Modules
1 -
Introduction
#
Lesson
Duration
Type
1.
Welcome to the Course
FREE
13m:19s

2.
Download the Study Guide

3.
Exam Tips
FREE
4m:28s

4.
100% Pass Guarantee
FREE
3m:43s

5.
Quiz: Introduction

2 -
Identify Security Control Types
#
Lesson
Duration
Type
1.
Identify Security Control Types
FREE
1m:23s

2.
Cybersecurity Roles and Responsibilities
FREE
6m:44s

3.
Security Operations Center (SOC)
FREE
5m:0s

4.
Security Control Categories
18m:17s

5.
Selecting Security Controls
4m:59s

6.
Quiz: Identify Security Control Types

3 -
Threat Intelligence Sharing
#
Lesson
Duration
Type
1.
Threat Intelligence Sharing
1m:11s

2.
Security and Threat Intelligence
5m:12s

3.
Intelligence Cycle
9m:44s

4.
Intelligence Sources
9m:15s

5.
Information Sharing and Analysis Centers (ISACS)
4m:25s

6.
Threat Intelligence Sharing
4m:53s

7.
Quiz: Threat Intelligence

4 -
Classifying Threats
#
Lesson
Duration
Type
1.
Classifying Threats
1m:50s

2.
Threat Classification
9m:7s

3.
Threat Actors
13m:46s

4.
Malware
7m:48s

5.
Threat Research
10m:58s

6.
Attack Frameworks
11m:13s

7.
Indicator Management
6m:54s

8.
Quiz: Classifying Threat

5 -
Threat Hunting
#
Lesson
Duration
Type
1.
Threat Hunting
2m:5s

2.
Threat Modeling
8m:20s

3.
Threat Hunting
6m:54s

4.
Open-source Intelligence
3m:39s

5.
Google Hacking
7m:40s

6.
Profiling Techniques
5m:27s

7.
Harvesting Techniques
3m:30s

8.
AbuseIPDB
3m:32s

9.
Deep Web and Dark Web
4m:8s

10.
Bug Bounty
3m:11s

11.
Quiz: Threat Hunting

6 -
Network Forensics
#
Lesson
Duration
Type
1.
Network Forensics
1m:29s

2.
Network Forensic Tools
4m:13s

3.
tcpdump
7m:50s

4.
Wireshark
10m:57s

5.
Flow Analysis
6m:19s

6.
IP and DNS Analysis
6m:34s

7.
URL Analysis
15m:30s

8.
Conduct Packet Analysis
6m:3s

9.
Quiz: Network Forensics

7 -
Appliance Monitoring
#
Lesson
Duration
Type
1.
Appliance Monitoring
1m:29s

2.
Firewall Logs
11m:23s

3.
Firewall Configurations
18m:56s

4.
Proxy Logs
6m:26s

5.
Web Application Firewall Logs
2m:46s

6.
IDS and IPS Configuration
6m:37s

7.
IDS and IPS Logs
8m:58s

8.
Port Security Configuration
5m:38s

9.
NAC Configuration
6m:49s

10.
Analysis of Security Appliances
15m:43s

11.
Quiz: Application Monitoring

8 -
Endpoint Monitoring
#
Lesson
Duration
Type
1.
Endpoint Monitoring
2m:5s

2.
Endpoint Analysis
5m:47s

3.
Sandboxing
7m:20s

4.
Reverse Engineering
11m:15s

5.
Malware Exploitation
7m:50s

6.
Behavior Analysis
11m:35s

7.
Malware Analysis (demo)
25m:40s

8.
EDR Configuration
4m:52s

9.
Block Lists and Allow Lists
10m:40s

10.
Quiz: Endpoint Monitoring

9 -
Email Monitoring
#
Lesson
Duration
Type
1.
Email Monitoring
1m:42s

2.
Email IOCs
5m:21s

3.
Email Header Analysis
11m:11s

4.
Email Content Analysis
3m:39s

5.
Email Server Security
8m:4s

6.
SMTP Log Analysis
5m:20s

7.
Email Message Security
6m:28s

8.
Analyzing Email Headers
4m:14s

9.
Quiz: Email Monitoring

10 -
Configuring Your SIEM
#
Lesson
Duration
Type
1.
Configuring Your SIEM
1m:39s

