Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cybersecurity Entry-Level Course
Welcome To Cybersecurity Entry-Level Course
Welcome (6:46)
Course Text Book
Module One: Cybersecurity Basics
Introduction To Module One (0:45)
Download Module1 Lesson Notes
Lesson One: Introduction To Cybersecurity (25:03)
Lesson Two: Cybersecurity Career Path (36:35)
Lesson Three: Certificate Vs. Degree (21:20)
Lesson Four: Cybersecurity Competency Model (16:46)
Lesson Five: Cybersecurity Language (16:24)
Download Cybersecurity Language Cheat Sheet
Module Two: Attacks, Threats, and Vulnerabilities
Introduction to Module Two (0:59)
Download Module2 Lesson Notes
Lesson 1: Cybersecurity CIA (92:19)
Lesson 2: Cybersecurity Definitions (10:54)
Lesson 3: Cybersecurity Controls (22:00)
Lesson 4: Types of Vulnerabilities (41:55)
Lesson 5: Identification of Vulnerabilities (13:27)
Lesson 6: Penetration Testing (36:46)
Lesson 7: Indicators of Compromise (27:21)
Lesson 8: Types of attacks (77:04)
ASSIGNMENT-Hands-On Exercise
Module Three: Risk Management
Introduction to Module Three (0:50)
Download Module3 Lesson Notes
Lesson1: Introduction to Risk Management (64:59)
Lesson 2: Security Policies, Plans, and Procedures (14:07)
Lesson 3: Personnel Management (42:16)
Lesson 4: Business Impact Analysis Concepts (23:38)
Lesson 5: Incident Response Procedures (27:42)
Lesson 6: Basic Concepts of Forensics (22:50)
Lesson 7: Disaster Recovery and Continuity (40:57)
Lesson 8: Data Security and Privacy Practices (17:40)
Quiz/Practice Test
Module Four: Networking and Networking Tools
Introduction To Module Four (1:26)
Download Module 4 Lesson Notes
Lesson One: Computer Networking Basics (33:02)
Lesson Two: Install and configure network components, both hardware and software (137:58)
Lesson Three: Network Security (103:58)
Lesson Four: How to use appropriate software tools to assess the security posture of an organization (23:13)
Lesson Five: Troubleshoot common security issues (13:36)
Lesson Six: Deploy Mobile Devices Securely (34:51)
Lesson Seven: Implement Secure Protocols (6:30)
Quiz/Practice Test
Module Six: Cybersecurity Architecture and Design
Introduction to Module Six (1:15)
Download Module 6 Lesson Notes
Lesson 1: Introduction to Cybersecurity Architecture and Design (10:08)
Lesson 2: Cybersecurity Frameworks, best practices, secure configuration guides (18:45)
Lesson 3: Secure Network Architecture Concepts (7:59)
Lesson 4: Secure Systems Design (36:37)
Lesson 5: Secure Staging Deployment Concepts (9:41)
Lesson 6: Embedded Systems and associated security implications (22:50)
Lesson 7: Secure Application Development and Deployment Concepts (60:02)
Lesson 8: Cloud and Virtualization Concepts (44:25)
Lesson 9: Resiliency and Automation Strategies to Reduce Risk (17:16)
Lesson 10: Importance of Physical Security Controls (17:04)
Quiz/ Practice Test
Module Seven: Cryptography and Public Key Infrastructure
Module Introduction (0:46)
Download Module7 Lesson Notes
Lesson 1: Basic Concepts of Cryptography (31:30)
Lesson 2: Cryptography Algorithms and their Basic Characteristics (66:50)
Lesson 3: Install and Configure Wireless Security Settings (23:16)
Lesson 4: Implement Public Key Infrastructure (44:30)
Quiz/ Practice Test
Module Eight: Identity and Access Management
Module Introduction (0:53)
Download Module 8 Lesson Notes
Lesson One: Identity and Access Management Concepts (30:03)
Lesson Two: Install and Configure Identity and Access Services (30:51)
Lesson Three: Implement Identity And Access Management Controls (19:45)
Lesson Four: Common Account Management Practices (30:32)
Quiz/Practice Test
Module Five (PART A): Hands-on Performance Training
Introduction to Hands-on Performance Training (1:43)
Lesson One: Introduction to Virtual Machines (VMs) (26:47)
Lesson Two: Risk Associated With Virtual Machine (5:36)
Lesson Three: Installation of Hypervisors and Virtual Machines (40:27)
Installation of Metasploitable 3 (17:16)
Installation of Parrot OS(Similar Kali Linux) (8:38)
Installation of Windows 10 Virtual Machine (8:38)
Installation of Windows 8 Virtual Machine (11:27)
Windows Command Line Basics (23:09)
Linux Command Line Basics (27:20)
Lesson Four: Command Line Tools (54:32)
Lesson Five: Intro To Popular Cybersecurity Tools (8:48)
Lesson Six: Cybersecurity Collective Tools (17:14)
Installation of SIEM Tools -Splunk (10:13)
Installation of Nessus (14:58)
Installation of Vulnerability Scanning Tool-Qualys (7:40)
Lesson Seven: Cybersecurity Preventive Tools (6:48)
Lesson Eight: Password Cracking Tools (2:10)
Lesson Nine: Exploitation Tools (8:00)
Lesson Ten: Social Engineering Attack Simulation (0:59)
Vulnerability Database-CWE, NVD, CVE, CVSS (19:09)
LESSON FIVE NOTES
COMMAND CHEAT SHEET
Module Five (PART B): Hands-on Training
Nmap-Port/Network Scanner (35:58)
How to configure FIREWALL, GROUP POLICY, PASSWORD POLICY (26:00)
Nikto-Web Vulnerability Scanner (17:36)
Wireshark and Man-in-the-middle Attack (14:20)
Wireless Network Configuration (17:40)
Using Nessus-1 (26:07)
Using Nessus-2 (31:22)
Splunk Enterprise 1 (60:12)
Splunk Enterprise 2 (34:34)
Hands-On Exercise
Splunk Security Essentials 1 (39:05)
Splunk Security Essential 2 (12:53)
Splunk Enterprise Security (Splunk Cloud) (49:59)
Nikto -Web Vulnerability Scanner (21:00)
BurpSuite (Web Application Security Testing) (22:24)
Social Engineering (How to Detect Phishing Attack) (31:09)
Social Engineering (Credential Harvester Attack) (19:22)
Module Five (PART C): Networking fundamentals with Packet Tracer
Packet Tracer Installation (4:55)
Packet Tracer Setup and Familiarization (8:11)
PT Orientation (14:07)
Simple Network Configuration (27:11)
Building A Simple Network (5:45)
PDU Demonstration (4:48)
Using Samples in Packer Tracer (2:39)
Module Nine: The Cloud
Module Introduction (0:35)
Lesson One: Introduction To The Cloud (7:25)
Lesson Two: Popular Cloud Services (16:23)
Lesson Three: Types of Cloud Computing (13:23)
Lesson Four: The Cloud Certifications And Salaries (6:01)
Module Ten: Framework And Governance
Introduction To Module Ten (0:41)
Lesson 1: Introduction To Framework And Governance (6:13)
Lesson2: Regulations, Standards, And Legislation (8:16)
Lesson 3: Key Framework (23:56)
Lesson 4: Benchmarks/Secure Configuration Guides (7:40)
How to Register for CompTIA Exams (15:59)
Lesson 3: Secure Network Architecture Concepts
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock