Cyber Security Job Programme
£2846, Now £899
Select an option below to show price
/ month for 8 monthsProfessional and Accredited Online Learning
Accredited and Professional courses you can access on our world class online learning portal. Study anytime, anyplace.
Can now be taken online via a webcam. Super fast booking times with easy access. No more travel hassle.
Our practical experience allows you to connect to live equipment through advanced cloud systems. Just like when you work in IT.
Your own Mock Test Teacher and Account Manager to guide you through every step
Our unlimited Mock Test Support means you have unlimited chances to pass
Your new CV we build you gets past filter systems on Job Boards and we’ll support you with our job recommendations.
7
No IT experience needed. Our Programme is for complete Beginners. We provide you with the 7 things you need to begin your new IT career
1. Skills from Accredited courses
2. Official exams recognised worldwide
3. Real Practical Experience
4. Your own Account Manager
5. Your own Mock Test Teacher
6. Unlimited Mock Tests
7. Career Support
Everything you need is included
CompTIA IT Fundamentals+
CompTIA A+ Core 1 and Core 2
CompTIA Network+
CompTIA Cloud+
CompTIA ITIL Foundations
Microsoft Windows
Cisco CCNA
CompTIA Security+
CompTIA Cyber Security Analyst
CompTIA Linux+
Cloud Computing Security Knowledge
Ethical Hacker
2 x Exams included
CompTIA A+ Core 1 220-1101
CompTIA A+ Core 2 220-1102
2 x Practice Labs included
CompTIA A+ Core 2 220-1102
CompTIA Security+ SYO-701
Graduate Officially with a CompTIA Partner
Complete CV Build
Professional Reference
Personal Statement Build
Cover Letter Build
Email Signature Build
LinkedIn Profile Enhancement
Employer Reference Verification
Study as many hours as you want, when you want
The cyber security course programme is designed as a FAST TRACK programme. You have the best of both worlds where you get up to 2 years access to everything but can still complete the entire programme in just 4-5 months based on 15 hours a week study.
Or do 8 hours a week study allowing you to complete the entire programme in 8 months. Or even 4 hours a week allows you to complete in 12 months.
The main thing is you decide how many hours you want to study each week, whether it's 5 hours one week, 15 hours another week or you take a few weeks off. You are in complete control.
Get the best of both worlds
Up to 24 months access.
But you can still complete in just 4 - 5 months.
Your cyber security course programme is released in two parts. Each part has 12 months access. As soon as you finish Part 1, we release part 2 straight away with a fresh 12 months access giving you up to 24 months access in total.
Part 1: Complete the seven accredited and professional IT courses and pass the CompTIA A+ exams with our unlimited Mock Test Support and Mock Test Teacher.
Part 2: Complete the five accredited and professional Cyber Security courses, complete both practice labs and then enjoy our Award Winning Career support which includes a new CV, Cover Letter, LinkedIn Profile enhancement, Reference from a CompTIA Authorised Partner and more so that you can begin your new IT Career.
Average Salary Indicator
Just some of our graduates
Get a free IT career consultation.
Module outlines for each course
CompTIA IT Fundamentals Module Outline
The CompTIA IT Fundamentals course is the first course you will study on the cyber security course programme. This course is perfect for you if you’re considering a career in IT or if you work in a similar field that requires a broad understanding of IT, like in a sales role at an IT company. CompTIA IT Fundamentals is a stepping stone to more advanced certifications such as CompTIA A+, and then to CompTIA Network+ and CompTIA Security+.
The CompTIA IT Fundamentals course focuses on the essential IT skills and knowledge needed by advanced end-users and entry-level IT professionals:
- Identifying and explaining computer components.
- Setting up a workstation: including conducting software installations.
- Establishing network connectivity.
- Identifying compatibility issues and identifying and preventing security risks.
- Managing the safety and preventative maintenance of computers.
Module 1 Software
Module 2 Hardware
Module 3 Security
Module 4 Networking
Module 5 Basic IT Literacy
Module 6 Course Review
CompTIA A+ Module Outline
The CompTIA A+ is in two parts Core 1 and Core 2 and is the second course included on the cyber security course programme. You must complete Core 1 before you attempt Core 2. This course includes both parts and is the new course. CompTIA A+ 220-1101 covers mobile devices, networking technology, hardware, virtualization and cloud computing, and network troubleshooting.
CompTIA A+ 220-1102 covers installing and configuring operating systems, expanded security, software troubleshooting and operational procedures.
CompTIA A + 220-1101 Core 1
1.0 – Mobile Devices
• What are we covering?
• 1.1 Given a scenario, install and configure laptop hardware and components
• 1.2 Given a scenario, install components within the display of a laptop
• 1.3 Given a scenario, use appropriate laptop features
• 1.4 Compare and contrast characteristics of various types of other mobile
devices
• 1.5 Given a scenario, connect and configure accessories and ports of other
mobile devices
• 1.6 Given a scenario, configure basic mobile device network connectivity and
application support
• 1.7 Given a scenario, use methods to perform mobile device synchronization
2.0 Networking
• What are we covering?
• 2.1 Compare and contrast TCP and UDP ports, protocols and their purpose
• 2.2 Compare and contrast common networking hardware devices
• 2.3 Given a scenario, install and configure a basic wired/wireless SOHO
network
• 2.4 Compare and contrast wireless networking protocols
• 2.5 Summarize the properties and purposes of services provided by
networked hosts
• 2.6 Explain common network configuration concepts
• 2.7 Compare and contrast internet connection types, network types and their
features
• 2.8 Given a scenario, use appropriate networking tools
3.0 Hardware
• What are we covering?
• 3.1 Explain basic cable types, features and their purposes
• 3.2 Identify common connector types
• 3.3 Given a scenario, install RAM types
• 3.4 Given a scenario, select, install and configure storage devices
• 3.5 Given a scenario, install and configure motherboards, CPUs and add-on
cards
• 3.6 Explain the purposes and uses of various peripheral types
• 3.7 Summarize power supply types and features
• 3.8 Given a scenario, select and configure appropriate components for a
custom PC configuration to meet customer specifications/needs
• 3.9 Given a scenario, install and configure common devices
• 3.10 Given a scenario, configure SOHO multifunction devices/printers and
settings
• 3.11 Given a scenario, install and maintain various print technologies
4.0 Virtualization and Cloud Computing
• 4.1 Compare and contrast cloud computing concepts
• 4.2 Given a scenario, set up and configure client-side virtualization
5.0 Hardware and Network Troubleshooting
• What are we covering?
