Cybersecurity – LIVE Training
-
Week OneIntroduction to Security Principles0sCloud ConceptsCore Azure ServicesSecurity, Privacy, Compliance, and TrustThe CIA Triad – Confidentiality, Integrity, and Availability – part 4The CIA Triad – Confidentiality, Integrity, and Availability – part 5IAAA -Identification, Authentication, Authorization, and Accountability – part 2IAAA -Identification, Authentication, Authorization, and Accountability – part 4Risk Management – part 1Risk Management – part 3Risk Management – part 5Laws and regulations – part 2Security governance principles
-
Business Continuity, Disaster Recovery, and Incident ResponseBCP – Business Continuity Planning – Part 1BCP – Business Continuity Planning – Part 2BCP – Business Continuity Planning – Part 3DRP – Disaster Recovery Planning – Part 1DRP – Disaster Recovery Planning – Part 2DRP – Disaster Recovery Planning – Part 3DRP – Disaster Recovery Planning – Part 4Incidents Response – Part 1Incidents Response – Part 2Incidents Response – Part 3Incidents Response – Part 4Incidents Response – Part 5
-
Access Control Concepts
-
Network SecurityNetwork Basics and Definitions – Part 1Network Basics and Definitions – Part 2The OSI Model – Part 1The OSI Model – Part 2The TCP/IP modelIP addresses, port numbers, and MAC addresses – Part 1IP addresses, port numbers, and MAC addresses – Part 2IP addresses, port numbers, and MAC addresses – Part 3IP support protocols – Part 1IP support protocols – Part 2Cables – part 1Cables – part 2LAN topologiesWi-FiWireless networks – Part 1Wireless networks – Part 2VLANs and Routers – Part 1VLANs and Routers – Part 2VPNs, NAC, and third-party connectivitySDN, SD-WAN, and SDXAttacks and attackers – Part 1Attacks and attackers – Part 2Attacks and attackers – Part 3Intrusion Detection and Prevention systems (IDS-IPS) – Part 1Intrusion Detection and Prevention systems (IDS-IPS) – Part 2SIEM and SOAR systemsHoneynets and HoneypotsFirewalls – Part 1Firewalls – Part 20-day Attacks and ExploitsVulnerability ScanningVirtualization, Cloud, and Distributed Computing – Part 1Virtualization, Cloud, and Distributed Computing – Part 2Virtualization, Cloud, and Distributed Computing – Part 3Virtualization, Cloud, and Distributed Computing – Part 4Virtualization, Cloud, and Distributed Computing – Part 5The Internet of Things (IoT)Asset tracking and hardware hardeningElectricityBackups – Part 1Backups – Part 2Fault tolerance, redundancy, and resiliency – Part 1Fault tolerance, redundancy, and resiliency – Part 2Fault tolerance, redundancy, and resiliency – Part 3Fire suppression – Part 1Fire suppression – Part 2Secure design principles – Part 1Secure design principles – Part 2
-
Security OperationsConfiguration ManagementPatch Management.Change ManagementCryptography – Part 1Cryptography – Part 2Cryptography – Part 3HashingAttacks on our cryptographyData handling, data storage and data retention – Part 1Data handling, data storage and data retention – Part 2Data handling, data storage and data retention – Part 3Administrative (Directive) ControlsTraining and awarenessSocial Engineering attacks – Part 1Social Engineering attacks – Part 2
-
Get Certified
Domain 1: Security Principles we cover:
1.1 Understand the security concepts of information assurance
1.2 Understand the risk management process
1.3 Understand security controls
1.4 Understand ISC2 Code of Ethics
1.5 Understand governance processes
Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts we cover:
2.1 Understand business continuity (BC)
2.2 Understand disaster recovery (DR)
2.3 Understand incident response
In Domain 3: Access Controls Concepts we cover:
3.1 Understand physical access controls
3.2 Understand logical access controls
Domain 4: Network Security we cover:
4.1 Understand computer networking
4.2 Understand network threats and attacks
4.3 Understand network security infrastructure
Domain 5: Security Operations we cover:
5.1 Understand data security
5.2 Understand system hardening
5.3 Understand best practice security policies
5.4 Understand security awareness training