Modules
1 -
Introduction
#
Lesson
Duration
Type
1.
Introduction
FREE
14m:52s

2.
Download your free study guide

3.
Exam Tips
FREE
7m:18s

4.
60 Day Pass Guarantee
FREE
3m:43s

5.
Lab: Exploring the Lab Environment

6.
Checkpoint: Introduction

2 -
Fundamentals of Security
#
Lesson
Duration
Type
1.
Fundamentals of Security
FREE
9m:6s

2.
Threats and Vulnerablities
FREE
5m:30s

3.
Confidentiality
5m:51s

4.
Integrity
6m:6s

5.
Availability
6m:25s

6.
Non-repudiation
5m:7s

7.
Authentication
6m:43s

8.
Authorization
3m:25s

9.
Accounting
3m:58s

10.
Security Control Categories
4m:46s

11.
Security Control Types
5m:19s

12.
Lab Configuring Examples of Security Control Types

13.
Gap Analysis
5m:7s

14.
Lab: Perform System Configruation Gap Analysis

15.
Zero Trust
7m:37s

16.
Checkpoint: Fundamentals of Security

3 -
Threat Actors
#
Lesson
Duration
Type
1.
Threat Actors
4m:9s

2.
Threat Actor Motivations
7m:46s

3.
Threat Actor Attributes
4m:34s

4.
Unskilled Attackers
3m:12s

5.
Hacktivists
4m:6s

6.
Organized Crime
4m:36s

7.
Nation-state Actor
7m:5s

8.
Insider Threats
6m:8s

9.
Shadow IT
5m:25s

10.
Threat Vectors and Attack Surfaces
9m:0s

11.
Outsmarting Threat Actors
10m:50s

12.
Checkpoint: Threat Actors

4 -
Physical Security
#
Lesson
Duration
Type
1.
Physical Security
3m:41s

2.
Fencing and Bollards
6m:28s

3.
Attacking with Brute Force
5m:43s

4.
Surveillance Systems
7m:2s

5.
Bypassing Surveillance Systems
4m:26s

6.
Access Control Vestibules
7m:35s

7.
Door Locks
13m:14s

8.
Access Badge Cloning
8m:41s

9.
Checkpoint: Physical Security

5 -
Social Engineering
#
Lesson
Duration
Type
1.
Social Engineering
4m:11s

2.
Motivational Triggers
10m:46s

3.
Impersonation
8m:17s

4.
Pretexting
4m:17s

5.
Phishing Attacks
8m:46s

6.
Preventing Phishing Attacks
9m:5s

7.
Conducting an Anti-Phishing Campaign
5m:21s

8.
Frauds and Scams
6m:29s

9.
Influence Campaigns
5m:47s

10.
Other Social Engineering Attacks
9m:31s

11.
Lab: Using SET to Perform Social Engineering

12.
Checkpoint: Social Engineering

6 -
Malware
#
Lesson
Duration
Type
1.
Malware
8m:49s

2.
Viruses
7m:49s

3.
Worms
3m:22s

4.
Trojans
3m:56s

5.
Viruses and Trojans
7m:43s

6.
Ransomware
8m:7s

7.
Zombies and Botnets
5m:1s

8.
Rootkits
5m:21s

9.
Backdoors and Logic Bombs
5m:40s

10.
Keylogger
5m:4s

11.
Spyware and Bloatware
5m:2s

12.
Malware Attack Techniques
4m:58s

13.
Indications of Malware Attacks
5m:16s

14.
Lab: Detecting and Responding to Malware

15.
Checkpoint: Malware

7 -
Data Protection
#
Lesson
Duration
Type
1.
Data Protection
3m:16s

2.
Data Classifications
8m:19s

3.
Data Ownership
5m:10s

4.
Data States
5m:19s

5.
Data Types
4m:33s

6.
Data Soverignty
2m:56s

7.
Securing Data
4m:0s

8.
Data Loss Prevention (DLP)
4m:0s

9.
Configuring a DLP
16m:3s

10.
Checkpoint: Data Protection

8 -
Cryptographic Solutions
#
Lesson
Duration
Type
1.
Cryptographic Solutions
11m:58s