• 5.1 Given a scenario, use the best practice methodology to resolve problems
• 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM,
CPUs and power
• 5.3 Given a scenario, troubleshoot hard drives and RAID arrays
• 5.4 Given a scenario, troubleshoot video, projector and display issues
• 5.5 Given a scenario, troubleshoot common mobile device issues while
adhering to the appropriate procedures
• 5.6 Given a scenario, troubleshoot printers
• 5.7 Given a scenario, troubleshoot common wires and wireless network
problems
CompTIA A + 220-1102 Core 2
Module 1 – Operation Systems
• Compare and contrast common operating system types and their purposes
• Compare and contrast features of Microsoft Windows versions
• Summarize general OS installation considerations and upgrade methods
• Given a scenario, use appropriate Microsoft command line tools
• Given a scenario, use Microsoft operating system features and tools
• Given a scenario, use Microsoft Windows Control Panel utilities
• Summarize application installation and configuration concepts
• Given a scenario, configure Microsoft Windows networking on a client/desktop
• Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating
systems
Module 2 – Security
• Summarize the importance of physical security measures
• Explain logical security concepts
• Compare and contrast wireless security protocols and authentication methods
• Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
• Compare and contrast social engineering, threats, and vulnerabilities
• Compare and contrast the differences of basic Microsoft Windows OS security settings
• Given a scenario, implement security best practices to secure a workstation
• Given a scenario, implement methods for securing mobile devices
• Given a scenario, implement appropriate data destruction and disposal methods
• Given a scenario, configure security on SOHO wireless and wired networks
Module 3 – Software Troubleshooting
•Given a scenario, troubleshoot Microsoft Windows OS problems
• Given a scenario, troubleshoot and resolve PC security issues
• Given a scenario, use best practice procedures for malware removal
• Given a scenario, troubleshoot mobile OS and application issues
• Given a scenario, troubleshoot mobile OS and application security issues
Module 4 – Operational Procedures
•Compare and contrast best practices associated with types of documentation
• Given a scenario, implement basic change management best practices
• Given a scenario, implement basic disaster prevention and recovery methods
• Explain common safety procedures • Explain environmental impacts and appropriate controls
• Explain the processes for addressing prohibited content/activity, and privacy, licensing, and
policy concepts
• Given a scenario, use proper communication techniques and professionalism
• Identify the basics of scripting • Given a scenario, use remote access technologies
CompTIA Network + Module Outline
The third course on the cyber security course programme: The CompTIA Network + course will enhance and develop your career in IT infrastructure and prove your different elements of Network skills:
• Networking concepts
• Network infrastructure and deploying common network components
• Network operations and supporting a production network
• Network security concepts and implementing basic network security
• Network troubleshooting
Network Concepts
- Intro Network Plus N10-008
- Basic networking
- Activity basic networking
- OSI model
- Exploring the OSI model act
- Protocol and ports
- Activity examining protocols and ports
- Connection oriented vs connectionless
- Activity comparing TCP and UDP
- Internet protocol (IP)
- Activity examining the lower layer protocols
- Layer 7 remote control protocols
- Layer 7 file transfer protocols
- Layer 7 file transfer protocols
- Layer 7 messaging protocols
- Activity examining messaging protocols
- Layer 7 web traffic protocols
- layer 7 streaming media protocols
- Layer 7 infrastructure management protocols
- Switching
- Activity creating collision and broadcast domains
- Interface properties and segmentation
- Activity creating a basic network segment
- Switching part 2
- Activity switching
- Switching loop management
- Activity managing switching loops
- VLANs
- Activity creating VLANs
- Routing
- Activity examining ARP
- IP addressing basics
- Activity configuring IP
- Routers
- Activity setting up a router
- Routing basics
- Activity adding static routes
- VLAN routing
- Activity routing between VLANs
- NAT/PAT
- Activity configuring NAT/PAT
- Routing protocols
- Activity configuring a routing protocol
- Firewalls
- Activity configuring firewalls
- Advanced switching and routing concepts
- Activity exploring IPv6
- Performance concepts
- IP addressing
- Subnetting
- Activity learning to subnet
- Address assignments
- Network types and topologies
- Wireless topologies
- Network types
- Technologies that facilitate the internet of things (IoT)
- Wireless technologies
- 802.11 standards
- Wi-Fi frequencies
- Wi-Fi antenna concepts
- Bluetotoh
- Cellular
- Activity using an RF spectrum analyzer
- Cloud concepts
- Activity exploring cloud services
- Network services
- Activity setting up DNS
- DHCP service
- Activity setting up DHCP
- NTP
Infrastructure
- Infrastructure
- Activity testing a fiber optic cable
- Plenum vs. PVC
- Activity crimping on an RJ-45 connector
- Transceivers
- Activity terminating cable to a 110 block
- Copper cable standards
- Activity creating a crossover cable
- Ethernet deployment standards
- Network device placement and installation
- Repeater
- Router
- Modem
- Activity setting up a WAP
- Firewall
- Media converter
- Advanced network devices
- Wireless controller
- Proxy server
- Activity configuring proxy settigns
- VPN concentrator
- Virtual networking components
- Network storage types
- WAN technologies
- Transmission mediums
- Activity configuring WAN links
- Termination
Network Operation
- Change management
- IDF-MDF documentation
- Labeling
- Logical vs physical diagrams
- Network operations documentation
- Rack diagrams
- Standard operation procedures
- Using documentation act
- Wiring and ports locations
- Continuity and disaster
- MTTR mean time repair
- Recovery
- Backing up your data act
- Event management
- Metrics
- Scanning monitoring patching
- Testing the network act
- HTTPS management
- Out of band management
- RDP
- Remote access methods
- Remote file access
- making remote connections act
- SSH
- VNC
- Policies and best practices
- Creating policies and procedures act
Network Security
Physical Security Devices
• Detection
• Prevention
Authentication and Access Control
• Authorization, Authentication, and Accounting
• Multifactor Authentication
• Access Control
• Activity: Examining Access Control Mechanisms
Basic Wireless Network Security
• WPA
• WPA2
• TKIP-RC4
• CCMP-AES
• Authentication and Authorization
• Geofencing
• Activity: Demonstrating the Need for Wireless Security
Common Network Attacks
• DoS
• Social Engineering
• Insider Threat
• Logic Bomb
• Rogue Access Point
• Evil Twin
• War-driving
• Phishing
• Ransomware
• DNS Poisoning
• ARP Poisoning
• Spoofing
• Deauthentication
• Brute Force
• VLAN Hopping
• Man-in-the-Middle
• Exploits vs. Vulnerabilities
• Activity Conducting a Phishing Attack
Network Device Hardening
• Changing Default Credentials
• Avoiding Common Passwords
• File Hashing
• Generating New Keys
• Activity Supporting Secure Authentication and Encryption
• Upgrading Firmware
• Patching and Updates
• Disabling Unnecessary Services
• Using Secure Protocols
• Disabling Unused Ports
Common Mitigation Techniques
• Signature Management
• Device Hardening
• Change Native VLAN
• Switchport Protection
• Network Segmentation
• Privileged User Account
• File Integrity Monitoring
• Role Separation
• Restricting Access Via ACLs
• Honeypot/Honeynet
• Penetration Testing
• Activity: Implementing a Honeypot
Network Troubleshooting and Tools
Network Troubleshooting Methodology
• Identify the Problem
• Establish a Theory of Probable Cause
• Test the Theory to Determine the Cause
• Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
• Implement the Solution or Escalate as Necessary
• Verify Full System Functionality and , if Applicable, Implement Preventive Measures
