Analyze how as a security professional you need to know how both hackers and security testers use computer programming. Learning the basic skills of programming, you won’t be an expert, but you will have a better idea of how programs are written. This basic programming understanding can help you develop custom security tools for security tests. A security tester should have the skills to modify testing tools.
Investigate how attackers gather passive information about their target from social media, search engines, various websites, etc. As a security professional you will learn the tools that attackers use to gather information and the counter-measures to reduce the likelihood of success of the attack.
Explore the process to produce a Vulnerability Analysis and Vulnerability Assessment as a security professional. Discover methods for improving security by locating and determining flaws before they are exploited by bad actors. Examine methods to improve security on tested systems and fixing or minimizing the risks posed by these vulnerabilities. Finally, investigate the techniques and best practices for hardening OS and services.
Examines both the practical and conceptual skills that build the foundation for understanding Firewall technologies including: most common firewall types, use of host-based software firewall technology and network hardware firewall technology. Learner will gain familiarity with firewall technologies as related to software and hardware layered approach as well as firewall rules, understanding network protocols related to firewall technology, and vendor/firewall selection.
Examines both the practical and conceptual skills that build the foundation for understanding Cryptography technologies including: use of Cryptography technology, symmetric and asymmetric cryptography, hashing, and digital signatures. Learner will gain familiarity with the Cryptography technologies as related to Authentication, Integrity, Confidentiality and Non-Repudiation.
Examines both the practical and conceptual skills that build the foundation for understanding Intrusion Detection System technologies. the What, Why and Who of IDS is explored, including the features of an IDS verses an IPS. The importance of IDS, IDS technologies, and Packet Capture and Protocols are covered. Learners will analyze and capture network traffic through the use of sniffer tools and programs. Learners capture, view, and analyze network traffic in an attempt to monitor and secure the network. By the end of this course, the learner will have analyzed, applied, and evaluated IDS terminology, technologies, and protocols to secure Network traffic.
Examines both the practical and conceptual skills that build the foundation for understanding cyber security investigation and analysis including; vulnerability exploits, malware analysis; and hardening of systems to protect against exploitation. Learners will investigate a compromised system and learn to analysis systems to find malicious indicators. By the end of this course, the learner will be able to detect the key areas where an exploitation may reside and use various Windows built-in tools as well as 3rd party tools to detect malicious activity.
Examines both the practical and conceptual skills that build the foundation for understanding Virtual Private Networks technologies including: history of VPNs, use of VPN technology, types and different platforms of VPNs; VPN configuration and security. Learner will gain familiarity with the protocols used in a virtual private network; and will configure a site to branch VPN. By the end of this course, the learner will have analyzed, applied, and evaluated various VPN technologies and the protocols to secure a Virtual Private Network.
Examines the architectures of security, securing mobile and web applications, cloud and virtualization issues, and account and access control processes. Course topics align with the CompTIA Security+ certification. Further introduces security concepts, tools, and procedures for preventing, mitigating and responding to security incidents.
Explore how attackers infiltrate a system to gather information and data. This course will explore how Python and Python scripts can be used to detect these attacks, and gain knowledge on how to write and use Python scripts to secure systems against cyberattacks.
Examines risk and the standard procedures for security, data security, cryptography, and Public Key Infrastructure and processes for mitigation. Building upon security concepts, tools, and procedures for preventing, mitigating and responding to security incidents. Course topics align with the CompTIA Security+ certification.