Table of contents
Course Overview
1min
Lock icon
Course Overview | 1m
Implementing Secure Protocols
25mins
Lock icon
Intro | 0m
Lock icon
Network Protocols and TCP Three-Way Handshake | 3m
Lock icon
Domain Name System Security Extensions (DNSSEC) | 3m
Lock icon
Secure Shell (SSH) | 1m
Lock icon
Secure/Multipurpose Internet Mail Extensions (SMIME) | 1m
Lock icon
Secure Real Time Transport Protocol (SRTP) | 0m
Lock icon
Lightweight Directory Access Protocol Over SSL LDAPS | 0m
Lock icon
File Transfer Protocol (FTP) and Secure File Transfer Protocol (SFTP) | 1m
Lock icon
Simple Network Management Protocol (SNMP) | 1m
Lock icon
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) | 1m
Lock icon
Hypertext Transfer Protocol Secure (HTTPS) | 1m
Lock icon
Secure Post Office Protocol (POP) and Internet Messaging Access Protocol (IMAP) | 2m
Lock icon
Use Cases | 4m
Lock icon
Review | 1m
Understanding Host or Application Security Solutions
51mins
Lock icon
Overview | 0m
Lock icon
Antivirus | 1m
Lock icon
Endpoint Detection and Response | 2m
Lock icon
Data Loss Prevention | 2m
Lock icon
Next Generation Firewall | 1m
Lock icon
Host-based Intrusion Detection System and Host-based Intrusion Prevention System | 0m
Lock icon
Host-based Firewall | 1m
Lock icon
Boot Loader Protections and Secure Boot | 2m
Lock icon
Measured Launch | 0m
Lock icon
Integrity Measurement Architecture (IMA) | 0m
Lock icon
Basic Input/Output System and Unified Extensible Firmware Interface | 0m
Lock icon
Hashing | 2m
Lock icon
Salt | 1m
Lock icon
Secure Coding Techniques | 6m
Lock icon
Code Quality and Testing | 2m
Lock icon
Static Code Analysis | 2m
Lock icon
Fuzzing | 3m
Lock icon
Additional Secure Coding Concepts | 1m
Lock icon
Peripherals Security | 2m
Lock icon
Hardening the Environment | 2m
Lock icon
Common Ports | 1m
Lock icon
Registry Hardening | 1m
Lock icon
Self-Encrypting Drives (SED) | 2m
Lock icon
Hardware Root of Trust | 1m
Lock icon
Hardware Based Encryption | 2m
Lock icon
Sandboxing | 2m
Implementing Secure Network Designs Part 1
44mins
Lock icon
Overview | 0m
Lock icon
Load Balancers | 4m
Lock icon
Security Segmentation Models | 2m
Lock icon
Virtualization | 1m
Lock icon
Air Gaps | 2m
Lock icon
East West Traffic | 1m
Lock icon
Zero Trust | 1m
Lock icon
VPN | 4m
Lock icon
Split Tunnel | 0m
Lock icon
IPSec and Transport Encryption | 1m
Lock icon
VPN Concentrator | 1m
Lock icon
Domain Name System Security Extensions (DNSSEC) | 3m
Lock icon
Network Access Control | 2m
Lock icon
In-Band vs Out-of-Band Management | 3m
Lock icon
Port Security and 802.1x | 4m
Lock icon
Loop Protection and Flood Guards | 2m
Lock icon
Spanning Tree Protocol (STP) | 2m
Lock icon
Dynamic Host Configuration Protocol (DHCP) Snooping | 1m
Lock icon
MAC Filtering | 1m
Lock icon
Review | 0m
Implementing Secure Network Designs Part 2
44mins
Lock icon
Overview | 0m
Lock icon
Jump Server | 2m
Lock icon
Proxies | 3m
Lock icon
Web Security Gateways | 1m
Lock icon
Intrusion Detection and Prevention | 5m
Lock icon
IDS vs IPS Component Workflow | 1m
Lock icon
Four Approaches to IDS | 1m
Lock icon
Network-based IDS | 2m
Lock icon
Security Device Placement | 2m
Lock icon
Firewalls | 6m
Lock icon
Web Application Firewalls | 2m
Lock icon
Unified Threat Management (UTM) | 1m
Lock icon
Content Filters | 1m
Lock icon
Implicit Deny and Access Control List | 0m
Lock icon
Route Security | 1m
Lock icon
Quality of Service (QoS) | 1m
Lock icon
Implications of IPv6 | 2m
Lock icon
Port Mirroring, Port Spanning and Port Taps | 3m
Lock icon
File Integrity Check | 2m
Lock icon
Review | 0m
Installing and Configuring Wireless Security Settings
34mins
Lock icon
Overview | 0m
Lock icon
Wireless Definitions | 1m
Lock icon
WEP, WPA, and WPA2 | 1m
Lock icon
WPA and WPA2 Security | 3m
Lock icon
WPA3 | 4m
Lock icon
Wireless Security Examples | 1m
Lock icon
Wireless Security and Pen Testing Tools | 2m
Lock icon
EAP, PEAP, and LEAP | 2m
Lock icon
802.1x Wireless Protocols | 2m
Lock icon
Radius Federation | 0m
Lock icon
Wi-Fi Protected Setup | 0m
Lock icon
Captive Portal | 2m
Lock icon
Installation Considerations | 1m
Lock icon
Access Points Wi-Fi Security | 3m
Lock icon
Band Selection Width | 1m
Lock icon
Fat vs Thin Access and Stand-Alone vs Controller Based | 2m
Lock icon
Review | 0m
Implementing Secure Mobile Solutions