• Document Findings, Actions, and Outcomes
Using the Appropriate Tool
• Hardware Tools – Basic Hand Held
• Hardware Tools – Analyzers
• Activity: Troubleshooting with Hardware Tools
• Software Tools – Testers and Analyzers
• Activity: Troubleshooting with Software Tools
• Software Tools – Command Line
• Activity: Using Command Line Tools
Troubleshoot Wired Connectivity and Performance
• Signal Issues:
• Attenuation
• Latency
• Jitter
• Crosstalk
• EMI
• Activity Troubleshooting Signal Problems
• Physical Issues:
• Open/short
• Incorrect pin-out
• Incorrect Cable Type
• Bad Port
• Damaged cable
• Bent pins
• Transceiver Issues:
• Transceiver mismatch
• TX/RX reverse
• Duplex/speed mismatch
• Activity: Troubleshooting Transceiver Problems
• Traffic Flow Issues:
• Bottleneck
• VLAN mismatch
• Network connection LED status indicators
Troubleshoot Wireless Connectivity and Performance
• Signal Loss:
• Attenuation
• Reflection
• Refraction
• Absorption
• Latency & Jitter
• Antenna Issues:
• Incorrect antenna type
• Incorrect antenna placement
• Incorrect WAP type
• WAP Issues:
• Interference
• Channel overlap
• Overcapacity
• Distance limitations
• Frequency mismatch
• Power levels
• Signal-to-noise ratio
• WAP Misconfiguration:
• Wrong SSID
• Wrong passphrase
• Security type mismatch
• Activity Troubleshooting WAP Issues
Troubleshoot Common Network Service Issues
• Common Network Issues:
• Physical Connectivity
• Incorrect IP Address
• Incorrect Gateway
• Incorrect Netmask
• Names Not Resolving
• Untrusted SSL Certificate
• DCP Issues:
• Duplicate IP Addresses
• Expired IP Address
• Rogue DHCP
• Exhausted DHCP Scope
• Firewall/ACL Issues:
• Blocked TCP/UDP Ports
• Incorrect Host-based Firewall Settings
• Incorrect ACL Settings
• Advanced Network Issues:
• DNS Server Issues
• Duplicate MAC Addresses
• Incorrect Time
• Unresponsive Service
• Hardware Failure
• Activity Case Study: Troubleshooting an Unusual Network Issue
CompTIA Cloud + Module Outline
The fourth course on the cyber security course programme: The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments, who must understand and deliver cloud infrastructure. Recommended experience includes at least 24-36 months of work experience in IT networking, storage, or data centre administration, and familiarity with any major hypervisor technologies for server virtualisation
Cloud concepts and models
1. Intro
2. Models Part 1
3. Models Part2
4. Service And Delivery Models
5. Terms And Characteristics
6. Objects Storage Concepts
Virtualisation
1. Virtualization
2. Install Configure Manage VM And Devices
(Hands on Snapshots & Cloning)
Demo
3. Backups (Hands on Virtual Network Interface Cards) Demo
4. Virtual Disks (Hands on Virtual Disks) Demo
5. Virtual Switches
6. Virtual Resource Migration
7. Benefits Of Virtualization In A Cloud Environment
8. Compare And Contrast Virtual Environment
Infrastructure
1. Infrastructure
2. Different Access Protocols
3. Explain Storage Configuration
4. File Systems Types
5. Executing Storage Provisioning
6. Network Share Demo
7. Implement Appropriate Network Configurations
8. Importance Of Network Optimization
9. Troubleshoot Basic Network Configuration Part 1
10. Troubleshoot Basic Network Configuration Part 2
11. Troubleshoot Commands Part 1
12. Troubleshoot Commands Part 2
13. Troubleshoot Commands Part 3
14. Explain Common Network Protocols
15. Common Hardware Resources
Resource management
1. Resource Management Part 1
2. Resource Management Part 2
3. Establishing Baselines And Thresholds
4. Appropriately Allocate Physical Host Resources Part 1
5. Appropriately Allocate Physical Host Resources Part 2
6. Appropriately Allocate Virtual Guest Resources Part 1
7. Appropriately Allocate Virtual Guest Resources Part 2
8. Use Appropriate Tools For Remote Access
Security
1. Security Part 1
2. Security Part 2
3. Storage Security Concepts And Methods
4. Different Encryption Technologies
5. Identify Access Control Methods
Systems Management
1. Systems Management Part 1
2. Systems Management Part 2
3. Diagnose Remediate And Optimize Part 1
4. Diagnose Remediate And Optimize Part 2
5. Common Performance Concepts Part 1
6. Common Performance Concepts Part 2
7. Testing Techniques
Business Continuity in the Cloud
1. Business Continuity In Cloud Part 1
2. Business Continuity In Cloud Part 2
3. Solutions To Meet Availability Requirements
4. Conclusion
Microsoft: Configuring Windows Devices
The Windows course is the fifth course on the cyber security course programme and will equip you building solid identities, protection of content (data loss protection), mobile device management policy, virtualization with Hyper-V, application management using the Company Portal and the Windows Store. You’ll also understand Windows 10 security and integrated Azure features as well as below:
– Manage identity in Windows 10
– Plan Windows 10 desktop and device deployment
– Plan and implement a Microsoft 365 solution
– Configure Windows 10 networking and storage
– Manage data access and protection
– Manage remote access, apps and updates and recovery
Modules 1 - 3
Module 1: Introducing Windows 10
– Course Introduction
– What Makes Windows 10 Different
– Overview Of Windows 10 Features
– Navigating And Using Windows 10-Part1
– Navigating And Using Windows 10-Part2
Module 2: Installing Windows 10
– Preparing For Installation
– Installation Options
– Upgrading And Migrating-Part1
– Upgrading And Migrating-Part2
Module 3: Configuring Devices
– Overview Of Configuration Tools
– Common Configuration Options
– Managing User Accounts-Part1
– Managing User Accounts-Part2
– Using Control Panel
– Using Windows Administration Tools-Part1
– Using Windows Administration Tools-Part2
-Using Windows PowerShell-Part1
– Using Windows PowerShell-Part2
Modules 4 - 6
Module 4: Configuring Network Connectivity
– TCP IP Network Connectivity-Part1
– TCP IP Network Connectivity-Part2
– TCP IP Network Connectivity-Part3
– Name Resolution
– Wireless
– Remote Access Overview-Part1
– Remote Access Overview-Part2
– Troubleshooting Connectivity
Module 5: Managing Storage, Data, And Printers
– Managing Hard Disks-Part1
– Managing Hard Disks-Part2
– Managing Hard Disks-Part3
– Creating And Managing Storage Spaces
– Overview Of Data Access
– Configuring And Managing File Access
– Managing Shared Folder
– Understanding Work Folder
– Managing Printers
Module 6: Managing Apps
– Installing And Configuring Applications
– Managing Apps From The Windows Store
– Managing Microsoft Edge Web Browser
Modules 7 - 10
Module 7: Managing Device Security
– Configuring Network Security-Part1
– Configuring Network Security-Part2
– Configuring Local Security
– Configuring Data Security-Part1
– Configuring Data Security-Part2
– Configuring Device Security
Module 8: Maintaining Windows 10
– Updating Windows 10
– Monitoring And Optimizing Windows 10-Part1
– Monitoring And Optimizing Windows 10-Part2
Module 9: Troubleshooting And Recovery
– Managing Devices And Drives
– Recovery Files
– Recovering Devices
Module 10: Deploying Windows 10 Enterprise Desktops
– Overview Of Image Based Deployment
– Automating Installations
– Windows Activation
Modules 11 - 13
Module 11: Managing User Profiles And User State
Virtualization
– Managing User Profiles-Part1
– Managing User Profiles-Part2
– User State Virtualization
– User Profile Migration
Module 12: Managing Desktop And Application Settings
Using Group policy
– Using Group Policy To Manage Windows 10 Devices-Part1
– Using Group Policy To Manage Windows 10 Devices-Part2
– Using Group Policy To Manage Windows 10 Devices-Part3
– Using Group Policy To Manage Windows 10 Devices-Part4
– Using Group Policy To Manage Applications-Part1
– Using Group Policy To Manage Applications-Part2
Module 13: Configuring And Managing Client Hyper-V
– Introduction To Client Hyper-V
– Creating Virtual Machines
– Managing Virtual Machine Storage And Snapshot
– Conclusion
Cisco 200-301: Cisco Certified Network Association (CCNA)
This CCNA training is considered associate-level Cisco training, which means it is designed for junior network administrators. this 200-301 CCNA course is valuable for new IT professionals with at least a year of experience with networks and experienced network administrators looking to validate their Cisco skills.
