Cyber Security - Definitions and The Basics
  • Introduction to Cyber Security
  • What is "Cyber"?
  • Cyber Threats
  • How Cyber Attacks Spill over into Business
  • Layers of Security (The Onion)
  • Internet Economy
  • Hacking & Criminal Hackers
  • The Hacker Profiling Project (HPP)
  • Incident Response
  • Risk Management
  • "Critical Infrastructure"
  • Encryption
  • Awareness
  • The Challenge of who is responsible
  • The Human Factor
  • Social Engineering
Modern Components of Cyber
  • Cyber Strategy
  • "The Kill Chain"
  • Cyber Warfare
  • Cyber Espionage
  • Cyber Crime
  • Cyber Defense
  • Cyber Offense
  • Cyber Units
Defending in the "Cyber World"
  • Firewalls
  • IDS (Intrusion Detection System)
  • IPS (Intrusion Prevention System)
  • OSINT (Open Source Intelligence)
  • Actionable Data (so all those alerts help me how?)
  • SIEM (Security Incident and Event Monitoring)
  • Malware Analysis and Reverse Engineering
  • The Proactive Security Team
  • Cyber Security for Home Users
  • Cyber Security for Corporations / Businesses
  • NOC (Network Operations Center)
  • SOC (Security Operations Center)
Summary
  • Conclusion
  • Presentation Material
  • Handbook
  • Cases in Cyber 1 - The Social BotNet
  • Cases in Cyber 2 - Backdoors in UEFI
  • Cases in Cyber 3 - FinFisher/Hacking Team (The Endpoint)
  • Cases in Cyber 4 - SCADA and Co.
  • Authentication
The Final Exam
  • Exam Part 1 The Cyber Basics
  • Exam Part 2 Modern Components of Cyber
  • Exam Part 3 Defending in the Cyber World
Proactive Security - Tools & Lost Chapters
  • The Lost Chapters 1 Proactive Security Team Methodology
  • The Lost Chapters 2 Layers of Security and their protection
  • The Lost Chapters 3a PTES Penetration Testing Execution Standard
  • The Lost Chapters 3b PTES Penetration Testing Execution Standard
  • The Lost Chapters 4 Secure Network Design
  • The Lost Chapters 5 Wireshark and Packet Analysis
  • The Lost Chapters 6 Kali Linux
  • The Lost Chapters 7 OpenVas / Metasploit
  • The Lost Chapters 8 Web App Scanners
  • The Lost Chapters 9 Blackarch Linux
  • The Lost Chapters 10 Network Monitoring Primer with Security Onion VM