Imagine a world where you can use your skills to protect our cyber security and privacy. A place with no worries about your job stability, as we’re always adapting new technology for the best possible outcome in an ever-changing landscape of threats!
This is why this program was designed. Students would have opportunities not only to learn how – but also play critical roles within these fields. We do this by implementing, supporting, configuring, maintaining & troubleshooting network assets such as servers, firewalls switches etc., all whilst adhering heavily toward cyber safety practices.
LESSON 1 Introduction to computers
1. The Information Age
2. How Computers Work
3. Peripheral Devices
4. Processing and Storage Hardware
5. Operating Systems
6. File Management
7. Application Software
8. Practice Exam
LESSON 2 Networking
1. The Internet
2. Web Browsers
3. Networking Basics
4. Networking Standards and Protocols
5. Application Delivery
6. Practice Exam
LESSON 3 Databases and Programming
1. Databases
2. Interfacing with Databases
3. Introduction to Programming
4. Programming Terms and Concepts
5. Practice Exam
LESSON 4 Information Systems and Security
1. Information Systems
2. Data
3. Threats to Data
4. Security Concepts
5. Personal Data and Device Security
6. Corporate Data Security
7. Practice Exam
LESSON 1 Computing Overview
1. Course Introduction
2. Hardware Basics
3. Windows Basics
4. Linux Basics
5. macOS Basics
6. Practice Exam
LESSON 2 PC Technician Responsibilities
1. Protection and Safety
2. Professionalism
3. Change Management, PC Tools
4. PC Maintenance
5. Troubleshooting Process Overview
6. Practice Exam
LESSON 3 System Components
1. Cases and Form Factors
2. Power Supplies
3. Motherboards and Buses
4. Motherboard Troubleshooting
5. Processors
6. Processor Troubleshooting
7. Memory
8. Memory Installation
9. Memory Troubleshooting
10. BIOS/UEFI
11. Expansion Cards
12. Video; Audio
13. Cooling
14. Practice Exam
LESSON 4 Peripheral Devices
1. Peripheral Devices
2. USB
3. Display Devices
4. Video Troubleshooting
5. Device Driver Management
6. Device Driver Troubleshooting
7. Practice Exam
LESSON 5 Storage
1. Storage Devices
2. SATA
3. Optical Media
4. RAID
5. File Systems
6. File System Creation
7. Storage Management
8. Storage Spaces
9. Disk Optimization
10. Storage Troubleshooting
11. Practice Exam
LESSON 6 Networking
1. Networking Overview
2. Network Hardware
3. Networking Media
4. Ethernet; IP Networking
5. IP Configuration
6. IP Version 6
7. Internet Connectivity
8. Network Utilities
9. Network Troubleshooting
10. Practice Exam
LESSON 7 Wireless Networking
1. 802.11 Wireless
2. Infrared, Bluetooth, and NFC
3. SOHO Configuration
4. Internet of Things
5. Wireless Network Troubleshooting
6. Practice Exam
LESSON 8 Printing
1. Printers
2. Printer Configuration
3. Network Printing
4. Printing Management
5. Printer Maintenance
6. Printer Troubleshooting
7. Practice Exam
LESSON 9 Mobile Devices
1. Laptops
2. Laptop Components
3. Laptop Power Management
4. Laptop Troubleshooting
5. Mobile Devices
6. Mobile Device Networking
7. Mobile Device Security
8. Mobile Device Troubleshooting
9. Practice Exam
LESSON 10 System Implementation
1. Component Selection
2. Windows Pre-Installation
3. Windows Installation
4. Post-Installation
5. Virtualization
6. Practice Exam
LESSON 11 File Management
1. Windows File Locations
2. Manage Files on Windows
3. NTFS Permissions
4. Shared Folders
5. Linux File Management
6. Practice Exam
LESSON 12 System Management
1. Windows System Tools
2. Preferences and Settings
3. Performance Monitoring
4. Active Directory
5. Users and Groups
6. Remote Services
7. Windows Application Management
8. Linux Application Management
9. Digital Content Management
10. Updates
11. System Backup
12. System Recovery
13. Virtual Memory
14. Operating System Troubleshooting
15. Windows Boot Errors
16. Practice Exam
LESSON 13 Security
1. Security Best Practices
2. Incident Response
3. Physical Security
4. Social Engineering
5. BIOS/UEFI Security
6. Malware Protection
7. Authentication
8. File Encryption
9. Network Security
10. Firewalls
11. Proxy Servers
12. VPN
13. Security Troubleshooting
14. Practice Exam
LESSON 1 Networking Basics
1. Networking Overview
2. Network Topologies
3. The OSI Model
4. Network Protocols
5. Numbering Systems
6. Practice Exam
