العودة إلى المساق
Cybersecurity Operations
0% نسبة تقدُّم الدراسة
0/0 الخطوات
-
00. Introduction0.1 Cyberops_Associate_Class_Overview
-
001_CA_Module_11.0 Module Objectives
-
1.1 War Stories
-
1.2 Threat Actors
-
1.3 Threat Impact
-
1.4 The Dange_Summary
-
1.0.6 Class Activity - Top Hacker
-
1.2.3 Lab - Learning the Details of Attacks
-
1.3.4 Lab - Visualizing the Black Hats
-
1.1.5 Lab - Installing the VM
-
1.1.6 Lab - Cybersecurity Case Studies
-
CA_Module_22.0 Module Objectives
-
2.1 The Modern Security Operations Center
-
2.2 Becoming a Defender
-
2.3 Fighters in the War Cybercrime Summary
-
2.2.5 Lab - Becoming a Defender
-
CA_Module_33.0 Module Objectives
-
3.1 Windows History
-
3.2 Windows Architecture and Operations
-
3.3 Windows Configuration and Monitoring
-
3.4 Windows Security
-
3.5 The Windows Operating System Summary@
-
3.0.3 Class Activity - Identify Running Processes
-
3.2.11 Lab - Exploring Processes, Threads, Handles,Registry
-
3.3.10 Lab - Create User Accounts
-
3.3.11 Lab - Using Windows PowerShell
-
3.3.12 Lab - Windows Task Manager
-
3.3.13 Lab - Monitor and Manage System Resources in Windows
-
CA_Module_44.0 Module Objectives
-
4.1 Linux Basics
-
4.2 Working in the Linux Shell
-
4.3 Linux Servers and Clients
-
4.4 Basic Server Administration
-
4.5 The Linux File System
-
4.6 Working with the Linux GUI
-
4.7 Working on a Linux Host
-
4.8 Linux Basics Summary
-
4.2.6 Lab - Working with Text Files in the CLI
-
4.2.7 Lab - Getting Familiar with the Linux Shell
-
4.3.4 Lab - Linux Servers
-
4.4.4 Lab - Locating Log Files
-
4.5.4 Lab - Navigating the Linux Filesystem and Permission
-
CA_Module_55.0 Module Objectives
-
5.1 Network Communications Process
-
5.2 Communications Protocols
-
5.3 Data Encapsulation
-
5.4 Network Protocols Summary
-
5.1.5 Lab - Tracing a Route
-
5.3.7 Lab - Introduction to Wireshark
-
CA_Module_66.0 Module Objectives
-
6.1 Ethernet
-
6.2 IPv4
-
6.4 Types of IPv4 Addresses
-
6.5 The Default Gateway
-
6.6 IPv6
-
6.7 Ethernet and IP Protocol Summary
-
1- Design and Implement a VLSM Addressing Scheme
-
1- Subnet an IPv4 Network
-
2- Subnet a Slash 16 and a Slash 8 Prefix
-
3- Subnet to Meet Requirements
-
4- VLSM
-
5- Structured Design
-
6- Packet Tracer - Subnet an IPv4 Network
-
7- Packet Tracer - Subnetting Scenario
-
8- VLSM Design and Implementation Practice
-
CA_Module_77.0 Module Objectives
-
7.1 ICMP
-
7.2 Ping and Traceroute Utilities
-
7.3 Connectivity Verification Summary
-
7.2.8 Packet Tracer - Verify IPv4 and IPv6 Addressing
-
CA_Module_88.0 Module Objectives
-
8.1 MAC and IP
-
8.2 ARP
-
8.3 ARP Issues
-
8.4 Address Resolution Protocol Summary
-
8.2.8 Lab - Using Wireshark to Examine Ethernet Frames
-
CA_Module_99.0 Module Objectives
-
9.1 Transport Layer Characteristics
-
9.2 Transport Layer Session Establishment
-
9.3 Transport Layer Reliability
-
9.4 The Transport Layer Summary
-
9.2.6 Lab - Using Wireshark to Observe the TCP 3-Way Handshake
-
9.3.8 Lab - Exploring Nmap
-
CA_Module_1010.0 Module Objectives
-
10.1 DHCP
-
10.2 DNS
-
10.3 NAT
-
10.4 File Transfer and Sharing Services
-
10.5 Email
-
10.6 HTTP
-
10.7 Network Services Summary
-
10.2.7 Lab - Using Wireshark to Examine a UDP DNS Capture
-
10.4.3 Lab - Using Wireshark to Examine TCP and UDP Captures
-
10.6.7 Lab - Using Wireshark to Examine HTTP and HTTPS Traffic
-
CA_Module_1111.0 Module Objectives
-
11.1 Network Devices
-
11.2 Wireless Communications
-
11.3 Network Communication Devices Summary
-
CA_Module_1212.0 Module Objectives
-
12.1 Network Topologies
-
12.2 Security Devices
-
12.3 Security Services
-
12.4 Network Security Infrastructure Summary
-
12.1.9 Packet Tracer - Identify Packet Flow
-
12.3.4 Packet Tracer - ACL Demonstration
-
CA_Module_1313.0 Module Objectives
-
13.1 Who is Attacking Our Network
-
13.2 Threat Actor Tools
-
13.3 Attackers and Their Tools Summary
-
CA_Module_1414.0 Module Objectives
-
14.1 Malware
-
14.2 Common Network Attacks
-
14.4 Common Threats and Attacks Summary
-
14.1.11 Lab - Anatomy of Malware
-
CA_Module_1515.0 Module Objectives
-
15.1 Introduction to Network Monitoring
-
15.2 Introduction to Network Monitoring Tools
-
15.3 Network Monitoring and Tools Summary
-
15.0.3 Class Activity - What's Going On
-
CA_Module_1616.0 Module Objectives
-
16.1 IP PDU Details
-
16.2 IP Vulnerabilities
-
16.3 TCP and UDP Vulnerabilities
-
16.4 Attacking the Foundation Summary
-
CA_Module_1717.0 Module Objectives
-
17.1 IP Services
-
17.2 Enterprise Services
-
17.3 Attacking What We Do Summary
-
17.1.7 Lab - Exploring DNS Traffic
-
17.2.7 Lab - Reading Server Logs
-
117.2.6 Lab - Attacking a mySQL Database
-
CA_Module_1818.0 Module Objectives
-
18.1 Defense-in-Depth
-
18.2 Security Policies, Regulations, and Standards
-
18.3 Understanding Defense Summary
-
CA_Module_1919.0 Module Objectives
-
19.1 Access Control Concepts
-
19.2 AAA Usage and Operation
-
19.3 Access Control Summary
-
CA_Module_2020.0 Module Objectives
-
20.1 Information Sources
-
20.2 Threat Intelligence Services
-
20.3 Threat Intelligence Summary
-
CA_Module_2121.0 Module Objectives
-
21.1 Integrity and Authenticity
-
21.2 Confidentiality
-
21.3 Public Key Cryptography
-
21.4 Authorities and the PKI Trust System
-
21.5 Applications and Impacts of Cryptography
-
21.6 Public Key Cryptography Summary
-
21.0.3 Class Activity - Creating Codes
-
2.11 Lab - Encrypting and Decrypting Data Using a Hacker Tool
-
CA_Module_2222.0 Module Objectives
-
22.1 Antimalware Protection
-
22.2 Host-Based Intrusion Protection
-
22.3 Application Security
-
22.4 Endpoint Protection Summary
الدرس 71 من 157
في تقدم