logo

Week 6 - Network & Application Security I

Week 6 - Network & Application Security I
Course content
Introduction
Module Introduction
Week 6 - Kickoff
The CIA Triad
Privacy, Anonymity, and Pseudonymity
Security, Vulnerabilities, Threats, and Adversaries
Defense in Depth (DID)
The DID Model in Network Security
Building Resilient Defenses
Zero Trust
Architecture
Network Security Design
Threat Prevention
Threat Detection
Incident Response
Locking Down Your Network
Security Defense Appliances
Demilitarized Zones (DMZs)
Honeypots
Types of Honeypots
Architecture - Knowledge Check
Cryptography
Introduction to Cryptography
Cryptography in Cybersecurity
Encryption and Decryption
Goals and Services
Symmetric Key Cryptography
Asymmetric Key Cryptography
Asymmetric Key Cryptography: An Example
Types of Asymmetric Encryption
Commands
Ready, Set, Lab! - File Encryption/Decryption
Week 6 - File Encryption/Decryption
2Questions
Symmetric vs. Asymmetric Key Cryptography
Cryptography - Knowledge Check
What Is Hashing?
Use of Hashing
How Does a Hashing Algorithm Work?
Hashing Algorithm Example
Popular Hashing Algorithms
Ready, Set, Lab! - Hash Functions
Week 6 - Hash Functions
2Questions
Hash Functions - Knowledge Check
Hashing vs Encryption
What is a VPN?
Types of VPNs
VPN Protocols
OpenVPN - Tool Introduction
Cryptography - Knowledge Check
Access Control
What is Access Control?
Securing Your Systems
The Three A’s
The Importance of Authentication
Single Factor Authentication
Two Factor Authentication
Multi Factor Authentication
Introduction
Lightweight Directory Access Protocol (LDAP)
Kerberos
NTLM
The Difference Between NTLM and Kerberos
Authentication Protocols Recap
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Types of Access Control - Knowledge Check
Active Directory - Tool Introduction
What Does Active Directory Do?
Active Directory's Hierarchical Structure
Ready, Set, Lab! - Windows Server Configuration
Week 6 - Windows Server Configuration
2Questions
Ready, Set, Lab! - Creating & Managing AD Objects
Week 6 - Creating & Managing AD Objects
2Questions
Ready, Set, Lab! - Basic GPO Configuration
Week 6 - Basic GPO Configuration
2Questions
Module Closure
Week 6 - Weekly Quiz
10Questions
Week 6 - Key Takeaways
Your Career Guide to Success
Cybersecurity: Introduction to Your Career Services Training Program
Career Services Survey

ThriveDX