LESSON 2 Cables and Connectors
1. Twisted Pair
2. Coaxial
3. Fiber Optic
4. Wiring Implementation
5. Troubleshoot Network Media
6. Practice Exam
LESSON 3 Networking Devices
1. Network Adapters
2. Network Devices
3. Internetwork Devices
4. Practice Exam
LESSON 4 Ethernet
1. Ethernet
2. Ethernet Specifications
3. Connect Network Devices
4. Troubleshoot Physical Connectivity
5. Practice Exam
LESSON 5 IP Configuration
1. IP Addressing
2. APIPA and Alternate Addressing
3. DHCP Server Configuration
4. DHCP Relay
5. DNS Name Resolution
6. IP Version 6
7. Multicast
8. Troubleshoot IP Configuration Issues
9. Troubleshoot IP Communications
10. Troubleshoot Name Resolution
11. Practice Exam
LESSON 6 Switch Management
1. Switch Access
2. Switch IP Configuration
3. Switch Interface Configuration
4. Virtual LANs
5. Trunking
6. Spanning Tree Protocol
7. Switch Troubleshooting
8. Practice Exam
LESSON 7 Routing
1. Routing Basics
2. Routing Protocols
3. Network Address Translation
4. Routing Troubleshooting
5. Practice Exam
LESSON 8 Firewalls
1. Firewalls
2. Security Appliances
3. Firewall Design and Implementation
4. Practice Exam
LESSON 9 Network Customization
1. Network-Based Storage
2. Voice over IP (VoIP)
3. Virtualization
4. Virtual Networking
5. Cloud Computing
6. Practice Exam
LESSON 10 Wireless Networking
1. Wireless Concepts
2. Wireless Standards
3. Wireless Configuration
4. Wireless Network Design
5. Wireless Network Implementation
6. Wireless Security
7. Wireless Troubleshooting
8. Practice Exam
LESSON 11 Wide Area Networks (WANs)
1. WAN Concepts
2. WAN Connections
3. Internet Connectivity
4. Remote Access
5. WAN Troubleshooting
6. Practice Exam
LESSON 12 Network Policies and Procedures
1. Network Design, Documentation, and Policies, Risk Management
2. Security Policies
3. Practice Exam
LESSON 13 Network Security
1. Physical Security
2. Social Engineering
3. Network Vulnerabilities and Threats 1
4. Network Vulnerabilities and Threats 2, Authentication, Secure Protocols
5. Remote Access Security
6. Troubleshoot Network Security Issues
7. Practice Exam
LESSON 14 Network Hardening
1. Detection and Prevention
2. Penetration Testing
3. Network Hardening
4. Practice Exam
LESSON 15 Network Management
1. Update Management, Data Protection, Remote Management, Mobile Device Management
2. Data Center Management
3. Monitoring
4. Log File Management
5. Network Management with SNMP
6. Practice Exam
LESSON 16 Network Optimization
1. Optimization
2. Troubleshooting Methodology
3. Practice Exam
LESSON 1 Introduction to TCP/IP Networking
LESSON 2 Fundamentals of Ethernet LANs
LESSON 3 Fundamentals of WANs and IP Routing
LESSON 4 Using the Command-Line Interface
LESSON 5 Analyzing Ethernet LAN Switching
LESSON 6 Configuring Basic Switch Management
LESSON 7 Configuring and Verifying Switch Interfaces
LESSON 8 Implementing Ethernet Virtual LANs
LESSON 9 Spanning Tree Protocol Concepts
LESSON 10 RSTP and EtherChannel Configuration
LESSON 11 Perspectives on IPv4 Subnetting
LESSON 12 Analyzing Classful IPv4 Networks
LESSON 13 Analyzing Subnet Masks
LESSON 14 Analyzing Existing Subnets
LESSON 15 Operating Cisco Routers
LESSON 16 Configuring IPv4 Addresses and Static Routes
LESSON 17 IP Routing in the LAN
LESSON 18 Troubleshooting IPv4 Routing
LESSON 19 Understanding OSPF Concepts
LESSON 20 Implementing OSPF
LESSON 21 OSPF Network Types and Neighbors
LESSON 22 Fundamentals of IP Version 6
LESSON 23 IPv6 Addressing and Subnetting
LESSON 24 Implementing IPv6 Addressing on Routers
LESSON 25 Implementing IPv6 Routing
LESSON 26 Fundamentals of Wireless Networks
LESSON 27 Analyzing Cisco Wireless Architectures
LESSON 28 Securing Wireless Networks
LESSON 29 Building a Wireless LAN
LESSON 1 Introduction to TCP/IP Transport and Applications
LESSON 2 Basic IPv4 Access Control Lists
LESSON 3 Advanced IPv4 Access Control Lists
LESSON 4 Security Architectures
LESSON 5 Securing Network Devices
LESSON 6 Implementing Switch Port Security
LESSON 7 Implementing DHCP
LESSON 8 DHCP Snooping and ARP Inspection
LESSON 9 Device Management Protocols
LESSON 10 Network Address Translation
LESSON 11 Quality of Service (QoS)
LESSON 12 Miscellaneous IP Services
LESSON 13 LAN Architecture
LESSON 14 WAN Architecture
LESSON 15 Cloud Architecture
LESSON 16 Introduction to Controller-Based Networking
LESSON 17 Cisco Software-Defined Access (SDA)
LESSON 18 Understanding REST and JSON
LESSON 19 Understanding Ansible, Puppet, and Chef
LESSON 20 Final Review
LESSON 1 Linux Overview
1. Linux Introduction
LESSON 2 Using Linux
1. The Linux Shell
2. Linux Help
3. Text Editors
4. Aliases
5. Environment Variables
6. Shell Configuration Files
7. Redirection, Piping and Command Substitution
8. Directories
9. Files
10. Links
11. Filesystem Hierarchy Standard (FHS)
12. Locating and Searching Files
13. Text Stream Processing
14. Practice Exam
LESSON 3 Installation and Localization
1. Linux System Design
2. Linux Installation
3. Localization
4. Practice Exam
LESSON 4 Boot and Shutdown
1. Linux Boot Process
2. Bootloaders
3. systemd Boot Targets
4. System Services
5. System Shutdown
6. Practice Exam
LESSON 5 Graphical User Interfaces and Desktops
1. Graphical User Interfaces
2. Linux Desktops
3. Remote Desktop
4. Accessibility
5. Practice Exam
LESSON 6 Software Installation
1. Red Hat Package Manager (RPM)
2. Online Package Installation
3. Debian Package Manager (dpkg)
4. Shared Libraries
5. Practice Exam
LESSON 7 Users and Groups
1. User and Group Overview
2. User Management
3. Group Management
4. Practice Exam
LESSON 8 Disk and File System Management
1. MBR Disk Partitions
2. GUID Partitions
3. Logical Volume Manager
4. File Systems
5. Mounting File Systems
6. File System Maintenance
7. Disk Quotas
8. Ownership
9. Permissions
10. The umask Command
11. Special Permissions
12. Archive and Backup
13. Practice Exam
LESSON 9 Hardware Installation
1. Device Drivers
2. Kernel Module Management
3. Hotplug and Coldplug Devices
4. Practice Exam
LESSON 10 Processes and System Services
1. Processes
2. Process Management
3. Task Management
4. Print Management
5. System Time Configuration
6. Practice Exam
LESSON 11 System Monitoring
1. System Logging
2. Resource Monitoring
3. Practice Exam
LESSON 12 Networking
1. IPv4 Overview
2. Network Interface Configuration
3. IPv6 Overview
4. Routing Configuration
5. Hostname and DNS Configuration
6. Linux Firewalls
7. Network Troubleshooting
8. Practice Exam
LESSON 13 Cloud and Virtualization
1. Cloud and Virtualization Overview
2. Virtual Machines
3. Virtual Networking
4. Practice Exam
LESSON 14 Scripting and Automation
1. Bash Shell Scripting
2. Shell Environments, Bash Variables and Parameters
3. Bash Scripting Logic
4. Version Control Using Git
5. Orchestration Processes and Concepts
6. Practice Exam
LESSON 15 Security
1. Root Usage
2. User Security and Restriction
3. Login Blocking
4. Network Security
5. The xinetd Super Daemon
6. OpenSSH
7. SSH Port Tunneling
8. Security-Enhanced Linux (SELinux)
9. Application Armor (AppArmor)
10. Public Key Authentication
11. VPN Access and Authentication
12. Security Best Practices
13. Practice Exam
LESSON 1 Infrastructure Security in the Real World
1. Security Challenges
2. Infrastructure Security Scenario
3. Infrastructure Security Scenario
4. Summary
LESSON 2 Understanding Access-Control and Monitoring Systems
1. A Quick Primer on Infrastructure Security
2. Access Control
3. Security Policies
4. Physical Security Controls
5. Locks and Keys
6. Standard Key-Locking Deadbolts
7. Solenoid-Operated Deadbolt Locks
8. Cipher Locks
9. Access-Control Gates
10. Sliding Gates
11. Swinging Gates
12. Control Relays
13. Authentication Systems
14. Magnetic Stripe Readers
15. Smart Cards
16. RFID Badges
17. Biometric Scanners
18. Remote-Access Monitoring
19. Opened- and Closed-Condition Monitoring
20. Automated Access-Control Systems
21. Hands-On Exercises
22. Discussion
23. Procedure
24. Review Questions
LESSON 3 Understanding Video Surveillance Systems
1. Video Surveillance Systems
2. Cameras
3. Hands-On Exercises
4. Discussion
5. Procedure
6. Review Questions
LESSON 4 Understanding Intrusion-Detection and Reporting Systems
1. Intrusion-Detection and Reporting Systems
2. Security Controllers
3. Sensors
4. Vehicle-Detection Sensors
5. Fire-Detection Sensors
6. Output Devices
7. Hands-On Exercises
8. Discussion
9. Procedure
10. Review Questions
LESSON 5 Infrastructure Security: Review Questions and Hands-On Exercises
1. Summary Points
2. Security Challenge Scenarios
3. Infrastructure Security Scenario 1
4. Infrastructure Security Scenario 2
5. Professional Feedback
6. Review Questions
7. Exam Questions
LESSON 6 Local Host Security in the Real World
1. Security Challenges
2. Computing Device Security Scenario 1
3. Computing Device Security Scenario 2
4. Summary
LESSON 7 Securing Devices
1. The Three Layers of Security
2. Securing Host Devices
3. Securing Outer-Perimeter Portals
4. Additional Inner-Perimeter Access Options
5. Hands-On Exercises
6. Objectives
7. Procedure
8. Review Questions
LESSON 8 Protecting the Inner Perimeter
1. The Inner Perimeter
2. Operating Systems
3. Operating System Security Choices
4. Common Operating System Security Tools
5. Using Local Administrative Tools
6. Implementing Data Encryption
7. Hands-On Exercises
8. Objectives
9. Resources
10. Discussion
11. Procedures
12. Tables
13. Lab Questions
LESSON 9 Protecting Remote Access
1. Protecting Local Computing Devices
2. Using a Secure Connection
3. Establishing and Using a Firewall
4. Installing and Using Anti-Malware Software
5. Removing Unnecessary Software
6. Disabling Nonessential Services
7. Disabling Unnecessary OS Default Features
8. Securing the Web Browser
