Course Introduction
  • Welcome to the Course!
  • What This Course Is & What It Isn't
  • Instructor Introduction
  • Course Curriculum Overview
  • Udemy Mobile App for iOS & Android - Download & Take Course Videos On the Go!
  • Q&A Discussion Board Activity: Introduce Yourself
Getting Started In Information Security
  • The Many Areas of Information Security
  • Most Valuable IT Security Certifications
  • The State of Cybersecurity in 2018 and Beyond
Core Information Security Principles
  • Section Introduction
  • The CIA Triad
  • Authentication, Authorization, and Accounting (AAA)
  • Least Privilege
  • More Concepts
  • Legal and Regulatory Issues
  • Information Security Governance
  • Authentication Basics
  • Identify Proofing
  • General Password Rules
  • Designing an Authentication Strategy with Microsoft Technet
  • Information Security Principles Quiz
Risk Management
  • Section Introduction
  • Introduction to Risk Management
  • Exploring Risks and Threats
  • Quantitative Risk Analysis
  • Attack Surface Analysis
  • Risk Managment Quiz
Asset Management
  • Section Introduction
  • Identifying and Classifying Assets
  • Understanding the Asset Lifecycle
  • Data Retention
  • Understanding Data States
  • Asset Management Quiz
Access Control
  • Section Introduction
  • Access Control
  • Physical and Logical Access Controls
  • Defense in Depth
  • Access Control Models
  • Student Activity: Analyzing Your Organization's Access Control
  • Access Control Quiz
Security Malware Threats
  • Introduction to Malware
  • Buffer Overflows
  • Viruses and Polymorphic Viruses
  • Worms
  • Trojan Horses
  • Logic Bombs
  • Spyware and Adware
  • Ransomware
  • Rootkits
  • Backdoors
  • Zero Day Attacks
  • Protecting Against Malware
  • Security Malware Threats Quiz
Additional Threats & Vulnerabilities
  • Section Introduction
  • Social Engineering
  • Email Spam, Spoofing, Phishing, and Pharming
  • Protocol Spoofing
  • Common Attack Methods
  • Transmission Media Security Concerns
  • Course Review Request
  • Additional Threats & Vulnerabilities Quiz
Basic Network Zones
  • Basic Network Zones
  • Internet
  • DMZ
  • Extranet
  • Intranet
  • Mini-Case Scenario: Secure Network Design
  • Basic Network Zones Quiz
Network Security
  • Section Introduction
  • Hardware Firewalls
  • Proxy Servers
  • Intrusion Detection & Prevention Systems
  • Virtual Private Networks
  • Network Security Devices Quiz
Network Isolation
  • Introduction to Network Isolation
  • Switch VLANs
  • Routers
  • Honeypots
  • Network Address Translation (NAT)
  • Network Isolation Quiz
Wireless Security
  • Section Introduction
  • Wireless Encryption Standards
  • Wireless Equivalent Privacy (WEP)
  • Wi-Fi Protected Access (WPA)
  • Wi-Fi Protected Access 2 (WPA2)
  • Wi-Fi Protected Access 3 (WPA3)
  • WPA Enterprise vs. Personal Mode
  • Common Wireless Security Threats