40mins
Lock icon
Overview | 0m
Lock icon
Cellular | 7m
Lock icon
Securing Wi-Fi | 1m
Lock icon
Near Field Communication | 1m
Lock icon
Additional Areas of Concern | 2m
Lock icon
MicroSD Hardware Security Module | 0m
Lock icon
Mobile Device Management, Mobile Application Management, and Unified Endpoint Management | 1m
Lock icon
Security Enhancements for Android | 1m
Lock icon
Device Security | 4m
Lock icon
Application Security and Key Credential Management | 2m
Lock icon
Authentication | 1m
Lock icon
Geo-Tagging | 1m
Lock icon
Context Aware Authentication | 2m
Lock icon
Enforcement and Monitoring | 4m
Lock icon
BYOD Concerns and Deployment Models | 3m
Lock icon
Additional BYOD Concerns | 2m
Lock icon
Review | 0m
Applying Cybersecurity Solutions to the Cloud
34mins
Lock icon
Overview | 0m
Lock icon
High Availability | 2m
Lock icon
Resource Policies | 1m
Lock icon
Secrets Management | 2m
Lock icon
Storage in the Cloud | 2m
Lock icon
Virtual Networks | 2m
Lock icon
API Inspection and Integration | 1m
Lock icon
Growth of Enterprise Cloud Application | 1m
Lock icon
Cyber Kill Chain in the Cloud | 3m
Lock icon
Compute in the Cloud | 3m
Lock icon
Cloud Access Security Broker | 0m
Lock icon
Application Security | 1m
Lock icon
Next Gen Secure Web Gateway | 0m
Lock icon
Firewall Considerations in a Cloud Environment | 1m
Lock icon
Transmission Control Protocol,Internet Protocol, and Open Systems Interconnection Models | 0m
Lock icon
Application Layer, Protocol Layer, and Volumetric Attacks | 2m
Lock icon
Cost | 1m
Lock icon
Cloud Native Controls vs Third Party Solutions | 2m
Implementing Identity and Account Management Controls
33mins
Lock icon
Overview | 0m
Lock icon
Identity Provider | 1m
Lock icon
Identity Provider Example | 1m
Lock icon
Certificates, Tokens, and SSH Keys | 1m
Lock icon
Certificate Issues | 2m
Lock icon
Smart Cards | 0m
Lock icon
User Accounts | 1m
Lock icon
Account Management | 1m
Lock icon
Password Complexity | 1m
Lock icon
Password History | 1m
Lock icon
Password Reuse | 1m
Lock icon
Time of Day Restrictions | 0m
Lock icon
User Access Best Practices | 2m
Lock icon
Permissions, Auditing, and Review | 1m
Lock icon
Recertification | 1m
Lock icon
Group Policy | 2m
Lock icon
Expiration | 2m
Lock icon
Recovery | 1m
Lock icon
Impossible Travel Risky Login | 2m
Lock icon
Lockout | 0m
Lock icon
Disablement | 0m
Lock icon
Review | 0m
Implementing Authentication and Authorization Solutions
38mins
Lock icon
Overview | 0m
Lock icon
Authentication Management | 3m
Lock icon
Extensible Authentication Protocol | 0m
Lock icon
Challenge Handshake Authentication Protocol | 0m
Lock icon
Password Authentication Protocol | 0m
Lock icon
Port Security and 802.1x Authentication | 4m
Lock icon
Remote Authentication Dial-In User Service (RADIUS) | 2m
Lock icon
Single Sign On (SSO) | 1m
Lock icon
Security Assertion Markup Language (SAML) | 2m
Lock icon
Terminal Access Controller Access Control System (TACACS) | 1m
Lock icon
TACACS+ | 2m
Lock icon
OAuth | 1m
Lock icon
OpenID and Shibboleth | 1m
Lock icon
Kerberos | 3m
Lock icon
Attribute Based Access Control | 2m
Lock icon
Role-Based and Role-Based Access Control | 1m
Lock icon
Access Control Methods | 1m
Lock icon
Mandatory Access Control | 1m
Lock icon
Discretionary Access Control | 0m
Lock icon
Conditional Access | 1m
Lock icon
Privileged Accounts | 1m
Lock icon
Filesystem Permissions | 1m
Implementing Public Key Infrastructure
28mins
Lock icon
Overview | 0m
Lock icon
Certificate Authorities and Digital Certificates | 0m
Lock icon
Certificate Authority | 1m
Lock icon
Certification Revocation List (CRL) | 1m
Lock icon
Online Certificate Status Protocol | 1m
Lock icon
Certificate Signing Request (CSR) and Public Key Cryptography Standards (PKCS) | 0m
Lock icon
Public Key Infrastructure | 3m
Lock icon
Public Key | 1m
Lock icon
Private Key | 0m
Lock icon
Object Identifiers (OID) | 1m
Lock icon
Types of Certificates | 5m
Lock icon
Certificate Formats | 1m
Lock icon
Online vs Offline Certificate Authority | 1m
Lock icon
Stapling and Pinning | 0m
Lock icon
Trust Models | 1m
Lock icon
Key Escrow | 1m
Lock icon
Certificate Chaining | 1m
About the author
Christopher Rees
Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.
More Courses by Christopher R.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon