4.1 – Security Techniques
Secure Baselines
The security of an application environment should be well defined. In this video, you’ll learn about establishing, deploying, and maintaining security baselines.
Hardening Targets
No system is secure with the default configurations. In this video, you’ll learn about hardening mobile devices, servers, embedded systems, IoT devices, and more.
Securing Wireless and Mobile
Many different strategies work together to provide security for wireless and mobile systems. In this video, you’ll learn about site surveys, mobile device management, BYOD, COPE, and more.
Wireless Security Settings
Wireless network security requires the configuration of many different options. In this video, you’ll learn about wireless encryption protocols, the AAA framework, and authentication options such as RADIUS, 802.1X, and EAP.
Application Security
Application developers will follow best practices for security in their code. In this video, you’ll learn about input validation, secure cookies, code signing, sandboxing, and more.
4.2 – Asset Management
Asset Management
An important part of IT security is the management of hardware and software. In this video, you’ll learn best practices for the procurement process, asset tracking, media sanitization, physical destruction, and more.
4.3 – Vulnerability Management
Vulnerability Scanning
Security researchers may use many techniques to identify vulnerabilities on a system or in software. In this video, you’ll learn about vulnerability scans, static code analyzers, and fuzzing.
Threat Intelligence
To identify threats, we first must know the threats exist. In this video, you’ll learn about threat intelligence gathering techniques such as OSINT, third-parties, information sharing, the dark web, and more.
Penetration Testing
Penetration tests can simulate an attack to exploit vulnerabilities. In this video, you’ll learn about rules of engagement, the exploitation process, responsible disclosure programs, and more.
Analyzing Vulnerabilities
Identifying and analyzing vulnerabilities can be a relatively complex process. In this video, you’ll learn about vulnerability databases, classification, exposure factor, risk tolerance, and more.
Vulnerability Remediation
Once a vulnerability is identified, a security professional is required to mitigate the issue. In this video, you’ll learn about patching, insurance, segmentation, compensating controls, and more.
4.4 – Security Monitoring
Security Monitoring
There are many methods for monitoring and reacting to security events. In this video, you’ll learn about log aggregation, scanning, reporting, alerting, and more.
Security Tools
Security administrators have many tools to help protect network resources. In this video, you’ll learn about Security Content Automation Protocol (SCAP), secure baselines, SIEMs, and more.
4.5 – Enterprise Security
Firewalls
Firewalls are an important part of any security protection strategy. In this video, you’ll learn about next-generation firewalls, firewall rules, screen subnets, and more.
Web Filtering
Many filtering methods are available to protect against attacks. In this video, you’ll learn about content filtering, URL scanning, proxies, DNS filtering, and more.
Operating System Security
Operating systems are important resources to secure. In this video, you’ll learn about Active Directory, Group Policy, and Security-Enhanced Linux (SELinux).
Secure Protocols
Encrypting network traffic is an important security best practice. In this video, you’ll learn about protocol and port selection, transport methods, and VPN tunnels.