperimeterization and Zero Trust
Zero Trust Security Deeper Dive
Authentication: Keeping Accounts Safe
Password Managers & Multifactor Authentication
Post-Quiz (What Have You Learnt?)
Biometric and Hard Token Authentication
Pre-Quiz(What Do You Know?)
Soft Tokens & Passwordless Authentication
Authorization and Access Control Models
Rule-Based Access Control & Account Provisioning
Account Attributes, Access Policies & Privileged Access Management
Identity Management – Local, Network, and Federated Access
Single Sign On with Kerberos
Security Assertion Markup Language (SAML)
Resiliency and Asset Management
Asset Protection Concepts
Advanced Data Protection and Destruction
Vulnerability Management
Vulnerability Scanning Fundamentals
Using Threat Feeds for Smarter Vulnerability Management
Vulnerability Management Procedure
Baselines, Hardening & NAC
Wi-Fi Security
Post-Quiz (What Have You Learnt?)
Pre-Quiz (What Do You Know?)
ACL, IDS, IP and Web Filtering
IDS and IPS Methods
Hardening Specialized Devices
Location Services and Mobile Connectivity
Secure Protocols & Application Development
Post-Quiz (What Have You Learnt?)
File Transfer and Email Security
Web Application Security Concepts
Web Application Security Concept – Part 2
Incident Response – Part 1
Incident Response – Part 2
Digital Forensics Investigating Cyber Eviden
Understanding Data Sources (Logs) for Incident Response
Managing Security Data with SIEM
Monitoring Infrastructure
Introduction to Automation and Orchestration
Pre-Quiz (What Do You Know?)
Policies, Standards, and Procedures
Legal Environment
Understanding Risk Management, Audits, and Assessments
Game -- Reboot Protocol
Risk Management Strategies
Third-Party Risk Assessment
Evaluating Security with Audits, Assessments, and Pen Testing
Understanding Privacy, Sensitivity, and Data Labels
Privacy Data_What You Need to Know
Understanding Security Compliance and Data Protection
Personnel Policies & Why They Matter
Post-Quiz (What Have You Learnt?)
Flash Cards
Secure Runner
Platformer Pete
Domain 1 – General Security Concepts
Pre-Quiz (What Do You Already Know?
Information Security & the CIA Triad
Preview
Frameworks, Gap Analysis and IAM
Security Control Types (Categories & Functions)
Roles, Responsibilities & Organizational Security
Post-Quiz (What Have You Learnt?)
Pre-Quiz (What do you know?)
Explain Cryptographic Solutions
Asymmetric Encryption
Hashing and Digital Signature
Public Key Infrastructure (PKI)
Post-Quiz (What Have You Learnt?)
Pre-Quiz (What Do You Know?)
Digital Certificates — Explained
Subject Name Attributes & Certificate Revocation
Key Management & Crypto-processors
Encryption Supporting Confidentiality - Part 1
Encryption Supporting Confidentiality Part 2
Post-Quiz (What Have You Learnt?)
Pre-Quiz (What do you know?)
Transport Encryption, Key Exchange & Blockchain
COOP Keeping the Lights On
Capacity Planning Risks
Preview
High Availability and Clustering
HA & Deception Strategies
Diversity in Vendor & Defense in Depth
Physical Security: Your First Layer of Defense
Gateways and Locks
Preview
Change Management
Domain 2 - Threat Vulnerability and Mitigations
Threat Actors Part 1
Preview
Threat Actors Part 2
Threat and Software Vectors
Network Vectors
Post-Quiz (What Have You Learnt?)
Pre-Quiz(What do you know?)
Lure-Based & Message-Based Vectors
Supply Chain Attack Surface
Social Engineering
Preview
Phishing and Pharming
Implementing Endpoint Security
Advanced Endpoint Protection – Configurations and Techniques
Analyzing Indicators of Malicious Activity
Analyzing Indicators of Malicious Activity Part 2
Post-Quiz(What Have You Learnt?)