2.
Symmetric vs Asymmetric
7m:54s

3.
Symmetric Algorithms
5m:58s

4.
Asymmetric Algorithms
7m:20s

5.
Hashing
10m:34s

6.
Increasing Hash Security
7m:42s

7.
Lab: Using Hashing and Salting

8.
Public Key Infrastructure (PKI)
6m:2s

9.
Digital Certificates
13m:3s

10.
Exploring Digital Certificates
3m:31s

11.
Blockchain
5m:36s

12.
Encryption Tools
5m:52s

13.
Obfuscation
8m:55s

14.
Cryptographic Attacks
15m:10s

15.
Checkpoint: Cryptographic Solutions

9 -
Risk Management
#
Lesson
Duration
Type
1.
Risk Management
4m:43s

2.
Risk Assessment Frequency
3m:25s

3.
Risk Identification
6m:0s

4.
Risk Register
7m:56s

5.
Qualitative Risk Analysis
3m:46s

6.
Quantiative Risk Analysis
5m:11s

7.
Risk Management Strategies
5m:32s

8.
Risk Monitoring and Reporting
3m:39s

9.
Checkpoint: Risk Management

10 -
Third-party Vendor Risks
#
Lesson
Duration
Type
1.
Third-party Vendor Risks
3m:2s

2.
Supply Chain Risks
4m:10s

3.
Supply Chain Attacks
6m:19s

4.
Vendor Assessment
5m:3s

5.
Vendor Selection and Monitoring
5m:11s

6.
Contracts and Agreements
5m:15s

7.
Checkpoint: Third-party Vendor Risks

11 -
Governance and Compliance
#
Lesson
Duration
Type
1.
Governance and Compliance
4m:51s

2.
Governance
5m:4s

3.
Governance Structures
3m:34s

4.
Policies
5m:21s

5.
Standards
4m:30s

6.
Procedures
4m:52s

7.
Governance Considerations
7m:9s

8.
Compliance
5m:48s

9.
Non-compliance Consequences
4m:1s

10.
Checkpoint: Governance and Compliance

12 -
Asset and Change Management
#
Lesson
Duration
Type
1.
Asset and Change Management
4m:42s

2.
Acqusition and Procurement
6m:19s

3.
Mobile Asset Deployments
6m:16s

4.
Asset Management
6m:34s

5.
Asset Disposal and Decommissioning
8m:57s

6.
Lab: Performing Drive Sanitization

7.
Change Management
7m:6s

8.
Change Management Processes
6m:20s

9.
Technical Implictions of Changes
4m:46s

10.
Documenting Changes
4m:27s

11.
Checkpoint: Asset and Change Management

13 -
Audits and Assessments
#
Lesson
Duration
Type
1.
Audits and Assessments
4m:51s

2.
Internal Audits and Assessments
7m:43s

3.
Performing an Internal Assessment
4m:26s

4.
External Audits and Assessments
7m:10s

5.
Performing an External Asessment
4m:39s

6.
Penetration Testing
6m:34s

7.
Reconnaissance in Pentesting
19m:43s

8.
Lab: Performing Reconnaissance

9.
Performing a Basic PenTest
19m:41s

10.
Lab: Performing Penetration Testing

11.
Attestation of Findings
6m:30s

12.
Checkpoint: Audits and Assessments

14 -
Cyber Resilience and Redundancy
#
Lesson
Duration
Type
1.
Cyber Resilience and Redundancy
3m:13s

2.
High Availability
9m:2s

3.
Data Redundnacy
8m:48s

4.
Configuring a RAID
3m:38s

5.
Capacity Planning
8m:2s

6.
Powering Data Centers
10m:41s

7.
Data Backups
10m:39s

8.
Lab: Implement Backups

9.
Continuity of Operations Plan
9m:13s

10.
Redundant Site Considerations
12m:15s

11.
Resilience and Recovery Testing
6m:55s

12.
Checkpoint: Cyber Resilience and Redundancy

15 -
Security Architecture
#
Lesson
Duration
Type
1.
Security Architecture
4m:13s

2.
On-premise versus the Cloud
11m:28s

3.
Cloud Security
6m:27s

4.
Virtualization and Containerization
10m:38s

5.
Lab: Using Virtualization

6.
Lab: Using Containers

7.
Serverless
3m:41s

8.
Microservices
4m:13s

9.
Network Infrastructure
3m:18s

10.
Software-Defined Network (SDN)
3m:11s

11.
Infrastructure as Code (IaC)
4m:26s

12.
Centralized vs Decentralized Architectures
4m:18s

13.
Internet of Things (IoT)
5m:6s

14.
ICS and SCADA
4m:7s

15.
Embedded Systems
5m:9s

16.
Checkpoint: Security Architecture

16 -
Security Infrastructure
#
Lesson
Duration
Type
1.
Security Infrastructure
4m:37s

