Course Curriculum
- 11 sections
- 22 lectures
- 00:00:00 total length
-
The Information Security Cycle
00:37:00 -
Information Security Controls
00:36:00 -
Authentication Methods
00:09:00 -
Cryptography Fundamentals
00:56:00 -
Security Policy Fundamentals
00:11:00
-
Social Engineering
00:32:00 -
Malware
00:25:00 -
Software-Based Threats
00:22:00 -
Based Threats
00:39:00 -
Wireless Threats and Vulnerabilities
00:43:00 -
Physical Threats and Vulnerabilities
00:09:00
-
Manage Data Security
00:47:00 -
Manage Application Security
00:55:00 -
Manage Device and Host Security
01:08:00 -
Manage Mobile Security
00:10:00
-
Configure Security Parameters on Network Devices and Technologies
00:49:00 -
Network Design Elements and Components
00:26:00 -
Implement Networking Protocols and Services
01:09:00 -
Apply Secure Network Administration Principles
00:12:00 -
Secure Wireless Traffic
00:31:00
-
Access Control and Authentication Services
00:43:00 -
Implement Account Management Security Controls
00:33:00
-
Install a CA Hierarchy
00:26:00 -
Enroll Certificates
00:13:00 -
Secure Network Traffic by Using Certificates
00:04:00 -
Renew Certificates
00:01:00 -
Back Up and Restore Certificates and Private Keys
00:06:00 -
Revoke Certificates
00:08:00
-
Physical Security
00:20:00 -
Legal Compliance
00:10:00 -
Security Awareness and Training
00:11:00 -
Integrate Systems and Data with Third Parties
00:09:00
-
A Risk Analysis
00:17:00 -
Implement Vulnerability Assessment Tools and Techniques
00:05:00 -
Scan for Vulnerabilities
00:27:00 -
Mitigation and Deterrent Techniques
00:19:00
-
Respond to Security Incidents
00:23:00 -
Recover from a Security Incident
00:10:00
-
Business Continuity
00:18:00 -
Plan for Disaster Recovery
00:17:00 -
Execute DRPs and Procedures
00:13:00
-
Claim Your Certificate
00:00:00