Pre-Quiz (What Do You Know?)
Understanding Physical and Network Attacks
DNS and Wireless Attacks
Web Application Attack Overview
Injection Attacks
Domain 3 - Enterprise Network Architecture
Enterprise Network Architecture
Introduction to the OSI model – Using real world examples
Preview
Switching Infrastructure Considerations
Routing Infrastructure Considerations
Architecture Considerations and Air Gapped System
Post-Quiz (What Have You Learnt?)
Pre-Quiz(What do you know?)
Port Security
Network Security Device Placement and Monitoring
Firewall Behavior & Placement
Layer 4 & 7 Firewalls (and Proxies)
IDS, IPS, Next Gen Firewalls and Unified Threat Management
Load Balancers and Web Application Firewalls
Secure Remote Connection and Tunneling
Internet Key Exchange (IKE) — Making Secure Tunnels Work
Secure Shell (SSH) & Secure Remote Management
Understanding Cloud Infrastructure
Cloud Roles and Responsibilities _Centralized and Decentralized Computing
Resilient Architecture and Cloud virtualization
Cloud Automation Technologies and Software Defined Network (SDN)
Cloud Considerations Continued
Embedded Systems and Zero Trust Architecture
Industrial Control Systems (ICS) & SCADA Explained
Understanding the Internet of Things (IoT)
Preview
Deperimeterization and Zero Trust
Zero Trust Security Deeper Dive
Domain 4: Security Operations
Authentication: Keeping Accounts Safe
Password Managers & Multifactor Authentication
Post-Quiz (What Have You Learnt?)
Biometric and Hard Token Authentication
Preview
Pre-Quiz(What Do You Know?)
Soft Tokens & Passwordless Authentication
Authorization and Access Control Models
Rule-Based Access Control & Account Provisioning
Account Attributes, Access Policies & Privileged Access Management
Identity Management – Local, Network, and Federated Access
Single Sign On with Kerberos
Preview
Security Assertion Markup Language (SAML)
Resiliency and Asset Management
Asset Protection Concepts
Advanced Data Protection and Destruction
Vulnerability Management
Vulnerability Scanning Fundamentals
Using Threat Feeds for Smarter Vulnerability Management
Vulnerability Management Procedure
Baselines, Hardening & NAC
Wi-Fi Security
Post-Quiz (What Have You Learnt?)
Pre-Quiz (What Do You Know?)
ACL, IDS, IP and Web Filtering
IDS and IPS Methods
Hardening Specialized Devices
Location Services and Mobile Connectivity
Secure Protocols & Application Development
Post-Quiz (What Have You Learnt?)
File Transfer and Email Security
Web Application Security Concepts
Web Application Security Concept – Part 2
Incident Response – Part 1
Incident Response – Part 2
Digital Forensics Investigating Cyber Eviden
Understanding Data Sources (Logs) for Incident Response
Managing Security Data with SIEM
Monitoring Infrastructure
Introduction to Automation and Orchestration
Domain 5: Security program management and oversight
Pre-Quiz (What Do You Know?)
Policies, Standards, and Procedures
Preview
Legal Environment
Understanding Risk Management, Audits, and Assessments
Game -- Reboot Protocol
Risk Management Strategies
Third-Party Risk Assessment
Evaluating Security with Audits, Assessments, and Pen Testing
Understanding Privacy, Sensitivity, and Data Labels
Privacy Data_What You Need to Know
Understanding Security Compliance and Data Protection
Personnel Policies & Why They Matter
Post-Quiz (What Have You Learnt?)
Flash Cards
Flash Cards
Arcade Games
Secure Runner
Platformer Pete
×
This is an unpublished lesson. This lesson will not be shown for students unless you set it as Public.
Back to Dashboard
No contents are available in this lesson!
No lessons available !
Back to Dashboard
Lesson contents locked
Enroll to unlock this lesson.
Enroll to unlock
Next Lesson