Course Curriculum
- 5 sections
- 128 lectures
- 2 days total length
-
What is an Operating System00:48:00
-
Configuring the Operating System00:06:00
-
What is an Application00:10:00
-
Using Control Panel00:18:00
-
Software and Concepts00:11:00
-
Licensing00:06:00
-
Using Software00:07:00
-
Software Tools00:10:00
-
Software00:14:00
-
Hardware, Devices, and Peripherals00:05:00
-
Hardware and Peripherals00:07:00
-
Storage00:12:00
-
Connectivity Devices00:05:00
-
Network Components00:09:00
-
Identify the Importance of Risk Management00:11:00
-
Assess Risk00:13:00
-
Mitigate Risk00:24:00
-
Integrate Documentation into Risk Management00:15:00
-
Classify Threats and Threat Profiles00:08:00
-
Perform Ongoing Threat Research00:13:00
-
Resources that Aid in Research of Threats00:03:00
-
Implement Threat Modeling00:10:00
-
Assess the Impact of Reconnaissance Incidents00:11:00
-
Performing Reconnaissance on a Network00:07:00
-
Examining Reconnaissance Incidents00:08:00
-
Assess the Impact of Social Engineering00:11:00
-
Assessing the impact of Social Engineering00:08:00
-
Assessing the Impact of Phishing00:03:00
-
Types of Wireless Attacks00:30:00
-
Intrusion Monitoring00:08:00
-
Wireless Security Risks00:22:00
-
Authentication Attacks00:21:00
-
Rogue Devices00:04:00
-
Public Hotspots00:07:00
-
Wireless Security Monitoring00:21:00
-
Device Tracking00:18:00
-
WLAN Security Infrastructure00:38:00
-
Management Protocols00:23:00
-
Other RADIUS Solutions00:16:00
-
Introduction00:30:00
-
Child Safety Online01:00:00
-
Secure Payment Sites01:00:00
-
Online Banking00:30:00
-
How To Keep Your Password Safe00:30:00
-
Common Scams01:00:00
-
How I Got Pharmed01:00:00
-
Virus Protection01:00:00
-
Self Maintenance00:30:00
-
Personal Information Online01:00:00
-
Is The Internet Safe?00:30:00
-
Importance of Cyber Security00:30:00
-
Spyware Can Destroy00:30:00
-
How Does Spyware Spread?01:00:00
-
How To Remove Spyware01:00:00
-
Anti Spyware Program01:00:00
-
The Anti Anti-Spyware Programs00:30:00
-
Research And Learn More00:30:00
-
Choosing The Best Anti Spyware Tool01:00:00
-
Computer Security And Spyware01:00:00
-
The Programs To Avoid00:15:00
-
Is It Legal?00:30:00
-
Checklist Of Protection00:15:00
-
The Information Security Cycle00:37:00
-
Information Security Controls00:36:00
-
Authentication Methods00:09:00
-
Cryptography Fundamentals00:56:00
-
Security Policy Fundamentals00:11:00
-
Social Engineering00:32:00
-
Malware00:25:00
-
Software-Based Threats00:22:00
-
Based Threats00:39:00
-
Wireless Threats and Vulnerabilities00:43:00
-
Physical Threats and Vulnerabilities00:09:00
-
Manage Data Security00:47:00
-
Manage Application Security00:55:00
-
Manage Device and Host Security01:08:00
-
Manage Mobile Security00:10:00
-
A Risk Analysis00:17:00
-
Implement Vulnerability Assessment Tools and Techniques00:05:00
-
Scan for Vulnerabilities00:27:00
-
Mitigation and Deterrent Techniques00:19:00
-
Respond to Security Incidents
-
Recover from a Security Incident00:10:00
-
OSI Layers00:44:00
-
LANs and WANs00:14:00
-
Network Types00:07:00
-
Transmissions00:36:00
-
Cables00:41:00
-
Fiber Optics00:17:00
-
Converters and Connectors00:27:00
-
Wireless Security00:15:00
-
Authentication.prproj00:21:00
-
Wireless Security Threats00:30:00
-
TACACS00:10:00
-
Keys00:26:00
-
RADIUS00:07:00
-
VPN Technologies00:16:00
-
Tunneling Protocols.prproj00:05:00
-
Acceptable Use01:00:00
-
Common Problems00:32:00
-
Troubleshooting00:28:00
-
Network Technician Tools00:46:00
-
Physical and Logical Issues00:19:00
-
Open or Closed Ports00:09:00
-
ARP Issues00:13:00
-
Core Concepts in Healthcare IT00:06:00
-
EMR EHR Issues00:05:00
-
Regulations, Standards, and Stakeholders00:14:00
-
HIPAA Controls and Compliance00:08:00
-
Roles and Responsibilities00:10:00
-
Manage Communication and Ethics Issues00:15:00
-
Legal Best Practices, Requirements, and Documentation00:09:00
-
Medical Document Imaging00:04:00
-
Sanitation Management00:03:00
-
Computing Essentials00:05:00
-
Networking00:33:00
-
Manage Servers and Software00:27:00
-
Hardware Support00:14:00
-
Set Up a Workstation00:08:00
-
Troubleshoot Basic IT Issues00:15:00
-
Troubleshoot Medical IT Issues00:20:00
-
Implementation of an EMR EHR System00:34:00
-
Change Control00:08:00
-
Manage Physical and Logical Security00:36:00
-
Implement Security Best Practices and Threat Mitigation Techniques00:13:00
-
Manage Remote Access00:06:00
-
Manage Wireless Security00:15:00
-
Perform Backups and Disaster Recovery00:16:00