2.
Ports and Protocols
15m:20s

3.
Firewalls
12m:11s

4.
Configuring Firewalls
13m:57s

5.
Lab: Implementing a Firewall

6.
IDS and IPS
6m:26s

7.
Network Appliances
9m:57s

8.
Port Security
10m:48s

9.
Securing Network Communications
20m:31s

10.
Lab: Setting Up Remote Access

11.
Lab: Using IPSec Tunneling

12.
SD-WAN and SASE
7m:40s

13.
Infrastructure Considerations
10m:54s

14.
Selecting Infrastructure Controls
8m:15s

15.
Checkpoint: Security Infrastructure

17 -
Identity and Access Management (IAM) Solutions
#
Lesson
Duration
Type
1.
Identity and Access Management (IAM) Solutions
4m:30s

2.
Identity and Access Management (IAM)
4m:57s

3.
Multifactor Authentication
15m:17s

4.
Password Security
16m:51s

5.
Lab: Managing Password Security

6.
Password Attacks
10m:9s

7.
Single Sign-On (SSO)
9m:51s

8.
Federation
5m:6s

9.
Privileged Access Management (PAM)
3m:20s

10.
Access Control Models
9m:7s

11.
Assigning Permissions
7m:1s

12.
Lab: Managing Permissions

13.
Checkpoint: Identity and Access Management (IAM) Solutions

18 -
Vulnerabilities and Attacks
#
Lesson
Duration
Type
1.
Vulnerabilities and Attacks
6m:35s

2.
Hardware Vulnerabilities
6m:34s

3.
Bluetooth Vulnerabilities and Attacks
6m:41s

4.
Mobile Vulnerabilities and Attacks
5m:1s

5.
Zero-day Vulnerabilities
5m:3s

6.
Operating System Vulnerabilities
4m:53s

7.
SQL and XML Injections
13m:57s

8.
Conducting an SQL Injection
7m:37s

9.
Lab: Exploiting and Detecting SQLi

10.
XSS and XSRF
16m:6s

11.
Buffer Overflow
6m:31s

12.
Race Conditions
6m:2s

13.
Checkpoint: Vulnerabilities and Attacks

19 -
Malicious Activity
#
Lesson
Duration
Type
1.
Malicious Activity
3m:22s

2.
Distributed Denial of Service
8m:5s

3.
Domain Name Server(DNS) Attacks
5m:20s

4.
Directory Traversal Attack
8m:4s

5.
Privilege Escalation Attack
6m:19s

6.
Replay Attacks
2m:38s

7.
Session Hijacking
4m:52s

8.
On-path Attacks
4m:0s

9.
Lab: Understanding On-Path Attacks

10.
Injection Attacks
4m:0s

11.
Indicators of Compromise (IoC)
7m:5s

12.
Checkpoint: Vulnerabilities and Attacks

20 -
Hardening
#
Lesson
Duration
Type
1.
Hardening
4m:1s

2.
Changing Default Configurations
5m:0s

3.
Restricting Applications
7m:11s

4.
Lab: Implementing Allow Lists and Deny Lists

5.
Lab: Hardening

6.
Unnecessary Services
5m:38s

7.
Lab: Finding Open Service Ports

8.
Trusted Operating Systems
5m:30s

8.
Updates and Patches
5m:0s

9.
Patch Management
8m:47s

10.
Group Policies
8m:55s

11.
Lab: Using Group Policy

12.
SELinux
6m:45s

13.
Data Encryption Levels
4m:41s

14.
Lab: Using Storage Encryption

15.
Secure Baselines
4m:59s

16.
Lab: Understanding Security Baselines

17.
Checkpoint: Hardening

21 -
Security Techniques
#
Lesson
Duration
Type
1.
Security Techniques
3m:44s

2.
Wireless Infrastructure Security
8m:23s

3.
Wireless Security Settings
15m:12s

4.
Application Security
12m:42s

5.
Network Access Control (NAC)
5m:59s

6.
Web and DNS Filtering
7m:2s

7.
Lab: Performing DNS Filtering

8.
Email Security
7m:48s

9.
Endpoint Detection and Response
7m:35s

10.
User Behavior Analytics
6m:4s

11.
Selecting Secure Protocols
14m:44s

12.
Checkpoint: Security Techniques

22 -
Vulnerabliity Management
#
Lesson
Duration
Type
1.
Vulnerabliity Management
2m:50s