After taking this course, the exam tests a candidate’s knowledge and skills related to network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability.
CCNA exams objectives, and covers topics such as:
Routing protocols, including OSPFv2 for IPv4 and OSPFv3 for IPv6
VLANs, STP, and EtherChannel (static, PAGP, and LACP)
WAN technologies
Quality of service (QoS), including marketing, shaping, and prioritization of voice, video, and data
Device monitoring protocols, including SNMPv2 and SNMPv3
Device management using AAA (authentication, authorization, and accounting) with TACACS+ and RADIUS
Module 1: Exploring the Functions of Networking
1. Instructor Intro
2. Course Intro
3. Exploring the Functions of Networking pt.1
4. Exploring the Functions of Networking pt.2
Module 2: Introduction the Host-to-Host Communications Model
1. Introducing the Host-to-Host Communications Model pt.1
2. Introducing the Host-to-Host Communications Model pt.2
Module 3: Introducing LANs
1. Introducing LANs
2. Get Started with CLI Demo
3. Adding Description to Interfaces Demo
4. Configure Gateway on a Switch Demo
5. Visualize Interfaces and Statistics Demo
6. Show Version Command Demo
7. CDP Demo
Module 4: Exploring the TCP/IP Link Layer
1. Exploring the TCP/IP Link Layer pt.1
2. Exploring the TCP/IP Link Layer pt.2
Module 5: Subnetting
1. Subnetting pt.1
2. Subnetting pt.2
3. Subnetting pt.3
4. Subnetting pt.4
CCNA 200-301
5. Subnetting pt.5
6. Subnetting pt.6
Module 6: Explaining the TCP/IP Transport Layer and Application Layer
1. Explaining the TCP/IP Transport Layer and Application Layer pt.1
2. Explaining the TCP/IP Transport Layer and Application Layer pt.2
3. Explaining the TCP/IP Transport Layer and Applications Layer pt.3
Module 7: Exploring the Functions of Routing
1. Exploring the Functions of Routing pt.1
2. Exploring the Functions of Routing pt.2
3. Exploring the Functions of Routing pt.3
4. Configuring RIP Demo
5. EIGRP Demo pt.1
6. EIGRP Demo pt.2
Module 8: Exploring the Packet Delivery Process
1. Exploring the Packet Delivery Process
Module 9: Troubleshooting a Simple Network
1. Troubleshooting a Simple Network
Module 10: Introducing Basic IPv6
1. Introducing Basic IPv6 pt.1
2. Introducing Basic IPv6 pt.2
3. Introducing Basic IPv6 pt.3
4. Introducing Basic IPv6 pt.4
5. Introducing Basic IPv6 pt.5
6. Introducing Basic IPv6 pt.6
7. Introducing Basic IPv6 pt.7
8. Introducing Basic IPv6 pt.8
9. IPv6 Basic Configuration and SLAAC Demo pt.1
10. IPv6 Basic Configuration and SLAAC Demo pt.2
11. IPv6 Routing Demo pt.1
12. IPv6 Routing Demo pt.2
13. IPv6 Static Routes Demo
Module 11: Configuring Static Routing
1. Configuring Static Routing
2. Static Routes Demo
Module 12: Implementing VLANs And Trunks
1. Implementing VLANs and Trunks pt.1
2. Implementing VLANs and Trunks pt.2
3. Implementing VLANs and Trunks pt.3
4. Implementing VLANs and Trunks pt.4
5. Spanning-tree Protocol Demo pt.1
6. Spanning-tree Protocol Demo pt.2
7. Spanning-tree Protocol Demo pt.3
Module 13: Routing Between VLANs
1. Routing Between VLANs
2. Inter VLAN Routing Demo
Module 14: Introducing OSPF
1. Introducing OSPF pt.1
2. Introducing OSPF pt.2
3. Introducing OSPF pt.3
4. Introducing OSPF pt.4
5. OSPF Single Area Demo pt.1
6. OSPF Single Area Demo pt.2
7. OSPF Multiple Area Demo pt.1
8. OSPF Multiple Area Demo pt.2
Module 15: Building Redundant Switched Topologies
1. Building Redundant Switch Topologies pt.1
2. Building Redundant Switch Topologies pt.2
Module 16: Improving Redundant Switched Topologies with EtherChannel
1. Improving Redundant Switched Topologies with EtherChannel pt.1
2. Improving Redundant Switched Topologies with EtherChannel pt.2
3. Configuring Ether Channel Demo
Module 17: Exploring Layer 3 Redundancy
1. Exploring Layer 3 Redundancy
Module 18: Introducing WAN Technologies
1. Introducing WAN Technologies pt.1
2. Introducing WAN Technologies pt.2
3. Introducing WAN Technologies pt.3
4. Introducing WAN Technologies pt.4
5. Introducing WAN Technologies pt.5
6. Introducing WAN Technologies pt.6
Module 19: Explaining Basics of ACL
1. Explaining Basics of ACL pt.1
2. Explaining Basics of ACL pt.2
3. Explaining Basics of ACL pt.3
Module 20: Enabling Internet Connectivity
1. Enabling Internet Connectivity
2. DHCP Demo
3. Static NAT Demo
4. PAT Using Specific IP Demo
5. PAT Using UP of Interface Demo
Module 21: Introducing Qos
1. Introducing QoS pt.1
2. Introducing QoS pt.2
3. Introducing QoS pt.3
4. Introducing QoS pt.4
5. Introducing QoS pt.5
Module 22: Introducing Architectures and Virtualization
1. Introducing Architectures and Virtualization pt.1
2. Introducing Architectures and Virtualization pt.2
3. Introducing Architectures and Virtualization pt.3
4. Introducing Architectures and Virtualization pt.4
Module 23: Introducing System Monitoring
1. Introducing System Monitoring pt.1
2. Introducing System Monitoring pt.2
3. Introducing System Monitoring pt.3
Module 24: Managing Cisco Devices
1. Managing Cisco Devices pt.1
2. Managing Cisco Devices pt.2
3. NTP Demo
4. Syslog Demo
Module 25: Examining the Security Threat Landscape
1. Examining the Security Thread Landscape pt.1
2. Examining the Security Thread Landscape pt.2
Module 26: Implementing Threat Defense Technologies
1. Implementing Thread Defense Technologies pt.1
2. Implementing Thread Defense Technologies pt.2
3. Implementing Thread Defense Technologies pt.3
4. Implementing Thread Defense Technologies pt.4
5. Implementing Thread Defense Technologies pt.5
6. Authentication Protocols Demo pt.1
7. Authentication Protocols Demo pt.2
8. Device Hardening Demo pt.1
9. Device Hardening Demo pt.2
10. Device Hardening Demo pt.3
11. Port Security Demo
Module 27: Exam Preparation
1. Exam Prep Tips
Information Technology Infrastructure Library (ITIL Foundations)
The seventh course on the cyber security course programme: The ITIL Foundations course covers the IT Infrastructure Library best practices. ITIL is globally accepted as the most widely used best practices for IT service management. This ITcertify course gives students the necessary knowledge to enter or enhance their career in project management or IT service management. Companies that use ITIL best practices range from the Fortune 500 market, Government, DOD, small business and is also used internationally. This course covers the 5 main concepts within ITIL: Service Strategy, Design, Transition, Operation and Continual Service Improvement.
