Course Curriculum
- 11 sections
- 42 lectures
- 16 hours, 59 minutes total length
-
The Information Security Cycle00:37:00
-
Information Security Controls00:36:00
-
Authentication Methods00:09:00
-
Cryptography Fundamentals00:56:00
-
Security Policy Fundamentals00:11:00
-
Social Engineering00:32:00
-
Malware00:25:00
-
Software-Based Threats00:22:00
-
Based Threats00:39:00
-
Wireless Threats and Vulnerabilities00:43:00
-
Physical Threats and Vulnerabilities00:09:00
-
Manage Data Security00:47:00
-
Manage Application Security00:55:00
-
Manage Device and Host Security01:08:00
-
Manage Mobile Security00:10:00
-
Configure Security Parameters on Network Devices and Technologies00:49:00
-
Network Design Elements and Components00:26:00
-
Implement Networking Protocols and Services01:09:00
-
Apply Secure Network Administration Principles00:12:00
-
Secure Wireless Traffic00:31:00
-
Access Control and Authentication Services00:43:00
-
Implement Account Management Security Controls00:33:00
-
Install a CA Hierarchy00:26:00
-
Enroll Certificates00:13:00
-
Secure Network Traffic by Using Certificates00:04:00
-
Renew Certificates00:01:00
-
Back Up and Restore Certificates and Private Keys00:06:00
-
Revoke Certificates00:08:00
-
Physical Security00:20:00
-
Legal Compliance00:10:00
-
Security Awareness and Training00:11:00
-
Integrate Systems and Data with Third Parties00:09:00
-
A Risk Analysis00:17:00
-
Implement Vulnerability Assessment Tools and Techniques00:05:00
-
Scan for Vulnerabilities00:27:00
-
Mitigation and Deterrent Techniques00:19:00
-
Respond to Security Incidents00:23:00
-
Recover from a Security Incident00:10:00
-
Business Continuity00:18:00
-
Plan for Disaster Recovery00:17:00
-
Execute DRPs and Procedures00:13:00
-
Claim Your Certificate