2.
SIEM
8m:54s

3.
Security Data Collection
5m:5s

4.
Data Normalization
7m:42s

5.
Event Log
3m:36s

6.
Syslog
6m:27s

7.
Configuring a SIEM Agent
19m:53s

8.
Quiz: Configuring Your SIEM

11 -
Analyzing Your SIEM
#
Lesson
Duration
Type
1.
Analyzing Your SIEM
1m:53s

2.
SIEM Dashboards
11m:44s

3.
Analysis and Detection
7m:14s

4.
Trend Analysis
10m:0s

5.
Rule and Query Writing
4m:42s

6.
Searching and Piping Commands
7m:24s

7.
Scripting Tools
9m:25s

8.
Analyzing, Filtering, and Searching Logs
18m:7s

9.
Quiz: Analyzing Your SIEM

12 -
Digital Forensics
#
Lesson
Duration
Type
1.
Digital Forensics
3m:11s

2.
Digital Forensic Analysts
4m:50s

3.
Forensics Procedures
9m:17s

4.
Work Product Retention
2m:51s

5.
Data Acquisition
4m:59s

6.
Forensics Tools
7m:11s

7.
Memory Acquisition
5m:23s

8.
Disk Image Acquisition
11m:55s

9.
Hashing
4m:47s

10.
Timeline Generation
4m:46s

11.
Carving
5m:42s

12.
Chain of Custody
5m:51s

13.
Collecting and Validating Evidence
9m:5s

14.
Quiz: Digital Forensics

13 -
Analyzing Network IOCs
#
Lesson
Duration
Type
1.
Analyzing Network IOCs
1m:47s

2.
Analyzing Network IOCs
2m:15s

3.
Traffic Spikes
18m:1s

4.
Beaconing
13m:40s

5.
Irregular P2P Communications
7m:56s

6.
Rogue Devices
11m:26s

7.
Scans and Sweeps
5m:21s

8.
Nonstandard Port Usage
11m:25s

9.
TCP Ports
7m:58s

10.
UDP Ports
7m:5s

11.
Data Exfiltration
6m:23s

12.
Covert Channels
7m:35s

13.
Analysis of Network IOCs
12m:34s

14.
Quiz: Analyzing Network IOCs

14 -
Analyzing Host-related IOCs
#
Lesson
Duration
Type
1.
Analyzing Host-related IOCs
1m:14s

2.
Host-related IOCs
1m:41s

3.
Malicious Processes
10m:0s

4.
Memory Forensics
7m:12s

5.
Consumption
9m:1s

6.
Disk and File System
11m:24s

7.
Unauthorized Privilege
5m:15s

8.
Unauthorized Software
5m:49s

9.
Unauthorized Change/Hardware
2m:52s

10.
Persistence
10m:1s

11.
Quiz: Analyzing Host-related IOCs

15 -
Analyzing Application-related IOCs
#
Lesson
Duration
Type
1.
Analyzing Application-related IOCs
1m:24s

2.
Application-related IOCs
1m:38s

3.
Anomalous Activity
4m:6s

4.
Service Interruptions
5m:6s

5.
Application Logs
12m:37s

6.
New Accounts
5m:37s

7.
Virtualization Forensics
5m:57s

8.
Mobile Forensics
11m:32s

9.
Quiz: Analyzing Application-related IOCs

16 -
Analyzing Lateral Movement and Pivoting IOCs
#
Lesson
Duration
Type
1.
Analyzing Lateral Movement and Pivoting IOCs
1m:14s