Module 1
• 1.1 Intro
• 1.2 About Scheme
• 1.3 Levels Of Qualifications
• 1.4 Qualification Bodies
• 1.5 The ITIL Foundation Certifcation Stubble
Module 2
• 2.1 Service And Service Management Part 1
• 2.2 Service And Service Management Part 2
• 2.3 Service Management Processes Part 1
• 2.4 Service Management Processes Part 2
• 2.5 Service Management Best Practices And Summary
Module 3
• 3.1 Service Management Practices
• 3.2 Why ITIL
• 3.3 The Service Lifecycle
Module 4
• 4.1 Service Strategy Purpose And Objectives
• 4.2 Service Strategy Scope
• 4.3 Business Value Stubble
• 4.4 Key Principles Part 1
• 4.5 Key Principles Part 2
• 4.6 Service Stragey Processes
Module 5
• 5.1 Service Design Purpose And Objectives
• 5.2 Scope Of Service Design
• 5.3 Business Value Service Design
• 5.4 Service Design Key Principles
• 5.5 Service Design Processes Part 1
• 5.6 Service Design Processes Part 2
• 5.7 Service Design Processes Part 3
• 5.8 Service Design Processes Part 4
Module 6
• 6.1 Service Transition Purpose And Objectives
• 6.2 Service Transition Scope And Business Value
• 6.3 Service Transition Key Principles
• 6.4 Service Transition Processes Part 1
• 6.5 Service Transition Processes Part 2
• 6.6 Service Transition Processes Part 3
• 6.7 Service Transition Processes Part 4
Module 7
• 7.1 Intro To Service Operation
• 7.2 Service Operation Basic Concepts
• 7.3 Service Operation Processes Part 1
• 7.4 Service Operation Processes Part 2
• 7.5 Service Operation Access Management
• 7.6 Service Operation Functions
Module 8
• 8.1 Continual Service Improvement Purpose Objectives AndScope
• 8.2 Continual Service Improvement Key Principles
• 8.3 Continual Service Improvement Processes
Module 9
• 9.1 SMT
• 9.2 SMT Service Automation
• 9.3 SMT Service Analytics
• 10.1 How It All Fits Together
• 10.2 Outro
CompTIA Security + Module Outline
The eighth course on the cyber security course programme: The CompTIA Security+ course will prepare you to become CompTIA Security+ certified. ITcertify covers many vendor neutral topics including different types of threats and attacks, networking technologies and tools, secure design and architecture, identity and access management, risk assessment and management, and finishes with Cryptography and Public Key Infrastructure.
You will cover everything from the ever-expanding virtualisation of computing systems to industry management of smart devices. These topics will be covered from a ground up perspective so that even inexperienced students will be able to follow. IT security is the fastest growing IT sector and its importance is recognised by every company.
Threats, Attacks, and Vulnerabilities
1.1 Introduction
1.2 Types Of Malware- Part 1
1.3 Types Of Malware- Part 2
1.4 Types Of Attacks- Part 1
1.5 Types Of Attacks- Part 2
1.6 Types Of Attacks- Part 3
1.7 Types Of Attacks- Part 4
1.8 Types Of Attacks- Part 5
1.9 Threat Actors- Part 1
1.10 Threat Actors- Part 2
1.11 Penetration Testing And Vulnerability Scanning- Part 1
1.12 Penetration Testing And Vulnerability Scanning- Part 2
1.13 Impact Of Vulnerabilities- Part 1
1.14 Impact Of Vulnerabilities- Part 2
Technologies and Tools
2.1 Networking Hardware And Software- Part 1
2.2 Networking Hardware And Software- Part 2
2.3 Networking Hardware And Software- Part 3
2.4 Networking Hardware And Software- Part 4
2.5 Networking Hardware And Software- Part 5
2.6 Networking Hardware And Software- Part 6
2.7 Security Assessment- Part 1
2.8 Security Assessment- Part 2
2.9 Troubleshooting Issues- Part 1
2.10 Troubleshooting Issues- Part 2
2.11 Securing Mobile Devices- Part 1
2.12 Securing Mobile Devices- Part 2
2.13 Securing Mobile Devices- Part 3
2.14 Securing Mobile Devices- Part 4
2.15 Secure Protocols- Part 1
2.16 Secure Protocols- Part 2
Architecture and Design
3.1 Secure Network Architecture- Part 1
3.2 Secure Network Architecture- Part 2
3.3 Secure System Designs- Part 1
3.4 Secure System Designs- Part 2
3.5 Secure Staging Deployment Concepts
3.6 Embedded Systems- Part 1
3.7 Embedded Systems- Part 2
3.8 Application Development And Deployment- Part 1
3.9 Application Development And Deployment- Part 2
3.10 Application Development And Deployment- Part 3
3.11 Physical Security Controls- Part 1
3.12 Physical Security Controls- Part 2
3.13 Physical Security Controls- Part 3
3.14 Cloud Virtualization- Part 1
3.15 Cloud Virtualization- Part 2
Identity and Access Management
4.1 Identity And Access Management- Part 1
4.2 Identity And Access Management- Part 2
4.3 Identity And Access Services- Part 1
4.4 Identity And Access Services- Part 2
4.5 Management Controls- Part 1
4.6 Management Controls- Part 2
4.7 Account Management Practices- Part 1
4.8 Account Management Practices- Part 2
4.9 Account Management Practices- Part 3
Risk Management
5.1 Organizational Security- Part 1
5.2 Organizational Security- Part 2
5.3 Business Impact Analysis Concepts- Part 1
5.4 Business Impact Analysis Concepts- Part 2
5.5 Risk Management- Part 1
5.6 Risk Management- Part 2
5.7 Incident Response Procedures- Part 1
5.8 Incident Response Procedures- Part 2
5.9 Forensics- Part 1
5.10 Forensics- Part 2
5.11 Disaster Recovery- Part 1
5.12 Disaster Recovery- Part 2
5.13 Types Of Control- Part 1
5.14 Types Of Control- Part 2
5.15 Data Security And Privacy Practices- Part 1
5.16 Data Security And Privacy Practices- Part 2
Cryptography and PKI
6.1 Cryptographic Basics- Part 1
6.2 Cryptographic Basics- Part 2
6.3 Cryptographic Basics- Part 3
6.4 Cryptographic Algorithms- Part 1
6.5 Cryptographic Algorithms- Part 2
6.6 Wireless Security- Part 1
6.7 Wireless Security- Part 2
6.8 Implementing PKI- Part 1
6.9 Implementing PKI- Part 2
6.10 Implementing PKI- Part 3
6.11 Conclusion
CompTIA Linux + Module Outline
The ninth course on the cyber security course programme: CompTIA Linux+ validates the competencies required of an early career system administrator supporting Linux systems. Here you will learn how to be able to perform maintenance tasks with the command line, install & configure a workstation and be able to configure a basic network
Intro and Instructions
Intro
1. Introduction
2. Introduction to Building Labs
3. Things You Need To Do
4. Install Demo Virtual Box
Instructions
1. Navigation
2. Commands with Lab Demo
3. Internal and External Commands
4. Overview of Shell Commands Tricks
5. Exploring Shell Configuration
6. Stream Redirection
7. Overview of Processing Text Using Filters
8. Overview File-Viewing Commands
9. Overview Using Grep
10. Syntax and Summary
11. Overview of Exam Essentials
Managing Software and Configuring hardware
2.1 Managing Software
2.2 Overview Using RPM
2.3 RPM Part 2
2.4 Overview Using Cpio
2.5 Overview Using Debian and Apt_cache
2.6 Using Apt-get
2.7 Debian Tools
2.8 Managing Shared Libraries
2.9 Overview Locating Library Files
2.10 Foreground and Background Processes
2.11 Managing Software Summary
3.1 Configuring Hardware
3.2 Configuring Devices
3.3 Configuring USB
3.4 Configuring Hard Disk
3.5 Designing Hard Disk Layout
3.6 Logical Volume Management
3.7 Creating Partitions Filesystems
3.8 Overview Using Fdisk
3.9 Overview Common Filesystem Types
3.10 Creating Filesystem
3.11 Maintaining Filesystem Health
3.12 Configuring Hardware Summary
Managing Files and Booting Files
4.1 Managing Files
4.2 File Archiving Commands
4.3 Managing Files Ownership
4.4 Managing Disk Quotas
4.5 Directories and Content
4.6 Overview Tools for Locating Files
4.7 Overview of Exam Essentials
5.1 Booting Linux and Editing Files
5.2 Boot and Reboot
5.3 Understanding the Boot Process
5.4 Runlevels Process
5.5 Managing Runlevel Services
5.6 Editing with Vi
5.7 Booting Summary
X and Admin
6.1 X Windows Systems
6.2 X Configuration Options
6.3 X Configuration Options part 2
6.4 Configuring X Fonts
6.5 Configuring Xft Fonts
6.6 Overview Managing GUI Logins
6.7 Using X for Remote Access
6.8 X Accessibility
6.9 Addition Assistive Technologies
6.10 Configuring Localization and Internationalization
6.11 Querying and Setting Your Locale
6.12 Configuring Printing
6.13 Configuring Printing part 2
6.14 Using Web-based CUPS Utilities
7.1 Administering
7.2 Directly Modifying Account Configuration
7.3 Components of Account
7.4 Adding Groups
7.5 Tuning User and System Environments
7.6 Reviewing Log File Contents
7.7 Maintaining System Time
7.8 Admin Summary
Basic Networking and Scripts
8.1 Basic Networking
8.2 Network Addressing
8.3 Network Addressing Part 2
8.4 DNS Data Flow Zone and Resolution
8.5 Network Ports
8.6 Connections
8.7 Testing Connectivity
8.8 Wireshark Demo
8.9 Basic Networking Summary
9.1 Scripts E-mail and Databases
9.2 Writing Scripts
9.3 Writing Scripts Part 2
9.4 Managing E-mail
9.5 Managing Data with SQL
9.6 Advantages of Database
9.7 Scripts Summary
Security
10.1 Security
10.2 Controlling Access Via TCP Wrappers
10.3 Configuring Xinetd
10.4 Uninstalling Or Reconfiguring Servers
10.5 Tools for Managing Passwords
10.6 Configuring SSH
10.7 SSH Keys
10.8 Controlling SSH Access
10.9 Using GPG
10.10 Security Summary
CompTIA Cyber Security Analyst CySA +
The tenth course on the cyber security course programme: The CompTIA Cyber Security Analyst CySA+ focuses on the knowledge and skills required to configure and use threat-detection tools, perform data analysis, and interpreting the results with the end goal of securing an organization’s applications and systems.
The CompTIA Cyber Security Analyst CySA+ is a vendor neutral certification that expects three to four years of experience in a related field as well as a Security+ or equivalent knowledge.
The CompTIA Cyber Security Analyst CySA+ lies between the CompTIA Security + as well as the CompTIA Advanced Security Practitioner (CASP) exams and is an excellent go between to tackle before diving into the CASP, but when the Security+ isn’t enough.
Here you will gain an understanding of security best practices and protocols beyond that which is provided by the CompTIA Security + and will prove a level of expertise beyond that of basic security practices that are followed when using a computer. This allows any employee to prove a better understanding of enterprise security practices, and the necessary tools needed to protect a company network. The modules of this course align with the official objects of the certification and will expand past the scope of the certification to provide real life examples.
Threat Management
Module 1: Threat Management
1.1 Introduction
1.2 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 1
1.3 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes
1.4 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes
1.5 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 4
1.6 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 5
1.7 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 6
1.8 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 7
1.9 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 8
1.10 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 9
1.11 Given a scenario, analyze the results of a network
reconnaissance Part 1
1.12 Given a scenario, analyze the results of a network
reconnaissance Part 2
1.13 Given a scenario, analyze the results of a network
reconnaissance Part 3
1.14 Given a scenario, analyze the results of a network
reconnaissance Part 4
1.15 Given a scenario, analyze the results of a network
reconnaissance Part 5
1.16 Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1
1.17 Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2
1.18 Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3
1.19 Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4
1.20 Explain the purpose of practices used to secure a corporate environment Part 1
1.21 Explain the purpose of practices used to secure a corporate environment Part 2
1.22 Explain the purpose of practices used to secure a corporate environment Part 3
1.23 Explain the purpose of practices used to secure a corporate environment Part 4
Vulnerability Management
2.1 Given a scenario, implement an information security
vulnerability management process Part 1
2.2 Given a scenario, implement an information security
vulnerability management process Part 2
2.3 Given a scenario, implement an information security
vulnerability management process Part 3
2.4 Given a scenario, implement an information security
vulnerability management process Part 4
2.5 Given a scenario, implement an information security
vulnerability management process Part 5
2.6 Given a scenario, implement an information security
vulnerability management process Part 6
2.7 Given a scenario, implement an information security
vulnerability management process Part 7
2.8 Given a scenario, analyze the output resulting from a
vulnerability scan Part 1
2.9 Given a scenario, analyze the output resulting from a
vulnerability scan Part 2
2.10 Compare and contrast common vulnerabilities found in
the following targets within an organization Part 1
2.11 Compare and contrast common vulnerabilities found in
the following targets within an organization Part 2
2.12 Compare and contrast common vulnerabilities found in
the following targets within an organization Part 3
Cyber Incident Response
3.1 Given a scenario, distinguish threat data or behavior to
determine the impact of an incident Part 1
3.2 Given a scenario, distinguish threat data or behavior to
determine the impact of an incident Part 2
3.3 Given a scenario, distinguish threat data or behavior to
determine the impact of an incident Part 3
3.4 Given a scenario, prepare a toolkit and use appropriate
forensic tools during an investigation Part 1
3.5 Given a scenario, prepare a toolkit and use appropriate
forensic tools during an investigation Part 2
3.6 Given a scenario, prepare a toolkit and use appropriate
forensic tools during an investigation Part 3
3.7 Given a scenario, prepare a toolkit and use appropriate
forensic tools during an investigation Part 4
3.8 Given a scenario, prepare a toolkit and use appropriate
forensic tools during an investigation Part 5
3.9 Explain the importance of communications during the
incident response process
3.10 Given a scenario, analyze common symptoms to select
the best course of action to support incident response Part 1
3.11 Given a scenario, analyze common symptoms to select
the best course of action to support incident response Part 2
3.12 Given a scenario, analyze common symptoms to select
the best course of action to support incident response Part 3
3.13 Given a scenario, analyze common symptoms to select
the best course of action to support incident response Part 4
3.14 Summarize the incident recovery and post-incident response process Part 1
3.15 Summarize the incident recovery and post-incident response process Part 2
3.16 Summarize the incident recovery and post-incident response process Part 3
3.17 Summarize the incident recovery and post-incident response process Part 4
Security Architecture and Tool Sets
4.1 Explain the relationship between frameworks, common
policies, controls, and procedures Part 1
4.2 Explain the relationship between frameworks, common
policies, controls, and procedures Part 2
4.3 Explain the relationship between frameworks, common
policies, controls, and procedures Part 3
4.4 Explain the relationship between frameworks, common
policies, controls, and procedures Part 4
4.5 Given a scenario, use data to recommend remediation of
security issues related to identity and access management
Part 1
4.6 Given a scenario, use data to recommend remediation of
security issues related to identity and access management
Part 2
4.7 Given a scenario, use data to recommend remediation of