9. Applying Updates and Patches
10. Requiring Strong Passwords
11. Implementing Local Protection Tools
12. Software-Based Local Firewalls
13. Using Local Intrusion-Detection Tools
14. Profile-Based Anomaly-Detection Systems
15. Threshold-Based Anomaly-Detection Systems
16. Configuring Browser Security Options
17. Configuring Security Levels
18. Configuring Script Support
19. Defending Against Malicious Software
20. Using Antivirus Programs
21. Using Antispyware
22. Hardening Operating Systems
23. Service Packs
24. Patches
25. Updates
26. Overseeing Application Software Security
27. Software Exploitation
28. Applying Software Updates and Patches
29. Hands-On Exercises
30. Objectives
31. Resources
32. Discussion
33. Procedures
34. Tables
35. Lab Questions
LESSON 10 Local Host Security: Review Questions and Hands-On Exercises
1. Summary Points
2. Security Challenge Scenarios
3. Computing Device Security Scenario 1
4. Computing Device Security Scenario 2
5. Professional Feedback
6. Review Questions
7. Exam Questions
LESSON 11 Local Network Security in the Real World
1. Security Challenges
2. Local Network Security Scenario 1
3. Local Network Security Scenario 2
4. Summary
LESSON 12 Networking Basics
1. Understanding the Basics of Networking
2. Campus Area Networks or Corporate Area Networks (CANs)
3. Metropolitan Area Networks (MANs)
4. Wireless Local Area Networks (WLANs)
5. Storage Area Networks (SANs)
6. The OSI Networking Model
7. Layer 1: Physical
8. Layer 2: Data Link
9. Layer 3: Network
10. Layer 4: Transport
11. Layer 5: Session
12. Layer 6: Presentation
13. Layer 7: Application
14. Data Transmission Packets
15. OSI Layer Security
16. Network Topologies
17. Bus Topology
18. Ring Topology
19. Star Topology
20. Mesh Topology
21. Logical Topologies
22. Hands-On Exercises
23. Objectives
24. Resources
25. Discussion
26. Procedure
27. Lab Questions
28. Lab Answers
LESSON 13 Understanding Networking Protocols
1. The Basics of Networking Protocols
2. MAC Addresses
3. TCP/IP
4. Ethernet
5. Network Control Strategies
6. Hands-On Exercises
7. Objectives
8. Discussion
9. Procedures
10. Lab Questions
11. Lab Answers
LESSON 14 Understanding Network Servers
1. The Basics of Network Servers
2. Server Security
3. Network Administrators
4. Server Software Security
5. User Accounts
6. Network Authentication Options
7. Establishing Resource Controls
8. Maintaining Server Security
9. Vulnerability Scanning
10. Hands-On Exercises
11. Objectives
12. Resources
13. Discussion
14. Procedures
15. Lab Questions
16. Lab Answers
LESSON 15 Understanding Network Connectivity Devices
1. Network Switches
2. Routers
3. Gateways
4. Network Bridges
5. Wireless Network Connectivity
6. Network Connectivity Device Vulnerabilities
7. Network Connectivity Device Attacks
8. Network Connectivity Defense
9. Network Hardening
10. Hands-On Exercises
11. Objectives
12. Resources
13. Procedures
14. Lab Questions
15. Lab Answers
LESSON 16 Understanding Network Transmission Media Security
1. The Basics of Network Transmission Media
2. Copper Wire
3. Light Waves
4. Wireless Signals
5. Transmission Media Vulnerabilities
6. Securing Wireless Networks
7. Hands-On Exercises
8. Objectives
9. Resources
10. Procedure
11. Lab Questions
12. Lab Answers
LESSON 17 Local Network Security: Review Questions
1. Summary Points
2. Security Challenge Scenarios
3. Local Network Security Scenario 1
4. Local Network Security Scenario 2
5. Professional Feedback
6. Review Questions
LESSON 18 Perimeter Security in the Real World
1. Security Challenges
2. Internet Security Scenario 1
3. Internet Security Scenario 2
4. Summary
LESSON 19 Understanding the Environment
1. The Basics of Internet Security
2. Understanding the Environment
3. Basic Internet Concepts
4. Internet Services
5. Standards and RFCs
6. Hands-On Exercises
7. Objectives
8. Resources
9. Discussion
10. Procedures
11. Lab Questions
12. Lab Answers
LESSON 20 Hiding the Private Network
1. Understanding Private Networks
2. Network Address Translation
3. Port Address Translation
4. Port Forwarding or Mapping
5. Network Segmentation
6. Software-Defined Networking
7. Hands-On Exercises
8. Objectives
9. Resources
10. Discussion
11. Procedure
12. Lab Questions
13. Lab Answers
LESSON 21 Protecting the Perimeter
1. Understanding the Perimeter
2. Firewalls
3. Firewall Considerations
4. Network Appliances
5. Proxy Servers
6. Demilitarized Zones (DMZs)
7. Single-Firewall DMZs
8. Dual-Firewall DMZs
9. Honeypots
10. Extranets
11. Hands-On Exercises
12. Objectives
13. Resources
14. Procedures
15. Lab Questions
16. Lab Answers
LESSON 22 Protecting Data Moving Through the Internet
1. Securing Data in Motion
2. Authentication
3. Encryption
4. Cryptography
5. Digital Certificates
6. Hash Tables
7. Cookies
8. CAPTCHAs
9. Virtual Private Networks
10. Hands-On Exercises
11. Objectives
12. Resources
13. Discussion
14. Procedures
15. Lab Questions
16. Lab Answers
LESSON 23 Tools and Utilities
1. Using Basic Tools
2. IFconfig/IPconfig
3. Whois
4. Nslookup
5. PING
6. Traceroute
7. Telnet
8. Secure Shell
9. Monitoring Tools and Software
10. Nagios
11. SolarWinds
12. Microsoft Network Monitor
13. Wireshark
14. Snort
15. Nmap
16. Nikto
17. OpenVAS
18. Metasploit
19. The Browser Exploitation Framework (BeEF)
20. Other Products
21. Hands-On Exercises
22. Objectives
23. Resources
24. Discussion
25. Procedures
26. Capturing a PING
27. Lab Questions
28. Lab Answers
LESSON 24 Identifying and Defending Against Vulnerabilities
1. Zero Day Vulnerabilities
2. Software Exploits
3. SQL Injection
4. Java
5. Other Software Exploits
6. Social Engineering Exploits
7. Phishing Attacks
8. Network Threats and Attacks
9. Broadcast Storms
10. Session-Hijacking Attacks
11. Dictionary Attacks
12. Denial of Service (DoS) Attacks
13. Tarpitting
14. Spam
15. Protecting Against Spam Exploits
16. Other Exploits
17. Transport Layer Security (TLS) Exploits
18. FREAK Exploits
19. Logjam Exploits
20. Hands-On Exercises
21. Objectives
22. Resources
23. Discussion
24. Procedures
LESSON 25 Perimeter Security: Review Questions and Hands-On Exercises
1. Summary Points
2. Security Scenario Review
3. Network Security Scenario 1
4. Network Security Scenario 2
5. Professional Feedback
6. Review Questions
7. Exam Questions
LESSON 1 Introduction
1. Security Overview
2. Using the Simulator
LESSON 2 Security Basics
1. Understanding Attacks
2. Defense Planning
3. Access Control
4. Cryptography Basic
5. Network Monitoring
6. Incident Response
7. Practice Exam
LESSON 3 Policies, Procedures, and Awareness
1. Security Policies
2. Risk Management
3. Business Continuity
4. Manageable Network Plan
5. Social Engineering
6. App Development and Deployment
7. Employee Management
8. Mobile Devices
9. Third-Party Integration
10. Practice Exam
LESSON 4 Physical
1. Physical Threats
2. Device Protection
3. Network Infrastructure Protection
4. Environmental Controls
5. Practice Exam
LESSON 5 Perimeter
1. Recon and Denial
2. Spoofing and Poisoning
3. Security Appliances
4. Demilitarized Zones (DMZ)
5. Firewalls
6. Network Address Translation (NAT)
7. Virtual Private Networks (VPN)
8. Web Threat Protection
9. Network Access Protection
10. Wireless Overview
11. Wireless Attacks
12. Wireless Defenses
4. Practice Exam
LESSON 6 Network
1. Network Threats
2. Network Device Vulnerabilities
3. Network Applications
4. Switch Attacks
5. Switch Security
6. Using VLANs
7. Router Security
8. Intrusion Detection and Prevention
9. Vulnerability Assessment
10. Protocol Analyzers
11. Remote Access
12. Network Authentication
13. Penetration Testing
14. Virtual Networking
15. Software-Defined Networking (SDN)
16. Cloud Services
17. Practice Exam
LESSON 7 Host
1. Malware
2. Password Attacks
3. Windows System Hardening
4. Hardening Enforcement
5. File Server Security
6. Linux Host Security
7. Embedded Systems
8. Log Management
9. Audits
10. Email
11. BYOD Security
12. Mobile Device Management
13. Host Virtualization
14. Practice Exam
LESSON 8 Application
1. Access Control Models
2. Authentication
3. Authorization
4. Web Application Attacks
5. Internet Browsers
6. Application Development
7. Active Directory Overview
8. Windows Domain Users and Groups
9. Linux Users
10. Linux Groups
11. Linux User Security
12. Group Policy Overview
13. Hardening Authentication 1
14. Hardening Authentication 2
15. Practice Exam
LESSON 9 Data
1. Data Management
2. Advanced Cryptography
3. Cryptography Implementations
4. Cryptographic Attacks
5. Symmetric Encryption
6. Asymmetric Encryption
7. File Encryption
8. Public Key Infrastructure (PKI)
9. Hashing
10. Data Transmission Security
11. Data Loss Prevention (DLP)
12. Redundancy
13. Backup and Restore
14. Cloud Storage
15. Practice Exam
LESSON 1 Penetration Testing
1. What Is Penetration Testing?
2. Cybersecurity Goals
3. Adopting the Hacker Mind-Set
4. Reasons for Penetration Testing
5. Benefits of Penetration Testing
6. Regulatory Requirements for Penetration Testing
7. Who Performs Penetration Tests?
8. Internal Penetration Testing Teams
9. External Penetration Testing Teams
10. Selecting Penetration Testing Teams
11. The CompTIA Penetration Testing Process
12. Planning and Scoping
13. Information Gathering and Vulnerability Identification
14. Attacking and Exploiting
15. Reporting and Communicating Results
16. The Cyber Kill Chain
17. Reconnaissance
18. Weaponization
19. Delivery
20. Exploitation
21. Installation
22. Command and Control
23. Actions on Objectives
24. Tools of the Trade
25. Reconnaissance
26. Vulnerability Scanners
27. Social Engineering
28. Credential-Testing Tools
29. Debuggers
30. Software Assurance
31. Network Testing
32. Remote Access
33. Exploitation
34. Summary
35. Exam Essentials
36. Lab Exercises
37. Activity 1.1: Adopting the Hacker Mind-Set
38. Activity 1.2: Using the Cyber Kill Chain
39. Review Questions
LESSON 2 Planning and Scoping Penetration Tests
1. Scoping and Planning Engagements
2. Assessment Types
3. White Box, Black Box, or Gray Box?
4. The Rules of Engagement
5. Scoping Considerations: A Deeper Dive
6. Support Resources for Penetration Tests
7. Key Legal Concepts for Penetration Tests
8. Contracts
9. Data Ownership and Retention
10. Authorization
11. Environmental Differences
12. Understanding Compliance-Based Assessments
13. Summary
14. Exam Essentials
15. Lab Exercises
16. Review Questions
LESSON 3 Information Gathering
1. Footprinting and Enumeration
2. OSINT
3. Location and Organizational Data
4. Infrastructure and Networks
5. Security Search Engines
6. Active Reconnaissance and Enumeration
7. Hosts
8. Services
9. Networks, Topologies, and Network Traffic
10. Packet Crafting and Inspection