2.
Lateral Movement and Pivoting
3m:22s

3.
Pass the Hash
10m:11s

4.
Golden Ticket
7m:9s

5.
Lateral Movement
6m:39s

6.
Pivoting
6m:3s

7.
Quiz: Analyzing Lateral Movement and Pivoting IOCs

17 -
Incident Response Preparation
#
Lesson
Duration
Type
1.
Incident Response Preparation
2m:41s

2.
Incident Response Phases
11m:10s

3.
Documenting Procedures
7m:12s

4.
Data Criticality
13m:49s

5.
Communication Plan
7m:7s

6.
Reporting Requirements
4m:53s

7.
Response Coordination
7m:28s

8.
Business Continuity Plan
13m:40s

9.
Training and Testing
6m:41s

10.
Quiz: Incident Response Preparation

18 -
Detection and Analysis
#
Lesson
Duration
Type
1.
Detection and Analysis
1m:25s

2.
OODA Loop
5m:43s

3.
Defensive Capabilities
4m:46s

4.
Detection and Analysis
6m:44s

5.
Impact Analysis
7m:50s

6.
Incident Classification
5m:57s

7.
Quiz: Detection and Analysis

19 -
Containment, Eradication, Recovery, and Post-incident Actions
#
Lesson
Duration
Type
1.
Containment, Eradication, Recovery, and Post-incident Actions
1m:58s

2.
Containment
6m:26s

3.
Eradication
6m:18s

4.
Eradication Actions
4m:29s

5.
Recovery
2m:44s

6.
Recovery Actions
6m:25s

7.
Post-Incident Activities
5m:57s

8.
Lessons Learned
7m:8s

9.
Root Cause Analysis
4m:22s

10.
Quiz: Containment, Eradication, Recovery, and Post-incident Actions

20 -
Risk Mitigation
#
Lesson
Duration
Type
1.
Risk Mitigation
1m:39s

2.
Risk Identification Process
7m:55s

3.
Conducting an Assessment
8m:55s

4.
Risk Calculation
18m:45s

5.
Business Impact Analysis
12m:28s

6.
Risk Prioritization
16m:57s

7.
Communicating Risk
8m:7s

8.
Training and Exercises
5m:0s

9.
Quiz: Risk Mitigation

21 -
Frameworks, Policies, and Procedures
#
Lesson
Duration
Type
1.
Frameworks, Policies, and Procedures
1m:13s

2.
Enterprise Security Architecture
2m:44s

3.
Prescriptive Frameworks
4m:28s

4.
Risk-based Frameworks
4m:30s

5.
Industry Frameworks
15m:10s

6.
Audits and Assessments
7m:12s

7.
Continuous Monitoring
5m:13s

8.
Quiz: Frameworks, Policies, and Procedures

22 -
Enumeration Tools
#
Lesson
Duration
Type
1.
Enumeration Tools
1m:39s

2.
Enumeration Tools
7m:35s

3.
Nmap Discovery Scans
8m:36s

4.
Nmap Port Scans
6m:1s

5.
Nmap Port States
3m:43s

6.
Nmap Fingerprinting Scans
4m:18s

7.
Using Nmap
11m:22s

8.
Hping
5m:41s

9.
Angry IP Scanner
3m:46s

10.
Maltego
3m:26s

11.
Responder
1m:36s

12.
Wireless Assessment Tools
5m:31s

13.
Recon-ng
21m:47s

14.
Hashcat
3m:18s

15.
Testing Credential Security
2m:36s

16.
Quiz: Enumeration Tools

23 -
Vulnerability Scanning
#
Lesson
Duration
Type
1.
Vulnerability Scanning (Introduction)
1m:37s

2.
Identifying Vulnerabilities
3m:38s

3.
Scanning Workflow
6m:45s

4.
Scope Considerations
8m:8s

5.
Scanner Types
9m:0s

6.
Scanning Parameters
6m:16s

7.
Scheduling and Constraints
8m:52s

8.
Vulnerability Feeds
3m:21s

9.
Scan Sensitivity
5m:7s

10.
Scanning Risks
2m:53s

11.
Conducting Scans
31m:24s

12.
Quiz: Vulnerability Scanning

24 -
Analyzing Output from Vulnerability Scanners
#
Lesson
Duration
Type
1.
Analyzing Output from Vulnerability Scanners
1m:59s

2.
Scan Reports
3m:21s

3.
Common Identifiers
6m:31s

4.
CVSS
8m:25s

5.
Interpreting CVSS
9m:43s

6.
Vulnerability Reports
11m:3s

7.
Nessus
6m:55s

8.
OpenVAS and Qualys
3m:10s

9.
Assessing Scan Outputs
13m:37s

10.
Quiz: Analyzing Output from Vulnerability Scanners

25 -
Mitigating Vulnerabilities
#
Lesson
Duration
Type
1.
Mitigating Vulnerabilities
1m:34s

2.
Remediation and Mitigation
6m:28s

3.
Configuration Baselines
4m:18s

4.
Hardening and Patching
11m:4s

5.
Remediation Issues
8m:35s

6.
Quiz: Mitigating Vulnerabilities

26 -
Identity and Access Management Solutions
#
Lesson
Duration
Type
1.
Identity and Access Management Solutions
1m:49s

2.
Identity and Access Management
7m:4s

3.
Password Policies
6m:10s

4.
SSO and MFA
5m:40s

5.
Certificate Management
3m:55s

6.
Federation
5m:19s

7.
Passwordless Authentication
5m:17s

8.
Privilege Management
5m:52s

9.
IAM Auditing
6m:14s

10.
Conduct and Use Policies
3m:27s

11.
Account and Permissions Audits
4m:33s

12.
Quiz: Identity and Access Management Solutions

27 -
Network Architecture and Segmentation
#
Lesson
Duration
Type
1.
Network Architecture and Segmentation
1m:59s

2.
Asset and Change Management
10m:6s

3.
Network Architecture
11m:21s

4.
Segmentation
6m:1s

5.
Jumpbox
5m:4s

6.
Virtualization
5m:50s

7.
Virtualized Infrastructure
6m:35s

8.
Honeypots
6m:25s

9.
Zero Trust
6m:37s

10.
Configuring Network Segmentation
10m:6s

11.
Quiz: Network Architecture and Segmentation

28 -
Hardware Assurance Best Practices
#
Lesson
Duration
Type
1.
Hardware Assurance Best Practices
1m:44s

2.
Supply Chain Assessment
5m:25s

3.
Root of Trust
4m:36s

4.
Trusted Firmware
4m:55s

5.
Secure Processing
4m:3s

6.
Quiz: Hardware Assurance Best Practices

29 -
Specialized Technology
#
Lesson
Duration
Type
1.
Specialized Technology
1m:37s

2.
Mobile Vulnerabilities
12m:0s

3.
IoT Vulnerabilities
3m:29s

4.
Embedded System Vulnerabilities
6m:52s

5.
ICS & SCADA Vulnerabilities
8m:19s

6.
Mitigating Vulnerabilities
3m:30s

7.
Premise System Vulnerabilities
6m:14s

8.
Vehicular Vulnerabilities
6m:53s

9.
Quiz: Specialized Technology

30 -
Non-technical Data and Privacy Controls
#
Lesson
Duration
Type
1.
Non-technical Data and Privacy Controls
2m:45s

2.
Data Classification
9m:13s

3.
Data Types
3m:19s

4.
Legal Requirements
9m:17s

5.
Data Policies
5m:42s

6.
Data Retention
6m:59s

7.
Data Ownership
4m:6s

8.
Data Sharing
5m:46s

9.
Quiz: Non-technical Data and Privacy Controls

31 -
Technical Data and Privacy Controls
#
Lesson
Duration
Type
1.
Technical Data and Privacy Controls
1m:20s

2.
Access Controls
3m:3s

3.
File System Permissions
10m:11s

4.
Encryption
3m:17s

5.
Data Loss Prevention
4m:23s

6.
DLP Discovery and Classification
3m:58s

7.
Deidentification Controls
6m:30s

8.
DRM and Watermarking
4m:11s

9.
Analyzing Share Permissions
3m:38s

10.
Quiz: Technical Data and Privacy Controls

32 -
Mitigate Software Vulnerabilities and Attacks
#
Lesson
Duration
Type
1.
Mitigate Software Vulnerabilities and Attacks
1m:38s

2.
SDLC Integration
12m:11s

3.
Execution and Escalation
6m:23s

4.
Overflow Attacks
13m:32s

5.
Race Conditions
5m:50s

6.
Improper Error Handling
5m:17s

7.
Design Vulnerabilities
4m:16s

8.
Platform Best Practices
6m:31s

9.
Metasploit Framework
18m:45s

10.
Quiz: Mitigate Software Vulnerabilities and Attacks

33 -
Mitigate Web Application Vulnerabilities and Attacks
#
Lesson
Duration
Type
1.
Mitigate Web Application Vulnerabilities and Attacks
1m:32s

2.
Directory Traversal
8m:8s

3.
Cross-site Scripting
8m:4s

4.
SQL Injection
7m:42s

5.
XML Vulnerabilities
5m:10s

6.
Secure Coding
9m:31s

7.
Authentication Attacks
7m:9s

8.
Session Hijacking
6m:55s

9.
Server-Side Request Forgery
4m:22s

10.
Sensitive Data Exposure
3m:20s

11.
Clickjacking
2m:22s

12.
Web Application Vulnerabilities
8m:43s

13.
Quiz: Mitigate Web Application Vulnerabilities and Attacks

34 -
Analyzing Application Assessments
#
Lesson
Duration
Type
1.
Analyzing Application Assessments
1m:0s

2.
Software Assessments
7m:35s

3.
Reverse Engineering
7m:19s

4.
Dynamic Analysis
7m:56s

5.
Web Application Scanners
3m:14s

6.
Burp Suite
10m:34s

7.
OWASP ZAP
2m:55s

8.
Analyzing Web Applications
15m:43s

9.
Quiz: Analyzing Application Assessments

35 -
Cloud and Automation
#
Lesson
Duration
Type
1.
Cloud and Automation
1m:4s

2.
Cloud Models
16m:3s

3.
Service Models
10m:44s

4.
Cloud-based Infrastructure
7m:22s

5.
CASB
4m:28s

6.
Quiz: Cloud and Automation

36 -
Service-Oriented Architecture
#
Lesson
Duration
Type
1.
Service-Oriented Architecture
2m:9s

2.
SOA and Microservices
6m:3s

3.
SOAP
4m:41s

4.
SAML
6m:54s

5.
REST
10m:15s

6.
APIs, Webhooks, and Plugins
11m:44s

7.
Scripting
4m:29s

8.
Workflow Orchestration
6m:17s

9.
FAAS and Serverless
8m:14s

10.
Quiz: Service-Oriented Architecture

37 -
Cloud Infrastructure Assessments
#
Lesson
Duration
Type
1.
Cloud Infrastructure Assessments
1m:17s

2.
Cloud Threats
8m:13s

3.
Cloud Forensics
4m:1s

4.
Auditing the Cloud
5m:6s

5.
Conducting Cloud Audits
14m:2s

6.
Quiz: Cloud Infrastructure Assessments

38 -
Automation Concepts and Technologies
#
Lesson
Duration
Type
1.
Automation Concepts and Technologies
2m:15s

2.
CI/CD
7m:6s

3.
DevSecOps
4m:51s

4.
IAC
4m:23s

5.
Machine Learning
8m:30s

6.
Data Enrichment
3m:41s

7.
SOAR
3m:20s

8.
Standardized Processes
4m:1s

9.
Single Pane of Glass
5m:57s

10.
Quiz: Automation Concepts and Technologies

39 -
Conclusion
#
Lesson
Duration
Type
1.
Conclusion (What to Do Next…)
13m:16s

2.
BONUS: What's Come Next?
4m:5s

3.
Practice Exam
