Introduction
Privacy, Anonymity, and Pseudonymity
Security, Vulnerabilities, Threats, and Adversaries
The DID Model in Network Security
Building Resilient Defenses
Architecture
Locking Down Your Network
Security Defense Appliances
Demilitarized Zones (DMZs)
Architecture - Knowledge Check
Cryptography
Introduction to Cryptography
Cryptography in Cybersecurity
Encryption and Decryption
Symmetric Key Cryptography
Asymmetric Key Cryptography
Asymmetric Key Cryptography: An Example
Types of Asymmetric Encryption
Ready, Set, Lab! - File Encryption/Decryption
Symmetric vs. Asymmetric Key Cryptography
Cryptography - Knowledge Check
How Does a Hashing Algorithm Work?
Hashing Algorithm Example
Popular Hashing Algorithms
Ready, Set, Lab! - Hash Functions
Hash Functions - Knowledge Check
OpenVPN - Tool Introduction
Cryptography - Knowledge Check
Access Control
The Importance of Authentication
Single Factor Authentication
Two Factor Authentication
Multi Factor Authentication
Lightweight Directory Access Protocol (LDAP)
The Difference Between NTLM and Kerberos
Authentication Protocols Recap
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Types of Access Control - Knowledge Check
Active Directory - Tool Introduction
What Does Active Directory Do?
Active Directory's Hierarchical Structure
Ready, Set, Lab! - Windows Server Configuration
Ready, Set, Lab! - Creating & Managing AD Objects
Ready, Set, Lab! - Basic GPO Configuration
Module Closure
Week 6 - Weekly Quiz (Master)
10Questions
Your Career Guide to Success
Cybersecurity: Introduction to Your Career Services Training Program