11. Enumeration
12. Information Gathering and Code
13. Information Gathering and Defenses
14. Defenses Against Active Reconnaissance
15. Preventing Passive Information Gathering
16. Summary
17. Exam Essentials
18. Lab Exercises
19. Activity 3.1: Manual OSINT Gathering
20. Activity 3.2: Exploring Shodan
21. Activity 3.3: Running a Nessus Scan
22. Review Questions
LESSON 4 Vulnerability Scanning
1. Identifying Vulnerability Management Requirements
2. Regulatory Environment
3. Corporate Policy
4. Support for Penetration Testing
5. Identifying Scan Targets
6. Determining Scan Frequency
7. Configuring and Executing Vulnerability Scans
8. Scoping Vulnerability Scans
9. Configuring Vulnerability Scans
10. Scanner Maintenance
11. Software Security Testing
12. Analyzing and Testing Code
13. Web Application Vulnerability Scanning
14. Developing a Remediation Workflow
15. Prioritizing Remediation
16. Testing and Implementing Fixes
17. Overcoming Barriers to Vulnerability Scanning
18. Summary
19. Exam Essentials
20. Lab Exercises
21. Activity 4.1: Installing a Vulnerability Scanner
22. Activity 4.2: Running a Vulnerability Scan
23. Activity 4.3: Developing a Penetration Test Vulnerability Scanning Plan
24. Review Questions
LESSON 5 Analyzing Vulnerability Scans
1. Reviewing and Interpreting Scan Reports
2. Understanding CVSS
3. Validating Scan Results
4. False Positives
5. Documented Exceptions
6. Understanding Informational Results
7. Reconciling Scan Results with Other Data Sources
8. Trend Analysis
9. Common Vulnerabilities
10. Server and Endpoint Vulnerabilities
11. Network Vulnerabilities
12. Virtualization Vulnerabilities
13. Internet of Things (IoT)
14. Web Application Vulnerabilities
15. Summary
16. Exam Essentials
17. Lab Exercises
18. Activity 5.1: Interpreting a Vulnerability Scan
19. Activity 5.2: Analyzing a CVSS Vector
20. Activity 5.3: Developing a Penetration Testing Plan
21. Review Questions
LESSON 6 Exploit and Pivot
1. Exploits and Attacks 184
2. Choosing Targets 184
3. Identifying the Right Exploit 185
4. Exploit Resources 188
5. Developing Exploits 189
6. Exploitation Toolkits 191
7. Metasploit 192
8. PowerSploit 198
9. Exploit Specifics 199
10. RPC/DCOM 199
11. PsExec 199
12. PS Remoting/WinRM 199
13. WMI 200
14. Scheduled Tasks and cron Jobs 200
15. SMB 201
16. RDP 202
17. Apple Remote Desktop 203
18. VNC 203
19. X-Server Forwarding 203
20. Telnet 203
21. SSH 204
22. Leveraging Exploits 204
23. Common Post-Exploit Attacks 204
24. Privilege Escalation 207
25. Social Engineering 208
26. Persistence and Evasion 209
27. Scheduled Jobs and Scheduled Tasks 209
28. Inetd Modification 210
29. Daemons and Services 210
30. Back Doors and Trojans 210
31. New Users 211
32. Pivoting 211
33. Covering Your Tracks 212
34. Summary 213
35. Exam Essentials 214
36. Lab Exercises 215
37. Activity 6.1: Exploit 215
38. Activity 6.2: Discovery 215
39. Activity 6.3: Pivot 216
40. Review Questions 217
LESSON 7 Exploiting Network Vulnerabilities
1. Conducting Network Exploits
2. VLAN Hopping
3. Network Proxies
4. DNS Cache Poisoning
5. Man-in-the-Middle
6. NAC Bypass
7. DoS Attacks and Stress Testing
8. Exploiting Windows Services
9. NetBIOS Name Resolution Exploits
10. SMB Exploits
11. Exploiting Common Services
12. SNMP Exploits
13. SMTP Exploits
14. FTP Exploits
15. Samba Exploits
16. Wireless Exploits
17. Evil Twins and Wireless MITM
18. Other Wireless Protocols and Systems
19. RFID Cloning
20. Jamming
21. Repeating
22. Summary
23. Exam Essentials
24. Lab Exercises
25. Activity 7.1: Capturing Hashes
26. Activity 7.2: Brute-Forcing Services
27. Activity 7.3: Wireless Testing
28. Review Questions
LESSON 8 Exploiting Physical and Social Vulnerabilities
1. Physical Facility Penetration Testing
2. Entering Facilities
3. Information Gathering
4. Social Engineering
5. In-Person Social Engineering
6. Phishing Attacks
7. Website-Based Attacks
8. Using Social Engineering Tools
9. Summary
10. Exam Essentials
11. Lab Exercises
12. Activity 8.1: Designing a Physical Penetration Test
13. Activity 8.2: Brute-Forcing Services
14. Activity 8.3: Using Beef
15. Review Questions
LESSON 9 Exploiting Application Vulnerabilities
1. Exploiting Injection Vulnerabilities
2. Input Validation
3. Web Application Firewalls
4. SQL Injection Attacks
5. Code Injection Attacks
6. Command Injection Attacks
7. Exploiting Authentication Vulnerabilities
8. Password Authentication
9. Session Attacks
10. Kerberos Exploits
11. Exploiting Authorization Vulnerabilities
12. Insecure Direct Object References
13. Directory Traversal
14. File Inclusion
15. Exploiting Web Application Vulnerabilities
16. Cross-Site Scripting (XSS)
17. Cross-Site Request Forgery (CSRF/XSRF)
18. Clickjacking
19. Unsecure Coding Practices
20. Source Code Comments
21. Error Handling
22. Hard-Coded Credentials
23. Race Conditions
24. Unprotected APIs
25. Unsigned Code
26. Application Testing Tools
27. Static Application Security Testing (SAST)
28. Dynamic Application Security Testing (DAST)
29. Mobile Tools
30. Summary
31. Exam Essentials
32. Lab Exercises
33. Activity 9.1: Application Security Testing Techniques
34. Activity 9.2: Using the ZAP Proxy
35. Activity 9.3: Creating a Cross-Site Scripting Vulnerability
36. Review Questions
LESSON 10 Exploiting Host Vulnerabilities
1. Attacking Hosts
2. Linux
3. Windows
4. Cross-Platform Exploits
5. Remote Access
6. SSH
7. NETCAT and Ncat
8. Proxies and Proxychains
9. Metasploit and Remote Access
10. Attacking Virtual Machines and Containers
11. Virtual Machine Attacks
12. Container Attacks
13. Physical Device Security
14. Cold-Boot Attacks
15. Serial Consoles
16. JTAG Debug Pins and Ports
17. Attacking Mobile Devices
18. Credential Attacks
19. Credential Acquisition
20. Offline Password Cracking
21. Credential Testing and Brute-Forcing Tools
22. Wordlists and Dictionaries
23. Summary
24. Exam Essentials
25. Lab Exercises
26. Activity 10.1: Dumping and Cracking the Windows SAM and Other Credentials
27. Activity 10.2: Cracking Passwords Using Hashcat
28. Activity 10.3: Setting Up a Reverse Shell and a Bind Shell
29. Review Questions
LESSON 11 Scripting for Penetration Testing
1. Scripting and Penetration Testing
2. Bash
3. PowerShell
4. Ruby
5. Python
6. Variables, Arrays, and Substitutions
7. Bash
8. PowerShell
9. Ruby
10. Python
11. Comparison Operations
12. String Operations
13. Bash
14. PowerShell
15. Ruby
16. Python
17. Flow Control
18. Conditional Execution
19. For Loops
20. While Loops
21. Input and Output (I/O)
22. Redirecting Standard Input and Output
23. Error Handling
24. Bash
25. PowerShell
26. Ruby
27. Python
28. Summary
29. Exam Essentials
30. Lab Exercises
31. Activity 11.1: Reverse DNS Lookups
32. Activity 11.2: Nmap Scan
33. Review Questions
LESSON 12 Reporting and Communication
1. The Importance of Communication
2. Defining a Communication Path
3. Communication Triggers
4. Goal Reprioritization
5. Recommending Mitigation Strategies
6. Finding: Shared Local Administrator Credentials
7. Finding: Weak Password Complexity
8. Finding: Plain Text Passwords
9. Finding: No Multifactor Authentication
10. Finding: SQL Injection
11. Finding: Unnecessary Open Services
12. Writing a Penetration Testing Report
13. Structuring the Written Report
14. Secure Handling and Disposition of Reports
15. Wrapping Up the Engagement
16. Post-Engagement Cleanup
17. Client Acceptance
18. Lessons Learned
19. Follow-Up Actions/Retesting
20. Attestation of Findings
21. Summary
22. Exam Essentials
23. Lab Exercises
24. Activity 12.1: Remediation Strategies
25. Activity 12.2: Report Writing
26. Review Questions
LESSON 1 Introduction
1. Introduction
LESSON 2 Threat Intelligence
1. Penetration Testing Process and Types
2. Threat Hunting
3. Organizational Security
4. Security Controls
5. Practice Exam
LESSON 3 Risk Mitigation
1. Risk Identification Process
2. Risk Calculation
3. Risk Communication and Training
4. Practice Exam
LESSON 4 Social and Physical Security
1. Social Engineering
2. Physical Security
3. Countermeasures and Prevention
4. Practice Exam
LESSON 5 Reconnaissance
1. Reconnaissance Overview
2. Reconnaissance Countermeasures
3. Scanning
4. Practice Exam
LESSON 6 Enumeration
1. Enumeration Overview
2. Enumeration Countermeasures
3. Practice Exam
LESSON 7 Vulnerability Management
1. Vulnerability Assessment
2. Vulnerability Management Life Cycle
3. Vulnerability Scoring Systems
4. Vulnerability Analysis
5. Practice Exam
LESSON 8 Identity and Access Management Security (IAM)
1. Identity and Access Management Security
2. Privilege Escalation
3. Identity and Access Management Threats
4. Certificate Management
5. Practice Exam
LESSON 9 Cybersecurity Threats
1. Malware
2. Combat Malware
3. Sniffing
4. Session Hijacking
5. Denial of Service
6. SQL Injections
7. Practice Exam
LESSON 10 Infrastructure Security
1. Intrusion Detection Systems
2. Firewalls
3. Honeypots and DNS Sinkholes
4. Web Servers
5. Network Access
6. Web Applications
7. Specialized Technology
8. Practice Exam
LESSON 11 Wireless and IOT Security
1. Wireless Security
2. Bluetooth Security
3. Mobile Device Security
4. Cloud Security
5. Internet of Things Security
6. Cloud Security Standards
7. Conclusion
8. Practice Exam
LESSON 12 Infrastructure Analysis
1. Hardware Analysis
2. Security Information and Event Management (SIEM)
3. Log Review
4. Asset Management
5. Supply Chain Management
6. Change Management
7. Virtualization Management
8. Practice Exam
LESSON 12 Infrastructure Analysis
1. Hardware Analysis
2. Security Information and Event Management (SIEM)
3. Log Review
4. Asset Management
5. Supply Chain Management
6. Change Management
7. Virtualization Management
8. Practice Exam
LESSON 13 Software Assurance
1. Software Development Overview
2. Automation
3. Practice Exam
LESSON 14 Data Analysis
1. Data Analysis and Protection
2. Hashing
3. Digital Forensics
4. Email Analysis
5. Practice Exam
LESSON 15 Incident Response
1. Incident Response – Preparation
2. Incident Response – Detection and Containment
3. Incident Response – Eradication and Recovery
4. Indicators of Compromise
5. Practice Exam
LESSON 1 Cloud Security and Privacy
1. Introduction to the Cloud and Fundamental Security and Privacy Issues of the Cloud
2. Introduction
3. Cloud Computing and Security Issues
4. Identity Security in the Cloud
5. Information Security in the Cloud
6. Cloud Security Standards
7. Conclusion
LESSON 2 Cloud Infrastructure Security
1. Introduction
2. Infrastructure Security in the Cloud
3. Infrastructure Security Analysis in Some Clouds
4. Protecting Cloud Infrastructure
5. Conclusion
LESSON 3 Confidentiality of Data in the Cloud: Conflicts Between Security and Cost
1. Introduction
2. Background
3. Confidentiality: Threats and Adversaries
4. Achieving Data Confidentiality in Cloud Storage Systems
5. Reducing Cloud Storage System Costs through Data-Reduction Techniques
6. Reconciling Data Reduction and Confidentiality
7. Trusted Decrypter
8. Future Directions for Cloud Storage Confidentiality with Low Cost
9. Conclusions
LESSON 4 Access Control in Cloud IaaS
1. Introduction
2. Background
3. Access Control in OpenStack Cloud IaaS
4. Access Control in AWS Cloud IaaS
5. Access Control in Azure Cloud IaaS
6. Conclusions
LESSON 5 Cloud Security and Privacy Management
1. Introduction and Background
2. Security and Privacy Analysis
3. Best Security Practices and Recommendation
4. Use Case Example: Microsoft Office 365, SaaS Version
5. Current Trends and Future Direction
6. Related Works
7. Conclusion
8. Acknowledgments
LESSON 6 Hacking and Countermeasures in the Cloud
1. Introduction
2. Background
3. Cloud Security Threats
4. Cloud Security Countermeasures
5. Hacking the Cloud: Reality Check
6. Future of Cloud Security
7. Cloud Security for the IoT
8. Conclusions
LESSON 7 Risk Management and Disaster Recovery in the Cloud
1. Introduction
2. Background
3. Consequence- Centric Security Assessment
4. Future Directions
5. Conclusions
LESSON 8 Cloud Auditing and Compliance
1. Introduction
2. Background
3. Cloud Auditing
4. Cloud Compliance
5. Future Research Directions for Cloud Auditing and Compliance
6. Conclusion
LESSON 9 Security-as-a-Service (SECaaS) in the Cloud
1. Introduction
2. Related Work
3. Security- as-a-Service Framework
4. Conclusions
LESSON 10 Cloud Forensics: Model, Challenges, and Approaches
1. Introduction
2. Background
3. Process and Model of Cloud Forensics
4. Cloud Forensics Methods, Approaches, and Tools
5. Challenges in Cloud Forensics
6. Conclusions
LESSON 11 Cyberterrorism in the Cloud: Through a Glass Darkly
1. Introduction
2. What is Terrorism?
3. Defining Cyberterrorism
4. Cyberterrorism vs. Terrorist Use of Cyberspace
5. Cyberterrorism in the Cloud
6. The Benefits of the Cloud to Cyberterrorists
7. Cyberlaw and Cyberterrorism
8. Conclusion: Through a Glass Darkly
LESSON 12 Digital Forensic Process and Model in the Cloud
1. Introduction
2. Digital Forensics Models
3. Cloud Forensics Process and Model
4. Toward a New Cloud Forensics Model
5. Evaluation and Analysis
6. Conclusion
LESSON 13 Data Acquisition in the Cloud
1. Introduction
2. Background
3. Data Center as a Source of Evidence
4. Cloud Service Providers: Essential Requirements, Governance, and Challenges
5. Business Model
6. Cloud Storage Forensics
7. Case Study 1: Finding Data Centers on the Internet in Data-Dense Environments
8. Case Study 2: Cloud Forensics for the Amazon Simple Storage Service
9. Conclusion
LESSON 14 Digital Evidence Management, Presentation, and Court Preparation in the Cloud: A Forensic Readiness Approach
1. Introduction
2. Cloud Forensics and Challenges
3. Digital Forensics Readiness
4. Cloud Forensics Readiness
5. Forensics Readiness in Evidence Management, Presentation, and Court Preparation
6. Conclusion
LESSON 15 Analysis of Cloud Digital Evidence
1. Introduction
2. Background
3. Current Approaches
4. Proposed Comprehensive Approaches
5. Discussion
6. Conclusions
LESSON 16 Forensics-as-a-Service (FaaS) in the State-of-the-Art Cloud
1. Introduction
2. Background and Motivation
3. State of the Art in Parallel and Distributed Forensic Analysis
4. Conclusion and Future Research Direction
LESSON 1 Introduction to Ethical Hacking
1. Introduction
LESSON 2 Introduction to Penetration Testing
1. Penetration Testing Process and Types
2. Threat Actors
3. Target Selection
4. Assessment Types
5. Legal and Ethical Compliance
6. Practice Exam
LESSON 3 Social Engineering and Physical Security
1. Social Engineering
2. Physical Security
3. Countermeasures and Prevention
4. Practice Exam
LESSON 4 Reconnaissance
1. Reconnaissance Overview
2. Reconnaissance Countermeasures
3. Practice Exam
LESSON 5 Scanning
1. Scanning Overview
2. Banner Grabbing
3. Practice Exam
LESSON 6 Enumeration
1. Enumeration Overview
2. Enumeration Countermeasures
3. Practice Exam
LESSON 7 Analyze Vulnerabilities
1. Vulnerability Assessment
2. Vulnerability Management Life Cycle
3. Vulnerability Scoring Systems
4. Vulnerability Assessment Tools
LESSON 8 System Hacking
1. System Hacking
2. Privilege Escalation
3. Maintain Access
4. Cover Your Tracks
5. Practice Exam
LESSON 9 Malware
1. Malware
2. Combat Malware
3. Practice Exam
LESSON 10 Sniffers, Session Hijacking, and Denial of Service
1. Sniffing
2. Session Hijacking
3. Denial of Service
4. Practice Exam
LESSON 11 IDS, Firewalls, and Honeypots
1. Intrusion Detection Systems
2. Firewalls
3. Honeypots
4. Practice Exam
LESSON 12 Web Servers, Web Applications, and SQL Injections
1. Web Servers
2. Web Applications
3. SQL Injections
4. Practice Exam
LESSON 13 Wi-Fi, Bluetooth, and Mobile Devices
1. Wi-Fi
2. Bluetooth Hacking
3. Mobile Devices
4. Practice Exam
LESSON 14 Cloud Computing and Internet of Things
1. Cloud Computing
2. Internet of Things
3. Practice Exam
LESSON 15 Cryptography
1. Cryptography
2. Public Key Infrastructure
3. Cryptography Implementations
4. Cryptanalysis and Cryptographic Attack Countermeasures
5. Practice Exam
The effective workplace skills are one of the greatest assets for new graduates or people who decided to change their career path. The technical knowledge and skills obtained throughout this course is important for future employment, but the ability to transition the knowledge into a new working environment is invaluable.
Within this portion of the Cyber Security , our Career Services Team will facilitate the workshops that will prepare for successful participation in the job search and help students to increase confidence in communications with potential employers, succeed in marketing their skill set and land the job. Through scheduled individual and group sessions with Career Services students will have an opportunity to share their job-seeking experiences with their peers and gain valuable insights from others. Our Employment Specialists will be accessible to provide continuous support and guidance towards achieving short and long-term employment goals.
Our Career Services Team will consist of seasoned Career Practitioners who will help with the following tasks during the course:
LESSON 1
1. Labor Market Information
2. Employers’ expectations
3. Self-marketing
4. Hard and Soft Skills
LESSON 2
1. Resume writing
2. Resume formats
3. Resume as a Marketing Tool
4. Applicant Tracking Systems
LESSON 3
1. Organizing and Conducting Your Job Search
2. The Hidden Job Market; Research
LESSON 4
1. Effective Communication Skills
2. Employment Letter
3. Elevator Pitch
4. Job Interview Types
5. Preparation for Job interview
LESSON 5
1. Job Interview Practice
2. Elevator Pitch Practice
3. Resume Review
4. Career Management
5. Job Overview
6. Q&A
The Cybersecurity Specialist Diploma Program is complemented by a mandatory 100 hours of practicum provided to the student in two ways. The first, and default method, is through the school. The school manages the entire practicum process from finding the company to the students’ successful completion of the program. We will actively place the student in a company that gives the students a chance to apply their core and technical competencies to real-life situations in a real-world work environment. The school will be using an in-house recruiting specialist that pairs students with the company that best complements one another.
The second method of practicum involves active student participation in the finding process. If the student already has a company in mind that they aspire to work with, then the school will reach out to the company on the student’s behalf and formally request that our student be placed in the company’s practicum program.
Participants of our practicum program will gain a multifaceted set of skills, being fully equipped to work as Cybersecurity Specialists, as well as qualifies Network Professionals in general. Students will be exposed to step-by-step training and certifications, allowing them to build strong fundamentals of network security, followed by modern digital security solutions and best practices. By the time students graduate, they will have practical experience in digital forensics, job search for IT Security opportunities, and depending on success of their search efforts, have the opportunity to get their first job offer by the end of the program.
First Monday of each Month
52 Weeks
An investment in knowledge pays the best interest.
Benjamin Franklin
Copyright © 2023 Alberta Educational Centre