Curriculum For This Course
Video tutorials list
-
Exam Info
Video Name Time 1. SY0-501 vs. SY0-601 1:00 2. Exam Information 6:00 3. Building a lab 8:00 -
Security Basics
Video Name Time 1. CIA Triade 5:00 2. IAAA 5:00 3. Basic security controls 2:00 -
1.1 Social engineering techniques
Video Name Time 1. Phishing, Smishing, Vishing, Spear phishing, Whaling 11:00 2. Dumpster diving and Shoulder surfing 5:00 3. Eliciting information and the principles of social engineering 9:00 4. Pharming 7:00 5. Spam 4:00 6. Tailgating 3:00 7. Other types Social Engineer techniques 15:00 -
1.2 Potential indicators of attacks
Video Name Time 1. Introduction to Malware 2:00 2. Ransomeware and Cryptomalware 7:00 3. Trojans and RAT's 6:00 4. Bot and Command and control 4:00 5. Fileless Virus, Logic bombs, spyware, rootkit, backdoor 5:00 6. Adversarial artificial intelligence (AI) 6:00 7. Malicious USB cables, drives and Card Cloning 4:00 8. Supply chain attacks 4:00 9. Keyloggers 16:00 10. How passwords are stored 5:00 11. Using hashcat to crack passwords 7:00 12. Using a brute force and rainbow tables to attack passwords 11:00 -
1.3 Analyze potential indicators associated with application attacks
Video Name Time 1. Privilege escalation, (SSL) stripping, Pass the hash 11:00 2. Cross-site scripting (XSS) and Injections 16:00 3. Pointer Dereference, directory traversal, buffer overflows, and tocttou 12:00 4. Replay attacks 4:00 5. Request forgeries 9:00 6. API Attacks 7:00 7. Driver manipulation 5:00 8. Integer overflow, Resource exhaustion, Memory leak 6:00 -
1.4 Analyze potential indicators associated with network attacks.
Video Name Time 1. Evil Twin and Rouge Access Point 6:00 2. Bluesnarfing and Bluejacking 3:00 3. Cracking WEP 10:00 4. Disassociation and Jamming 7:00 5. Man in the Middle, browser, and APR Poisoning 19:00 6. IV, RFID, NFC Attacks 6:00 7. MAC Flooding and Cloning 6:00 8. DDOS Attacks 8:00 9. Malicious Code 4:00 -
1.5 Different threat actors, vectors, and intelligence sources
Video Name Time 1. Actors and threats 13:00 2. Threat intelligence sources 17:00 3. Research sources 11:00 -
1.6 Security concerns associated with various types of vulnerabilities
Video Name Time 1. Cloud-based vs. on-premises, Zero Day 10:00 2. Weak configurations 9:00 3. Third-party risks, Improper or weak patch, legacy platforms 10:00 4. Impacts 6:00 -
1.7 Techniques used in security assessments.
Video Name Time 1. Threat hunting 4:00 2. Vulnerability scans 18:00 3. SIEM and SOAR 13:00 -
1.8 Techniques used in penetration testing.
Video Name Time 1. Penetration testing 14:00 2. Passive and active reconnaissance 4:00 3. Exercise types 4:00 -
2.1 Security concepts in an enterprise environment.
Video Name Time 1. Configuration management 12:00 2. Data Sovereignty and Protection 12:00 3. Other Security Consideration 13:00 4. Site Resiliency, Hot, Warm, Cold 6:00 5. Deception and disruption 6:00 -
2.2 Virtualization and cloud computing concepts
Video Name Time 1. IaaS 11:00 2. PaaS 5:00 3. SaaS, XaaS 5:00 4. Cloud Deployment 2:00 5. Cloud Application terms 21:00 6. IaC 13:00 7. Virtualization Issues 5:00 -
2.3 Secure application development, deployment, and automation concepts.
Video Name Time 1. Software Development Environment 3:00 2. Secure Coding Techniques 19:00 3. DevOps and Automation 9:00 -
2.4 Authentication and authorization design concepts.
Video Name Time 1. Authentication methods 11:00 2. Biometrics 9:00 3. MFA 5:00 4. Authentication, authorization, and accounting 3:00 -
2.5 Implement cybersecurity resilience.
Video Name Time 1. Redundancy 9:00 2. Replication and storages 9:00 3. Backup Types 14:00 4. Non-persistence, high availability, diversity 6:00 5. RAID 16:00 -
2.6 Security implications of embedded and specialized systems.
Video Name Time 1. Embedded Systems 4:00 2. Industrial control system 4:00 3. IoT 4:00 4. IoT Communication and considerations 7:00 -
2.7 Physical security controls
Video Name Time 1. Physical Security Controls 9:00 2. Other physical security controls 7:00 3. Locks and Fencings 7:00 4. Fire Suppression 3:00 5. Secure data destruction 6:00 -
2.9 Basics of cryptographic concepts
Video Name Time 1. Introduction to cryptography 4:00 2. Goals of cryptography 6:00 3. Algorithm and Keys 20:00 4. Block and stream ciphers 4:00 5. Symmetric Ciphers 9:00 6. Asymmetric Ciphers 10:00 7. Hashing 13:00 8. Hybrid cryptography 9:00 9. Digital signatures 6:00 10. Block Chain 7:00 11. Steganography 8:00 12. Key stretching 2:00 13. Salting 6:00 14. Quantum 3:00 15. Ephemeral, PFS, Homomorphic 3:00 16. Cipher Modes 5:00 17. Lightweight cryptography 3:00 18. Elliptic-curve cryptography 3:00 19. Cipher suites 2:00 20. Common use cases 3:00 21. Limitations of encryptions 4:00 -
3.1 Implement secure protocols.
Video Name Time 1. DNSSEC 4:00 2. Email security with S/MIME and PMP 5:00 3. Installing Wireshark on Windows 10 8:00 4. Install and setup an FTP Server and Client 10:00 5. Using Wireshark to capture an FTP Password and securing FTP Server 9:00 6. Lightweight Directory Access Protocol Over SSL 5:00 7. SRPT, FTPS, SFTP, SNMP, IMAP 6:00 8. SSH 5:00 9. VPN and IPSEC 21:00 10. Use Cases for secure protocols 5:00 -
3.2 Implement host or application security solutions.
Video Name Time 1. Endpoint Protection 5:00 2. Boot integrity 3:00 3. Databases 2:00 4. Application Security 10:00 5. Hardening systems 6:00 6. Drive Encryption and sandboxing 9:00 -
3.3 Implement secure network designs.
Video Name Time 1. Load Balancing 7:00 2. Network segmentation 7:00 3. How to download and install packet tracer 9:00 4. VLAN's and Port Security 18:00 5. Firewalls 13:00 6. Configuring firewall rules 11:00 7. Jump and Proxy servers 4:00 8. IDS and IPS 9:00 9. Other network secure concepts 8:00 -
3.4 Install and configure wireless security settings
Video Name Time 1. Wireless Security 17:00 2. Wireless Installation Considerations 5:00 -
3.5 Implement secure mobile solutions. Given
Video Name Time 1. Mobile Connection methods and receivers 3:00 2. Mobile device management (MDM) 5:00 3. UEM and MAM 4:00 4. Enforcement and monitoring of mobile devices 7:00 5. Mobile Deployment Models 4:00 -
3.6 Apply cybersecurity solutions to the cloud.
Video Name Time 1. Cloud Solutions controls 3:00 2. Cloud Network and computing 5:00 3. Cloud Security terms 7:00 -
3.7 Implement identity and account management controls.
Video Name Time 1. Identity and account types 5:00 2. Account policies 12:00 -
3.8 Implement authentication and authorization solutions.
Video Name Time 1. Authentication management 4:00 2. Authentication Protocols 19:00 3. Access control schemes 14:00 -
3.9 Implement public key infrastructure.
Video Name Time 1. Introduction to PKI 5:00 2. Process of getting a certificate 7:00 3. PKI Setup 16:00 4. Fields on a certificate 7:00 5. Certificate formats 2:00 6. Certificate types 6:00 -
4.1 Tool to assess organizational security.
Video Name Time 1. Introductions to commands 2:00 2. ARP and Route 3:00 3. hping 6:00 4. Curl 4:00 5. IP scanner 3:00 6. ipconfig, ping, tracert 4:00 7. Linux file manipulation, head, tail, cat 5:00 8. Log 3:00 9. Cuckoo 1:00 10. thehavester 2:00 11. Nslookup and Dig 2:00 12. tcpdump 4:00 13. NetCat 2:00 14. Sniper 5:00 15. scanless 2:00 16. nmap 4:00 17. Managing Linux Permissions 16:00 18. Shell and script environments 2:00 19. Exploitation frameworks 4:00 20. Forensics tools 7:00 -
4.2 Policies, processes, and procedures for incident response
Video Name Time 1. Incident response process 8:00 2. Attack Frameworks 5:00 3. Incidents plans and exercises 6:00 -
4.3 support an investigation
Video Name Time 1. Log Files 7:00 2. Capture log files 7:00 -
4.4 Apply mitigation techniques or controls to secure an environment.
Video Name Time 1. Incident mitigation techniques 8:00 -
4.5 Key aspects of digital forensics.
Video Name Time 1. Documentation and evidence 6:00 -
5.1 Various types of controls.
Video Name Time 1. Control Types and category 6:00 -
5.2 Regulations, standards, or frameworks that impact security
Video Name Time 1. Regulations, standards, and legislation 5:00 2. Key frameworks 15:00 3. Secure configuration guides 2:00 -
5.3 Policies to organizational security
Video Name Time 1. Personnel Controls 15:00 2. Third-party risk management 6:00 3. Credential and organizations policies 7:00 -
5.4 Risk management processes and concepts
Video Name Time 1. Risk types, terms, and Process 12:00 2. Risk management strategies 6:00 3. Risk Assessments 9:00 4. Business impact analysis 8:00 -
5.5 Privacy and sensitive data concepts in relation to security
Video Name Time 1. Privacy breaches 4:00 2. Data types 6:00 3. Privacy technologies and roles 7:00 -
Performance Based Questions
Video Name Time 1. Performance Based Questions Introduction 1:00 2. PBQ - Attack Types and Response 2:00 3. PBQ - Incident Response 2:00 4. PBQ - Social Engineering 2:00 5. PBQ - Firewalls 4:00
Add Comment