Security Policies
  • Welcome to the course
  • Security policies - introduction
  • What is security?
  • Information security
  • Information security - level up
  • Security issues
  • Why are security solutions fallible?
  • Security policy issues
  • Introduction to threat modelling and classification
  • Threat modelling - STRIDE
  • STRIDE: Spoofing identity
  • STRIDE: Tampering with Data
  • STRIDE: Denial of Service
  • Threat Modelling and Classification - notes for the examination
Risk Management
  • Introduction to Risk Management
  • Attack Methods
  • Local attacks
  • Target scanning and enumeration techniques #1
  • Target scanning and enumeration techniques #2
  • Passive scanning
  • Attack Methodologies - notes for the examination
  • Introduction to risk assessment
  • DREAD: Risk assessment model
  • DREAD: Exploitability
  • EXERCISE: Risk Assessment
  • Risk Assessment - notes for the examination
  • Introduction to Social Engineering and rogue software
  • Manipulation tactics
  • EXERCISE: Social Engineering attacks
  • SE with KALI / BackTrack
  • Rogue Software
  • Fraud tools #1
  • Fraud tools #2
  • Social Engineering and Rogue Software - notes for the examination
Defence in Depth
  • Introduction to Defence in Depth
  • How to use Defence in Depth model?
  • DiD: OS and LAN Layers
  • DiD: Perimeter and Physical Access Layers
  • DiD: Demonstration
  • Automated attack targeting a service
  • Automated user-targeting attack
  • The Defence in Depth Model - notes for the examination
Immutable Laws of Security
  • Introduction to Immutable laws of security - Law #1
  • Law #2
  • Law #3
  • Law #4
  • Law #5
  • Law #6
  • Law #7
  • Law #8
  • Law #9
  • Law #10
  • Laws for administrators
  • Immutable Laws of Security - notes for the examination
Disaster Recovery
  • Introduction to Disaster Recovery
  • How to reduce losses?
  • Ensuring continous availability
  • Threat discovery #1
  • Threat discovery #2
  • Audit users and keep control accounts
  • High risk users
  • Collecting and analysing evidence
  • Forensics example
  • CONFICKER: CASE STUDY
  • How to reduce losses - notes for the examination
Application Security
  • Introduction to Application Security
  • Attacks on applications
  • SQL Injection
  • EXERCISE: Analyze the application
  • Blind SQL Injection
  • Automated SQL Injection
  • Cross-site scripting - XSS
  • Application Attacks - notes for the examination
  • Program security assessment
  • Unsafe applications
  • Program Security Assessment - notes for the examination
Application Security - Configuration and Management
  • Here’s what you’ll learn in this module
  • Managing applications
  • Software updates
  • MS Update
  • System Center Configuration Manager
  • Blocking applications
  • Software restrictions policies
  • EXERCISE: Application control rules
  • Isolating applications
  • How to protect users without interrupting their work - notes for the examination
Cryptography
  • Introduction to cryptography
  • History of ciphers
  • Symmetric and asymmetric ciphers
  • Symmetric-key algorithms
  • Block ciphers
  • Data encryption standard