security issues related to identity and access management
Part 3
4.8 Given a scenario, use data to recommend remediation of
security issues related to identity and access management
Part 4
4.9 Given a scenario, review security architecture and make
recommendations to implement compensating controls Part 1
4.10 Given a scenario, review security architecture and make
recommendations to implement compensating controls Part 2
4.11 Given a scenario, review security architecture and make
recommendations to implement compensating controls Part 3
4.12 Given a scenario, use applications security best practices
while participating in the Software Development Life Cycle
(SDLC) Part 1
4.13 Given a scenario, use applications security best practices
while participating in the Software Development Life Cycle
(SDLC) Part 2
4.14 Overview
4.15 Conclusion
Cloud Computing Security Knowledge
The eleventh course on the cyber security course programme: The Cloud Computing Security Knowledge course provides students thorough coverage of cloud security fundamentals. The course begins with a detailed description of cloud computing and then expands into all major domains such as; Governance and Risk Management, the Cloud Architectural Framework and Business Continuity/Disaster Recovery. Upon completing this course, ITcertify students will be experts in the following topics:
- Understanding cloud computing security challenges
- Cloud computing security controls
- Resiliency and Measured Usage
- Understand the cloud computing architectural framework
1: Architecture
• NIST Definitions
• Essential Characteristics
• Service Models
• Deployment Models
• Multi-Tenancy
• CSA Cloud Reference Model
• Jericho Cloud Cube Model
• Cloud Security Reference Model
• Cloud Service Brokers
• Service Level Agreements
2: Governance and Enterprise Risk Management
• Contractual Security Requirements
• Enterprise and Information Risk Management
• Third Party Management Recommendations
• Supply chain examination
• Use of Cost Savings for Cloud
3: Legal Issues: Contracts and Electronic Discovery
• Consideration of cloud-related issues in three dimensions
• eDiscovery considerations
• Jurisdictions and data locations
• Liability for activities of subcontractors
• Due diligence responsibility
• Federal Rules of Civil Procedure and electronically stored information
• Metadata
• Litigation hold
4: Compliance and Audit Management
• Definition of Compliance
• Right to audit
• Compliance impact on cloud contracts
• Audit scope and compliance scope
• Compliance analysis requirements
• Auditor requirements
5: Information Management and Data Security
• Six phases of the Data Security Lifecycle and their key elements
• Volume storage
• Object storage
• Logical vs physical locations of data
• Three valid options for protecting data
• Data Loss Prevention
• Detection Data Migration to the Cloud
• Encryption in IaaS, PaaS & SaaS
• Database Activity Monitoring and File Activity Monitoring
• Data Backup
• Data Dispersion
• Data Fragmentation
6: Interoperability and Portability
• Definitions of Portability and Interoperability
• Virtualization impacts on Portability and Interoperability
• SAML and WS-Security
• Size of Data Sets
• Lock-In considerations by IaaS, PaaS & SaaS delivery models
• Mitigating hardware compatibility issues
7: Traditional Security, Business Continuity, and Disaster Recovery
• Four D’s of perimeter security
• Cloud backup and disaster recovery services
• Customer due diligence related to BCM/DR
• Business Continuity Management/Disaster Recovery due diligence
• Restoration Plan
• Physical location of cloud provider
8: Data Center Operations
• Relation to Cloud Controls Matrix
• Queries run by data center operators
• Technical aspects of a Provider’s data center operations for customers
• Logging and report generation in multi-site clouds
9: Incident Response
• Factor allowing for more efficient and effective containment and recovery in a cloud
• Main data source for detection and analysis of an incident
• Investigating and containing an incident in an Infrastructure as a Service environment
• Reducing the occurrence of application level incidents
• How often should incident response testing occur
• Offline analysis of potential incidents
10: Application Security
• Identity, entitlement, and access management (IdEA)
• SDLC impact and implications
• Differences in S-P-I models
• Consideration when performing a remote vulnerability test of a cloud-based application
• Categories of security monitoring for applications
• Entitlement matrix
11: Encryption and Key Management
• Adequate encryption protection of data in the cloud
• Key management best practices, location of keys, keys per user
• Relationship to tokenization, masking, anonymization and cloud database controls
12: Identity, Entitlement, and Access Management
• Relationship between identities and attributes
• Identity Federation
• Relationship between Policy Decision Point (PDP) and Policy Enforcement Point (PEP)
• SAML and WS-Federation
• Provisioning and authoritative sources
13: Virtualization
• Security concerns for hypervisor architecture
• VM guest hardening, blind spots, VM Sprawl, data comingling, instant-on gaps
• In-Motion VM characteristics that can create a serious complexity for audits
• How can virtual machine communications bypass network security controls
• VM attack surfaces
• Compartmentalization of VMs
14: Security as a Service
• 10 categories
• Barriers to developing full confidence in security as a service (SECaaS)
• Deployment of Security as a Service in a regulated industry prior SLA
• Logging and reporting implications
• How can web security as a service be deployed
• What measures do Security as a Service providers take to earn the trust of their customers
• ENISA Cloud Computing: Benefits, Risks and Recommendations for Information Security
• Isolation failure
• Economic Denial of Service
• Licensing Risks
• VM hopping
• Five key legal issues common across all scenarios
• Top security risks in ENISA research
• OVF
• Underlying vulnerability in Loss of Governance
• User provisioning vulnerability
• Risk concerns of a cloud provider being acquired
• Security benefits of cloud
Ethical Hacker
The Ethical Hacker (V12) course needs no introduction. In this course you will research, discover and scan targets, analyze vulnerabilities and test attack methods and tools. The focus of this course is to solve the challenge of breaking into a target network, collect evidence of success, and escape unnoticed. Every lesson and topic are infused with step-by-step guided practice using real hardware- and software-based hacking tools. Throughout both lecture and hands-on activities, the instructor provides commentary from the field including tips, tricks and hard-learned lessons.
You will learn to :
Hack Windows and Linux systems, enumerate targets, steal information, hide secret messages in plain sight, and cover their tracks. You will crack passwords, intercept transmissions, use malware to compromise services, social engineer the unsuspecting, and sniff, spoof, escalate, and denial-of-service your way to owning a target.
Along with such venerable tools as nmap and netcat, you will learn how to use the Metasploit Framework and Kali Linux to test a wide array of attacks. You will search Exploit-DB, GitHub and other sites for the latest exploit code, using those hacks when existing tools just won’t do.
Module 1 - Introduction to Ethical Hacking
• 1.1 Information Security Overview
• 1.2 Information Security Threats and Attack Vectors
• 1.3 Hacking Concepts, Types, and Phases
• 1.4 Ethical Hacking Concepts and Scope
• 1.5 Information Security Controls
• 1.6 Penetration Testing Concepts
• 1.7 Information Security Laws and Standards
Module 2 - Footprinting and Reconnaissance.
