Table of contents
Course Overview
1min
Lock icon
Course Overview | 1m
Understanding Security Concepts in an Enterprise Environment
47mins
Lock icon
Module Intro | 1m
Lock icon
Configuration Management | 3m
Lock icon
Diagrams | 1m
Lock icon
Baseline Configuration | 2m
Lock icon
IP Address Schema | 2m
Lock icon
Data Sovereignty | 1m
Lock icon
Data Loss Prevention (DLP) | 2m
Lock icon
Types of Data to Secure | 1m
Lock icon
Data Masking | 4m
Lock icon
Tokenization | 2m
Lock icon
Digital Rights Management (DRM) | 1m
Lock icon
Hardware Based Encryption (TPM and HSM) | 1m
Lock icon
Geographical Considerations | 1m
Lock icon
Cloud Access Security Broker (CASB) | 1m
Lock icon
Security-as-a-Service (SECaaS) | 1m
Lock icon
Differences between CASB and SECaaS | 1m
Lock icon
Recovery | 1m
Lock icon
Secure Protocols and SSL/TLS Inspection | 1m
Lock icon
Hashing | 1m
Lock icon
API Considerations and API Gateways | 2m
Lock icon
Recovery Site Options (Cold, Warm, Hot, and Cloud-based Sites) | 3m
Lock icon
Disaster Area Example | 1m
Lock icon
Honeypots and Honeyfiles | 1m
Lock icon
Honeynets | 1m
Lock icon
Fake Telemetry | 1m
Lock icon
DNS Sinkhole | 1m
Understanding Virtualization and Cloud Computing
50mins
Lock icon
Module Intro | 0m
Lock icon
Cloud Storage | 2m
Lock icon
Cloud Computing | 1m
Lock icon
"X" as a Service | 0m
Lock icon
Infrastructure as a Service (IaaS) | 1m
Lock icon
IaaS and Automation | 1m
Lock icon
Platform as a Service (PaaS) | 1m
Lock icon
Software as a Service (SaaS) | 1m
Lock icon
IaaS, PaaS, and SaaS Differentiators | 0m
Lock icon
Types of Clouds | 0m
Lock icon
Managed Service Providers (MSP) | 4m
Lock icon
Fog Computing | 2m
Lock icon
Edge Computing | 0m
Lock icon
VDI | 4m
Lock icon
Virtualization | 4m
Lock icon
Containers | 5m
Lock icon
Microservices and APIs | 3m
Lock icon
Infrastructure as Code (IAC) | 0m
Lock icon
Software Defined Networking (SDN) | 1m
Lock icon
Software Defined Visibility (SDV) | 0m
Lock icon
Serverless Architecture | 1m
Lock icon
IaaS, PaaS, FaaS, and SaaS Differentiators | 0m
Lock icon
Service Integrations and Resource Policies | 1m
Lock icon
Transit Gateway | 0m
Lock icon
VM Sprawl Avoidance | 1m
Lock icon
VM Escape | 1m
Lock icon
Module Review | 0m
Implementing Secure Application Development, Deployment, and Automation
32mins
Lock icon
Module Intro | 0m
Lock icon
Environments (Dev, Test, Staging, and Production) | 3m
Lock icon
Environment Example | 2m
Lock icon
Provisioning and Deprovisioning | 2m
Lock icon
Integrity Measurement | 1m
Lock icon
Static Code Analysis | 2m
Lock icon
Secure Coding Techniques | 6m
Lock icon
Security Automation | 2m
Lock icon
Continuous Monitoring and Validation | 1m
Lock icon
Continuous Integration | 1m
Lock icon
Continuous Delivery and Continuous Development | 2m
Lock icon
OWASP | 0m
Lock icon
Software Diversity, Compiler, and Binary | 1m
Lock icon
Elasticity and Scalability | 1m
Lock icon
Version Control | 2m
Understanding Authentication and Authorizations Methods
28mins
Lock icon
Module Intro | 0m
Lock icon
Directory Services | 1m
Lock icon
Usernames | 0m
Lock icon
Federation | 0m
Lock icon
Transitive Trust / Authentication | 1m
Lock icon
Attestation | 0m
Lock icon
Time-Based One-Time Password (TOTP) | 1m
Lock icon
HMAC-Based One-Time Password (HOTP) | 0m
Lock icon
SMS Authentication | 0m
Lock icon
Tokens | 1m
Lock icon
Static Codes | 0m
Lock icon
Authentication Applications | 1m
Lock icon
Push Notifications | 0m
Lock icon
Smart Cards | 0m
Lock icon
Proximity Cards | 1m
Lock icon
Personal Identification Verification Card (PIV) | 0m
Lock icon
Common Access Card | 0m
Lock icon
Biometric Factors | 1m
Lock icon
Facial Recognition | 1m
Lock icon
Vein and Gait Analysis | 1m
Lock icon
Efficacy Rates | 1m
Lock icon
Identification vs. Authentication vs. Authorization | 1m
Lock icon
Multifactor Authentication | 1m
Lock icon
Authentication Factors | 1m
Lock icon
Authorization | 0m
Lock icon
Authentication Factors | 1m
Lock icon
Authentication, Authorization, and Accounting (AAA) | 0m
