العودة إلى المساق

Cybersecurity Operations

0% نسبة تقدُّم الدراسة
0/0 الخطوات
  1. 00. Introduction
    0.1 Cyberops_Associate_Class_Overview
  2. 001_CA_Module_1
    1.0 Module Objectives
  3. 1.1 War Stories
  4. 1.2 Threat Actors
  5. 1.3 Threat Impact
  6. 1.4 The Dange_Summary
  7. 1.0.6 Class Activity - Top Hacker
  8. 1.2.3 Lab - Learning the Details of Attacks
  9. 1.3.4 Lab - Visualizing the Black Hats
  10. 1.1.5 Lab - Installing the VM
  11. 1.1.6 Lab - Cybersecurity Case Studies
  12. CA_Module_2
    2.0 Module Objectives
  13. 2.1 The Modern Security Operations Center
  14. 2.2 Becoming a Defender
  15. 2.3 Fighters in the War Cybercrime Summary
  16. 2.2.5 Lab - Becoming a Defender
  17. CA_Module_3
    3.0 Module Objectives
  18. 3.1 Windows History
  19. 3.2 Windows Architecture and Operations
  20. 3.3 Windows Configuration and Monitoring
  21. 3.4 Windows Security
  22. 3.5 The Windows Operating System Summary@
  23. 3.0.3 Class Activity - Identify Running Processes
  24. 3.2.11 Lab - Exploring Processes, Threads, Handles,Registry
  25. 3.3.10 Lab - Create User Accounts
  26. 3.3.11 Lab - Using Windows PowerShell
  27. 3.3.12 Lab - Windows Task Manager
  28. 3.3.13 Lab - Monitor and Manage System Resources in Windows
  29. CA_Module_4
    4.0 Module Objectives
  30. 4.1 Linux Basics
  31. 4.2 Working in the Linux Shell
  32. 4.3 Linux Servers and Clients
  33. 4.4 Basic Server Administration
  34. 4.5 The Linux File System
  35. 4.6 Working with the Linux GUI
  36. 4.7 Working on a Linux Host
  37. 4.8 Linux Basics Summary
  38. 4.2.6 Lab - Working with Text Files in the CLI
  39. 4.2.7 Lab - Getting Familiar with the Linux Shell
  40. 4.3.4 Lab - Linux Servers
  41. 4.4.4 Lab - Locating Log Files
  42. 4.5.4 Lab - Navigating the Linux Filesystem and Permission
  43. CA_Module_5
    5.0 Module Objectives
  44. 5.1 Network Communications Process
  45. 5.2 Communications Protocols
  46. 5.3 Data Encapsulation
  47. 5.4 Network Protocols Summary
  48. 5.1.5 Lab - Tracing a Route
  49. 5.3.7 Lab - Introduction to Wireshark
  50. CA_Module_6
    6.0 Module Objectives
  51. 6.1 Ethernet
  52. 6.2 IPv4
  53. 6.4 Types of IPv4 Addresses
  54. 6.5 The Default Gateway
  55. 6.6 IPv6
  56. 6.7 Ethernet and IP Protocol Summary
  57. 1- Design and Implement a VLSM Addressing Scheme
  58. 1- Subnet an IPv4 Network
  59. 2- Subnet a Slash 16 and a Slash 8 Prefix
  60. 3- Subnet to Meet Requirements
  61. 4- VLSM
  62. 5- Structured Design
  63. 6- Packet Tracer - Subnet an IPv4 Network
  64. 7- Packet Tracer - Subnetting Scenario
  65. 8- VLSM Design and Implementation Practice
  66. CA_Module_7
    7.0 Module Objectives
  67. 7.1 ICMP
  68. 7.2 Ping and Traceroute Utilities
  69. 7.3 Connectivity Verification Summary
  70. 7.2.8 Packet Tracer - Verify IPv4 and IPv6 Addressing
  71. CA_Module_8
    8.0 Module Objectives
  72. 8.1 MAC and IP
  73. 8.2 ARP
  74. 8.3 ARP Issues
  75. 8.4 Address Resolution Protocol Summary
  76. 8.2.8 Lab - Using Wireshark to Examine Ethernet Frames
  77. CA_Module_9
    9.0 Module Objectives
  78. 9.1 Transport Layer Characteristics
  79. 9.2 Transport Layer Session Establishment
  80. 9.3 Transport Layer Reliability
  81. 9.4 The Transport Layer Summary
  82. 9.2.6 Lab - Using Wireshark to Observe the TCP 3-Way Handshake
  83. 9.3.8 Lab - Exploring Nmap
  84. CA_Module_10
    10.0 Module Objectives
  85. 10.1 DHCP
  86. 10.2 DNS
  87. 10.3 NAT
  88. 10.4 File Transfer and Sharing Services
  89. 10.5 Email
  90. 10.6 HTTP
  91. 10.7 Network Services Summary
  92. 10.2.7 Lab - Using Wireshark to Examine a UDP DNS Capture
  93. 10.4.3 Lab - Using Wireshark to Examine TCP and UDP Captures
  94. 10.6.7 Lab - Using Wireshark to Examine HTTP and HTTPS Traffic
  95. CA_Module_11
    11.0 Module Objectives
  96. 11.1 Network Devices
  97. 11.2 Wireless Communications
  98. 11.3 Network Communication Devices Summary
  99. CA_Module_12
    12.0 Module Objectives
  100. 12.1 Network Topologies
  101. 12.2 Security Devices
  102. 12.3 Security Services
  103. 12.4 Network Security Infrastructure Summary
  104. 12.1.9 Packet Tracer - Identify Packet Flow
  105. 12.3.4 Packet Tracer - ACL Demonstration
  106. CA_Module_13
    13.0 Module Objectives
  107. 13.1 Who is Attacking Our Network
  108. 13.2 Threat Actor Tools
  109. 13.3 Attackers and Their Tools Summary
  110. CA_Module_14
    14.0 Module Objectives
  111. 14.1 Malware
  112. 14.2 Common Network Attacks
  113. 14.4 Common Threats and Attacks Summary
  114. 14.1.11 Lab - Anatomy of Malware
  115. CA_Module_15
    15.0 Module Objectives
  116. 15.1 Introduction to Network Monitoring
  117. 15.2 Introduction to Network Monitoring Tools
  118. 15.3 Network Monitoring and Tools Summary
  119. 15.0.3 Class Activity - What's Going On
  120. CA_Module_16
    16.0 Module Objectives
  121. 16.1 IP PDU Details
  122. 16.2 IP Vulnerabilities
  123. 16.3 TCP and UDP Vulnerabilities
  124. 16.4 Attacking the Foundation Summary
  125. CA_Module_17
    17.0 Module Objectives
  126. 17.1 IP Services
  127. 17.2 Enterprise Services
  128. 17.3 Attacking What We Do Summary
  129. 17.1.7 Lab - Exploring DNS Traffic
  130. 17.2.7 Lab - Reading Server Logs
  131. 117.2.6 Lab - Attacking a mySQL Database
  132. CA_Module_18
    18.0 Module Objectives
  133. 18.1 Defense-in-Depth
  134. 18.2 Security Policies, Regulations, and Standards
  135. 18.3 Understanding Defense Summary
  136. CA_Module_19
    19.0 Module Objectives
  137. 19.1 Access Control Concepts
  138. 19.2 AAA Usage and Operation
  139. 19.3 Access Control Summary
  140. CA_Module_20
    20.0 Module Objectives
  141. 20.1 Information Sources
  142. 20.2 Threat Intelligence Services
  143. 20.3 Threat Intelligence Summary
  144. CA_Module_21
    21.0 Module Objectives
  145. 21.1 Integrity and Authenticity
  146. 21.2 Confidentiality
  147. 21.3 Public Key Cryptography
  148. 21.4 Authorities and the PKI Trust System
  149. 21.5 Applications and Impacts of Cryptography
  150. 21.6 Public Key Cryptography Summary
  151. 21.0.3 Class Activity - Creating Codes
  152. 2.11 Lab - Encrypting and Decrypting Data Using a Hacker Tool
  153. CA_Module_22
    22.0 Module Objectives
  154. 22.1 Antimalware Protection
  155. 22.2 Host-Based Intrusion Protection
  156. 22.3 Application Security
  157. 22.4 Endpoint Protection Summary
الدرس 130 من 157

17.2.7 Lab – Reading Server Logs