2.
Identifying Vulnerabilities
5m:44s

3.
Threat Intelligence Feeds
7m:10s

4.
Lab: Eworking with Threat Feeds

5.
Responsible Disclosure Programs
6m:5s

6.
Analyzing Vulnerabilities
10m:25s

7.
Conducting Vulnerablity Scans
31m:23s

8.
Assessing Vulnerability Scan Results
13m:17s

9.
Lab: Performing Vulnerability Scans

10.
Vulnerability Response and Remediation
6m:3s

11.
Validating Vulnerability Remediation
5m:43s

12.
Vulnerability Reporting
9m:21s

13.
Checkpoint: Vulnerabliity Management

23 -
Alerting and Monitoring
#
Lesson
Duration
Type
1.
Alerting and Monitoring
5m:35s

2.
Monitoring Resources
4m:35s

3.
Alerting and Monitoring Activities
12m:15s

4.
Simple Network Management Protocol (SNMP)
6m:55s

5.
Security Information and Event Management (SIEM)
11m:4s

6.
Lab: Configuring System Monitoring

7.
Data from Security Tools
5m:5s

8.
Security Content Automation and Protocol (SCAP)
9m:58s

9.
Netflow and Flow Analysis
7m:10s

10.
Lab: Using Network Sniffers

11.
Single Pane of Glass
5m:59s

12.
Checkpoint: Alerting and Monitoring

24 -
Incident Response
#
Lesson
Duration
Type
1.
Incident Response
3m:5s

2.
Incident Response Process
11m:6s

3.
Lab: Network Incident Investigation and Remediation

4.
Threat Hunting
6m:54s

5.
Root Cause Analysis
7m:58s

6.
Lab: Performing Root Cause Analysis

7.
Incident Response Training and Testing
8m:53s

8.
Digital Forensic Procedures
13m:19s

9.
Data Collection Procedures
8m:45s

10.
Disk Imaging
9m:3s

11.
Lab: Performing Digital Forensics

12.
Checkpoint: Incident Response

25 -
Investigating an Incident
#
Lesson
Duration
Type
1.
Investigating an Incident
3m:18s

2.
Investigative Data
12m:15s

3.
Dashboards
4m:1s

4.
Automated Reports
6m:30s

5.
Vulnerability Scans
11m:2s

6.
Packet Captures
8m:34s

7.
Firewall Logs
6m:10s

8.
Application Logs
4m:1s

9.
Endpoint Logs
3m:47s

10.
OS-specific Security Logs
3m:58s

11.
IPS/IDS Logs
5m:40s

12.
Network Logs
5m:32s

13.
Metadata
4m:36s

14.
Lab: Incident Response Detection

15.
Checkpoint: Investigating an Incident

26 -
Automation and Orchestration
#
Lesson
Duration
Type
1.
Automation and Orchestration
6m:37s

2.
When to Automate and Orchestrate
10m:22s

3.
Benefits of Automation and Orchestratation
8m:2s

4.
Automating Support Tickets
6m:46s

5.
Automating Onboarding
6m:56s

6.
Automating Security
4m:54s

7.
Lab: Using a Playbook

8.
Automating Application Development
9m:35s

9.
Integrations and APIs
13m:0s

10.
Lab: Use Cases of Automation and Scripting

11.
Checkpoint: Automation and Orchestration

27 -
Security Awareness
#
Lesson
Duration
Type
1.
Security Awareness
3m:45s

2.
Recognizing Insider Threats
7m:28s

3.
Password Managers
10m:29s

4.
Avoiding Social Engineering
8m:18s

5.
Lab: Training and Awareness through Simulation

6.
Policy and Handbooks
7m:33s

7.
Remote and Hybrid Work Environments
7m:19s

8.
Creating a Culture of Security
5m:0s

9.
Checkpoint: Automation and Orchestration

28 -
Conclusion
#
Lesson
Duration
Type
1.
Conclusion
12m:44s

2.
BONUS: Where do I go from here?
3m:47s

3.
Full-length Practice Exam