Implementing Cybersecurity Resilience
36mins
Lock icon
Module Intro | 2m
Lock icon
Geographically Disperse | 0m
Lock icon
Geographical Dispersal of Assets | 1m
Lock icon
RAID | 2m
Lock icon
Multipath | 2m
Lock icon
Load Balancer | 1m
Lock icon
Power Resiliency | 1m
Lock icon
Replication | 1m
Lock icon
On-prem vs. Cloud | 1m
Lock icon
Backup Plans / Policies | 1m
Lock icon
Backup Execution / Frequency | 1m
Lock icon
Backup Types | 3m
Lock icon
Backup Environments | 1m
Lock icon
Online vs. Offline Backups | 1m
Lock icon
Backups - Distance Considerations | 2m
Lock icon
Non-persistence, Snapshots, and Live Boot Media | 2m
Lock icon
High Availability | 2m
Lock icon
Redundancy | 1m
Lock icon
Fault Tolerant Hardware | 0m
Lock icon
Technology and Vendor Diversity | 1m
Lock icon
Crypto and Control Diversity | 2m
Recognizing Security Implications of Embedded and Specialized Systems
36mins
Lock icon
Module Intro | 1m
Lock icon
Module Goal | 1m
Lock icon
Embedded Systems | 0m
Lock icon
Embedded Systems Examples | 1m
Lock icon
SCADA / ICS | 4m
Lock icon
SCADA Security Concerns | 2m
Lock icon
Smart Devices / IoT | 2m
Lock icon
Smart Devices / IoT Weak Defaults | 1m
Lock icon
Special Purpose Devices | 1m
Lock icon
Vehicles | 1m
Lock icon
Voice over IP (VoIP) | 2m
Lock icon
HVAC | 2m
Lock icon
Aircraft/UAV | 1m
Lock icon
Printers/MFDs | 2m
Lock icon
Real Time Operating Systems (RTOS) | 0m
Lock icon
Surveillance Systems | 1m
Lock icon
System on a Chip (SoC) | 1m
Lock icon
5G Networks and Security Concerns | 1m
Lock icon
Narrow-band and Baseband Radio | 0m
Lock icon
Zigbee | 2m
Lock icon
Constraints | 2m
Understanding the Importance of Physical Security Controls
47mins
Lock icon
Module Intro | 0m
Lock icon
Barricades | 1m
Lock icon
Mantraps | 0m
Lock icon
Badges | 1m
Lock icon
Alarms | 1m
Lock icon
Lighting and Signs | 1m
Lock icon
Cameras and Video Surveillance | 1m
Lock icon
Guards | 0m
Lock icon
Robot Sentries | 1m
Lock icon
Reception | 0m
Lock icon
Two Person Integrity (TPI) / Control | 0m
Lock icon
Hardware Locks | 0m
Lock icon
Biometrics | 0m
Lock icon
Cable Locks, Safes, and Locking Cabinets | 1m
Lock icon
USB Data Blocker | 1m
Lock icon
Fencing | 1m
Lock icon
Fire Suppression | 2m
Lock icon
Motion Detection / Infrared | 0m
Lock icon
Proximity Readers | 1m
Lock icon
Drones / UAV | 0m
Lock icon
Logs | 0m
Lock icon
Air Gaps | 3m
Lock icon
Demilitarized Zone (DMZ) | 4m
Lock icon
Protected Distribution System (PDS) | 4m
Lock icon
Hot and Cold Aisles | 2m
Lock icon
Non-Digital and Digital Data Destruction | 1m
Lock icon
Shredding | 0m
Lock icon
Pulping and Pulverizing | 1m
Lock icon
Deguassing | 1m
Lock icon
Purging | 0m
Lock icon
Wiping | 2m
Lock icon
Module Review | 0m
Understanding the Basics of Cryptographic Concepts
56mins
Lock icon
Module Intro | 0m
Lock icon
Why You Should Care | 0m
Lock icon
Cryptographic Terminology and History | 3m
Lock icon
Vigenere Table | 3m
Lock icon
Digital Signatures | 1m
Lock icon
Key Stretching | 3m
Lock icon
Hashing | 2m
Lock icon
In-band vs. Out-of-band Key Exchange | 1m
Lock icon
Elliptic Curve Cryptography (ECC) | 1m
Lock icon
Perfect Forward Secrecy | 1m
Lock icon
Quantum Communications | 3m
Lock icon
Quantum Computing | 1m
Lock icon
Post Quantum | 1m
Lock icon
Ephemeral Key | 0m
Lock icon
Cipher Modes | 0m
Lock icon
XOR Function | 1m
Lock icon
Cryptographic Methods and Design | 3m
Lock icon
Blockchain | 3m
Lock icon
Fundamental Differences and Encryption Methods | 2m
Lock icon
Session Keys | 0m
Lock icon
Asymmetric Encryption | 3m
Lock icon
Lightweight Encryption | 0m
Lock icon
Steganography | 2m
Lock icon
Homomorphic Encryption | 2m
Lock icon
Common Use Cases | 3m
Lock icon
Cipher Suites | 1m
Lock icon
Limitations | 2m
Lock icon
Random and Pseudorandom Number Generators (PRNG) | 1m
Lock icon
Quantum Random Number Generators (QRNG) | 1m
About the author
Christopher Rees
Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.
More Courses by Christopher R.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon