Here are two questions everyone will eventually need to ask themselves: What do I have, and where is it? This seven-video course gives the student the tools to answer those questions by taking them through the minutiae of asset security. Beginning with managing sensitive data and basic principles such as need-to-know and definitions of important terms (quality control and assurance, data owner, data custodian and more), we conduct a deeper dive into six key topic areas: data remanence, data at rest, data in transit, data ownership, data security controls and classification.
This course looks at three important parts of security assessment: goals, control testing and collecting, analyzing and reporting security data. In four videos, students will be introduced to the ins and outs of penetration testing: testing a system from an attacker’s point of view, monitoring a system’s vulnerabilities, planning for and performing a test, the Rules of Engagement when attacking a client’s system, the nitty-gritty of security auditing and more. Every system has a weakness, and sometimes, it’s your job to find it before your enemies do.
Twenty-two videos cover everything you want to know about access control fundamentals. Beginning with access control basics (definitions and subject-object relationships), we move on to access control categories, authentication, account management, Single Sign-On (SSO) and Kerberos, the three forms of user authentication and the arguable fourth form, remote authentication services and much more. This is a complex subject, but our Access Control Fundamentals course dives deep and dredges up the answers for you.
Securing a network is a lot like securing a building: there are many possible protection mechanisms, and even more possible ways for the intruder to get in. In this course, six videos take the student through the essentials of secure network design. From firewalls and the so-called demilitarized zone (DMZ) to honeypots, honeytokens and honeynets, endpoint security and the many flavors of authentication protocol, learn to identify the potential chinks in a system’s armor — and how to make them secure.
When it comes to wireless networks and remote access security, there are several threats you need to be on the lookout for. Bluesnarfing, Man-in-the-Middle attacks and the dangers of obsolete protocols are just a few. In this five-video course, the student will review WAN and remote access security: wireless networks, mobile systems, WAN technologies, remote access and secure communication protocols. This course also includes diagrams, vocabulary, definitions, protocol lists and examples.
Review everything you ever needed to know about network fundamentals with this fourteen-video course. Beginning with OSI (Open Systems and Interconnection) protocols and layers, this course explores the TCP/IP model, network devices and security, IP networking, multi-layer protocols, Dynamic Host Configuration Protocol (DHCP), network cabling and topology, signaling types and much more. Take a closer look at switched and permanent virtual circuits, or find out what DORA or POTS stands for. It’s all here!