Curriculum For This Course
Video tutorials list
-
Course Introduction
Video Name Time 1. Welcome! 01:22 2. Why MTA Security Fundamentals? 06:19 3. Challenge: Hackers 01:23 4. Challenge Walkthrough: Hackers 03:45 -
Security Layers
Video Name Time 1. What To Expect In This Section? 00:40 2. Core Security Principles - Part 1 08:56 3. Core Security Principles - Part 2 04:59 4. The Principle of Least Privilege 10:23 5. Social Engineering 05:00 6. Man-In-The-Middle Attacks - introduction part 1 07:13 7. Man-In-The-Middle Attacks - introduction part 2 07:35 8. A Man-In-The-Middle Attack In Action With Cain&Able 05:42 9. Microsoft Baseline Security Analyzer 10:36 10. Physical Security 07:19 11. Mobile Devices Security 04:57 12. Overview of Internet Security 06:35 13. Internet Explorer Security Zones 07:32 14. Tips That Can Help You Protect Your Privacy 05:50 15. Overview of Wireless Security 06:24 16. Let's configure a real router and access point 10:01 17. Wireless Too Slow? 05:05 18. Let's Summarize This Section 00:18 -
Operating System Security
Video Name Time 1. What To Expect In This Section? 00:41 2. User Authentication 09:21 3. Let's Check A Real Radius Server 06:55 4. Public Key Infrastucture (PKI) And Certificates 05:51 5. Certificates and how to use them 06:48 6. How To Manage Users And Passwords In Windows Server 02:49 7. NTFS Permissions 05:26 8. Shares And Permissions In Action 10:40 9. Run-as explained 02:46 10. Password Policies 03:16 11. Audit Policies 05:34 12. Bitlocker explained 06:36 13. Malware And What You Can Do About It 04:44 14. Installing and tweaking an antivirus application - a lab 08:46 15. Let's Summarize This Section 00:18 -
Network Security
Video Name Time 1. What To Expect In This Section? 00:37 2. Why Do We Need A Firewall? 10:43 3. Let's Check Out A Real Firewall And UTM 08:08 4. Oh no... my network is under attack!!! 06:11 5. How a firewall can stop a virus 04:48 6. Network Access Protection 04:15 7. What is a VLAN? 06:17 8. What is a DMZ? 07:04 9. A real world example of VLANs and DMZ 05:53 10. Introduction to IPSec 07:18 11. IPSec in action 07:20 12. Names Resolution. DNS concepts 04:33 13. How to use Wireshark to caputer network traffic 04:33 14. Let's Summarize This Section 00:23 -
Security Software
Video Name Time 1. What To Expect In This Section? 00:17 2. Client Protection 05:01 3. User Access Control 02:52 4. Email Protection 04:31 5. Phishing - examples 04:30 6. Server protection 02:37 -
Course Wrap Up
Video Name Time 1. More About IPsec 08:26 2. Bonus video - encryption 04:11 3. Let's Summarize Our Training 00:51 4. How to use GPOs to make your server more secure 05:29 5. Bonus video - a S2S VPN on a Cisco router 07:37 6. Bonus video - remote support tools 03:56 7. Remote VPN Access 08:43 8. The SHA1 Function is now Dead 02:56 9. More About Wireless Security 05:35
Add Comment