Modules
1 -
Introduction
#
Lesson
Duration
Type
1.
Introduction
FREE
11h:41m

2.
Download your free study guide

3.
Exam Tips
FREE
3h:24m

4.
100% Pass Guarantee

5.
Checkpoint: Introduction

2 -
Overview of Security
#
Lesson
Duration
Type
1.
Overview of Security
FREE
10h:36m

2.
CIA Triad
FREE
9h:36m

3.
AAA of Security
FREE
4h:6m

4.
Security Threats
7h:26m

5.
Mitigating Threats
7h:13m

6.
Threat Actors
14h:57m

7.
Common Security Roles
12h:28m

8.
MITRE ATT&CK Framework
6h:3m

9.
Checkpoint: Overview of Security

3 -
Risk Management
#
Lesson
Duration
Type
1.
Risk Management
3h:27m

2.
Risk Assessment
8h:26m

3.
Methodologies
2h:49m

4.
Security Controls
6h:47m

5.
Vulnerability Assessments
3h:32m

6.
Penetration Testing
4h:12m

7.
Common Vulnerability Identifiers
6h:11m

8.
Vulnerability Reports
10h:34m

9.
Zero-day Vulnerabilities
5h:3m

10.
Execution and Escalation Attacks
3h:59m

11.
Incident Response Process
9h:50m

12.
Checkpoint: Risk Management

4 -
Ethical Behavior
#
Lesson
Duration
Type
1.
Ethical Behavior
3h:42m

2.
Computer Security Laws
14h:29m

3.
Legal Requirements
11h:23m

4.
Bug Bounties
10h:5m

5.
Copyright Laws
6h:48m

6.
Confidential Information
6h:35m

7.
Errors and Outages
7h:52m

8.
AWS Outage Case Study
4h:1m

9.
Checkpoint: Ethical Behavior

5 -
Malware
#
Lesson
Duration
Type
1.
Malware
3h:12m

2.
Viruses, Worms, and Trojans
11h:20m

3.
Ransomware
2h:33m

4.
Spyware
2h:38m

5.
Rootkits
3h:31m

6.
Botnets and Zombies
3h:30m

7.
Backdoors and Logic Bombs
3h:48m

8.
Symptoms of Infections
4h:10m

9.
Removing Malware
5h:2m

10.
Preventing Malware
4h:39m

11.
Viruses and Trojans in Action
6h:16m

12.
Checkpoint: Malware

6 -
Social Engineering
#
Lesson
Duration
Type
1.
Social Engineering
3h:16m

2.
Phishing
12h:11m

3.
Spam
2h:56m

4.
Filtering Spam
6h:20m

5.
Impersonation
4h:3m

6.
Pretexting
4h:14m

7.
Social Engineering Attacks
4h:23m

8.
Frauds, Scams, and Hoaxes
6h:59m

9.
Evil Twin
4h:43m

10.
User Education
4h:32m

11.
Anti-phishing Training
5h:19m

12.
Checkpoint: Social Engineering

7 -
Hardware Security
#
Lesson
Duration
Type
1.
Hardware Security
3h:23m

2.
Hardware Components
12h:31m

3.
Smart Devices and IoT
8h:15m

4.
Trusted Computing
5h:36m

5.
USB Devices
7h:57m

6.
Bluetooth Devices
7h:57m

7.
RFID Devices
8h:37m

8.
Checkpoint: Hardware Security

8 -
Application Security
#
Lesson
Duration
Type
1.
Application Security
3h:46m

2.
Types of Software
8h:51m

3.
Installing Applications
11h:2m

4.
Mobile Application Risks
5h:54m

5.
Updating Applications
3h:52m

6.
Security Applications
8h:43m

7.
Buffer Overflows
7h:53m

8.
Buffer Overflow Attack
6h:24m

9.
SQL Injections
9h:38m

10.
Checkpoint: Application Security

9 -
Networks
#
Lesson
Duration
Type
1.
Networks
5h:55m

2.
Networking Hardware
15h:20m

3.
The OSI Model
5h:14m

4.
The TCP/IP Model
5h:1m

5.
TCP and UDP
6h:48m

7.
IPv4
24h:25m

6.
Switches and Routers
5h:44m

8.
Assigning IPv4 Addresses
12h:23m

9.
Data Transfer Over Networks
6h:2m

10.
Network Routing
7h:56m

11.
DNS
12h:20m

12.
IPv6
10h:38m

13.
Internet Service Providers
3h:4m

14.
Checkpoint: Networks

10 -
Network Security
#
Lesson
Duration
Type
1.
Network Security
3h:4m

2.
Wired Network Security
7h:21m

3.
Network Access Control (NAC)
2h:53m

4.
Wireless Networks
10h:42m

5.
Wireless Encryption
8h:52m

6.
Wireless Security
9h:43m

7.
Traffic Interception
3h:59m

8.
DoS and DDoS
8h:2m

9.
Configuring SOHO Networks
25h:54m

10.
Configuring Wireless Networks
13h:37m

11.
Checkpoint: Network Security

11 -
Cloud Computing
#
Lesson
Duration
Type
1.
Cloud Computing
5h:22m

2.
Cloud Characteristics
14h:50m

3.
SaaS
7h:41m

4.
IaaS
8h:13m

5.
PaaS
7h:31m

6.
Deployment Models
9h:16m

7.
Shared Responsibility Model
5h:15m

8.
Cloud Threats and Vulnerabilities
8h:9m

9.
Security in the Cloud
2h:24m

10.
Checkpoint: Cloud Computing

12 -
Cryptography
#
Lesson
Duration
Type
1.
Cryptography
5h:51m

2.
Symmetric vs Asymmetric
6h:1m

3.
Symmetric Algorithms
4h:34m

4.
Asymmetric Algorithms
6h:49m

5.
Public Key Infrastructure
10h:15m

6.
Digital Certificates
4h:44m

7.
Examining Digital Certificates
3h:29m

8.
Certificate Revocation
3h:46m

9.
Perfect Forward Secrecy
3h:32m

10.
Hashing
8h:27m

11.
Using Hashing
3h:3m

12.
Hashing Security and Attacks
4h:43m

13.
Checkpoint: Cryptography

13 -
Applied Cryptography
#
Lesson
Duration
Type
1.
Applied Cryptography
5h:24m

2.
Web Encryption
6h:57m

3.
X.509 Certificates
5h:14m

4.
Email Encryption and Signatures
7h:51m

5.
OpenPGP
3h:12m

6.
S/MIME
3h:45m

7.
Send and Receive Encrypted Emails
8h:40m

8.
Storage Encryption
4h:12m

9.
BitLocker
2h:56m

10.
VeraCrypt
3h:9m

11.
Cryptomator
2h:42m

12.
Checkpoint: Applied Cryptography

14 -
Data Availability
#
Lesson
Duration
Type
1.
Data Availability
2h:22m

2.
Backup and Recovery
4h:35m

3.
Backup and Recovery Methods
13h:11m

4.
Backup Schemes
15h:29m

5.
Security for Backups
5h:28m

6.
Retention Requirements
4h:12m

7.
Cloud-based File Storage
3h:47m

8.
Checkpoint: Data Availability

15 -
Authentication and Authorization
#
Lesson
Duration
Type
1.
Authentication and Authorization
4h:42m

2.
Password Best Practices
10h:32m

3.
Password Cracking
8h:13m

4.
Password Managers
10h:29m

5.
Single Sign-On (SSO)
2h:54m

6.
Multifactor Authentication (MFA)
7h:33m

7.
Passwordless Authentication
5h:15m

8.
Online Password Storage
5h:54m

9.
Password Leaks
3h:27m

10.
Checkpoint: Authentication and Authorization

16 -
Anonymitiy
#
Lesson
Duration
Type
1.
Anonymitiy
5h:17m

2.
Virtual Private Networks (VPNs)
4h:27m

3.
End-to-End Encryption
2h:42m

4.
Transfer Encryption
3h:10m

5.
Anonymity and Recognition
3h:21m

6.
Proxy Servers
3h:39m

7.
TOR
4h:0m

8.
The Darknet
4h:14m

9.
Cryptocurrencies
3h:54m

10.
Checkpoint: Anonymitiy

17 -
Protecting Your Privacy
#
Lesson
Duration
Type
1.
Protecting Your Privacy
4h:7m

2.
Personally Identifiable Information (PII)
6h:52m

3.
Threats to Personal Information
3h:36m

4.
User Tracking
4h:26m

5.
Script Blockers and Ad Blockers
4h:17m

6.
Profile Privacy Settings
2h:29m

7.
Stalking and Cybermobbing
3h:20m

8.
Checkpoint: Protecting Your Privacy

18 -
Conclusion
#
Lesson
Duration
Type
1.
Conclusion
13h:18m

2.
BONUS: Where do I go from here?
3h:44m

3.
Practice Exam