• 2.1 Footprinting Concepts
• 2.2 Footprinting Methodology
• 2.3 Footprinting Tools
• 2.4 Footprinting Countermeasures
• 2.5 Footprinting Penetration Testing
Module 3 - Network Scanning
• 3.1 Scanning Concepts
• 3.2 Discovery Scans
• 3.3 Port Scans
• 3.4 Nmap
• 3.5 Nmap Stealth Scans
• 3.6 Nmap Options
• 3.7 Hping and Other Scanners
• 3.8 SSDP Scanning
• 3.9 Scanning Beyond IDS and Firewall
• 3.10 Banner Grabbing
• 3.11 Scanning Penetration Testing
Module 4 - Enumeration
• 4.1 Enumeration Concepts
• 4.2 NetBIOS Enumeration
• 4.3 SNMP Enumeration
• 4.4 LDAP Enumeration
• 4.5 NTP Enumeration
• 4.6 SMTP and DNS Enumeration
• 4.7 Enumeration Countermeasures
• 4.8 Enumeration Penetration Testing
Module 5 - Vulnerability Analysis
• 5.1 Vulnerability Assessment Concepts
• 5.2 Vulnerability Assessment Solutions
• 5.3 Vulnerability Scoring Systems
• 5.4 Vulnerability Assessment Tools and Reports
Module 6 - Malware Threats
• 6.1 Introduction to Malware
• 6.2 Trojan Concepts
• 6.3 Virus and Worm Concepts
• 6.4 Malware Reverse Engineering
• 6.5 Malware Detection
• 6.6 Countermeasures
• 6.7 Anti-malware Software
• 6.8 Malware Penetration Testing
Module 7 - Sniffing
• 7.1 Sniffing Concepts
• 7.2 DHCP Attacks
• 7.3 MAC Attacks
• 7.4 ARP Poisoning
• 7.5 DNS Poisoning
• 7.7 Sniffing Tools
• 7.8 Countermeasures
• 7.9 Sniffing Detection Techniques
• 7.10 Sniffing Penetration Testing
Module 8 - Social Engineering
• 8.1 Social Engineering Concepts
• 8.2 Social Engineering Techniques
• 8.3 Impersonation on Social Media Sites
• 8.4 Identity Theft
• 8.5 Social Engineering Countermeasures
• 8.6 Social Engineering Penetration Testing
Module 9 - Denial of Service
• 9.1 DoS/DDoS Concepts
• 9.2 Common DoS/DDoS Attack Techniques
• 9.3 Additional DoS Attack Types
• 9.4 Botnets
• 9.5 DoS Countermeasures
• 9.6 DoS Penetration Testing
Module 10 - Session Hijacking
• 10.1 Session Hijacking Concepts
• 10.2 Browser Session Hijacking
• 10.3 Ways to Compromise a Session Token
• 10.4 Client Side Attacks
• 10.5 Session Hijacking at the Network Level
• 10.6 Session Hijacking Tools
• 10.7 Session Hijacking Countermeasures
• 10.8 Session Hijacking Penetration Testing
Module 11 - Hacking Webservers
• 11.1 Webserver Concepts
• 11.2 Webserver Attacks
• 11.3 Methodology of Webserver Attacks
• 11.4 Webserver Attack Tools
• 11.5 Webserver Attack Countermeasures
• 11.6 Webserver Patch Management
• 11.7 Webserver Security Tools
• 11.8 Webserver Pen Testing
Module 12 - Hacking Web Applications
• 12.1 Web Application Concepts
• 12.2 Web App Vulnerabilities and Exploits
• 12.3 Web Application Threats
• 12.4 Injection Attacks
• 12.5 Hidden Fields and Clickjacking
• 12.6 Cross Site Attacks
• 12.7 Additional Web App Attacks
• 12.8 Web App Hacking Methodology
• 12.9 Web App Hacking Countermeasures
• 12.10 Web App Security Tools
• 12.11 Web Application Pen Testing
Module 13 - SQL Injection
• 13.1 SQL Injection Concepts
• 13.2 Types of SQL Injections
• 13.3 SQL Injection Methodology
• 13.4 SQL Injection Tools
• 13.5 SQL Injection Countermeasures
Module 14 - Hacking Wireless Networks
• 14.1 Wireless Concepts
• 14.2 Wireless Discovery and Mapping
• 14.3 Wi-Fi Sniffers
• 14.4 Wi-Fi Attacks
• 14.5 Wi-Fi Cracking
• 14.6 Wireless Hacking Tools
• 14.7 Bluetooth Hacking
• 14.8 Wireless Hacking Countermeasures
• 14.9 Wireless Security Tools
• 14.10 Wireless Penetration Testing
Module 15 - System Hacking
• 15.1 System Hacking Methodology
• 15.2 Windows System Vulnerabilities and Exploits
• 15.3 Linux System Vulnerabilities and Exploits
• 15.4 Password Cracking Methods
• 15.5 Network Service Password Cracking
• 15.6 Windows Password Cracking
• 15.7 Linux Password Cracking
• 15.8 Password Cracking Tools
• 15.9 Other Methods for Obtaining Passwords
• 15.10 Keylogging
• 15.11 Spyware
• 15.12 Rootkits
• 15.13 Hiding Files
• 15.14 Steganography
• 15.15 Privilege Escalation
• 15.16 Creating and Maintaining Remote Access
• 15.17 Hiding Evidence
• 15.18 System Hacking Penetration Testing
Module 16 - Hacking Mobile Platforms
• 16.1 Mobile Platform Attack Vectors
• 16.2 Hacking Android OS
• 16.3 Rooting Android
• 16.4 Securing Android
• 16.5 Hacking iOS
• 16.6 Jailbreaking iOS
• 16.7 Securing iOS
• 16.8 Hacking Windows Phone OS
• 16.9 Hacking Blackberry
• 16.10 Mobile Device Management
• 16.11 Mobile Security Guidelines and Tools
• 16.12 Mobile Penetration Testing
Module 17 - Evading IDS, Firewalls, and Honeypots
• 17.1 Intrusion Detection
• 17.2 Firewalls
• 17.3 Honeypots
• 17.4 IDS, Firewall, and Honeypot Tools
• 17.5 Evasion
• 17.6 Evasion Countermeasures
• 17.7 IDS/Firewall/ Honeypot Penetration Testing
Module 18 - Crytopgraphy
• 18.1 Cryptography Concepts
• 18.2 Encryption Algorithms
• 18.3 Cryptography Tools
• 18.4 Public Key Infrastructure (PKI)
• 18.5 Email Encryption
• 18.6 Disk Encryption
• 18.7 Cryptography Attacks
• 18.8 Cryptography Penetration Testing
Module 19 - Cloud Computing
• 19.1 Introduction to Cloud Computing
• 19.2 Virtualization
• 19.3 Cloud Computing Threats
• 19.4 Countermeasures to Cloud Computing Threats
• 19.5 Cloud Computing Attacks
• 19.6 Cloud Security
• 19.7 Cloud Security Best Practices
• 19.8 Cloud Penetration Testing
Module 20 - IoT Hacking
• 20.1 IoT Concepts
• 20.2 IoT Vulnerabilities and Attacks
• 20.3 IoT Hacking Methodology and Tools
• 20.4 IoT Hacking Countermeasures
• 20.5 IoT Penetration Testing
All delivered through our world class learning portal
Navigation and Controls
Our self paced training programmes allow you to study anywhere at any time. Pause, Rewind and play as many times as you like with 24 hour access.
Expert instructor led training
Our instructors are experts in the IT industry with a minimum of 15 years real world experience backed with many certifications in their subject of expertise
Visual demonstrations and multimedia presentations
Expert-led demonstrations and content rich presentations allow ITcertify students to develop their skills based on real world scenarios
Quizzes and exam simulators
Custom made practice exams reflect progress you have made throughout the course. Practice quizzes after each module build your confidence before moving to the next level.
Flash cards and educational games
ITcertify understand every student is unique and learns at a different pace. Our Flashcards and Educational Games are engineered to keep you engaged and 100% focused by providing a bit more fun to learning.