Pearson Computer Security Fundamentals

Gain hands-on experience in the fundamentals of computer security with the Computer Security Fundamentals course and performance-based lab. Lab simulate real-world, hardware, software and command line interface environments and can be mapped to any text-book, course and training. The Computer Security course covers the Web security concepts and principles that improve your skills of preventing network from threats. This course is for system administrators who are not security experts but beginners who want to know more about IT security and information security.

Here's what you will get

Lessons
Lessons
23+
Quizzes
246+
Flashcards
171+
Glossary of terms
171+
Test prep
Pre-assessment Questions
105+
Post-Assessment Questions
100+
Lab
Performance lab
43+
Video tutorials
43+
Video Tutorials
Video tutorials
171+

Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Video Lessons
Videos
171+
Hours
09:50+

Here's what you will learn

  • Introduction
  • How Seriously Should You Take Threats to Network Security?
  • Identifying Types of Threats
  • Assessing the Likelihood of an Attack on Your Network
  • Basic Security Terminology
  • Concepts and Approaches
  • How Do Legal Issues Impact Network Security?
  • Online Security Resources
  • Summary
  • Introduction
  • Network Basics
  • How the Internet Works
  • History of the Internet
  • Basic Network Utilities
  • Other Network Devices
  • Advanced Network Communications Topics
  • Summary
  • Introduction
  • How Internet Fraud Works
  • Identity Theft
  • Cyber Stalking
  • Protecting Yourself Against Cyber Crime
  • Summary
  • Introduction
  • DoS
  • Illustrating an Attack
  • Summary
  • Introduction
  • Viruses
  • Trojan Horses
  • The Buffer-Overflow Attack
  • The Sasser Virus/Buffer Overflow
  • Spyware
  • Other Forms of Malware
  • Detecting and Eliminating Viruses and Spyware
  • Summary
  • Introduction
  • Basic Terminology
  • The Reconnaissance Phase
  • Actual Attacks
  • Malware Creation
  • Penetration Testing
  • Summary
  • Introduction
  • What Is Industrial Espionage?
  • Information as an Asset
  • Real-World Examples of Industrial Espionage
  • How Does Espionage Occur?
  • Steganography Used in Industrial Espionage
  • Phone Taps and Bugs
  • Protecting Against Industrial Espionage
  • Industrial Espionage Act
  • Spear Phishing
  • Summary
  • Introduction
  • Cryptography Basics
  • History of Encryption
  • Modern Methods
  • Public Key (Asymmetric) Encryption
  • PGP
  • Legitimate Versus Fraudulent Encryption Methods
  • Digital Signatures
  • Hashing
  • MAC and HMAC
  • Steganography
  • Cryptanalysis
  • Cryptography Used on the Internet
  • Summary
  • Introduction
  • Virus Scanners
  • Firewalls
  • Antispyware
  • IDS
  • Digital Certificates
  • SSL/TLS
  • Virtual Private Networks
  • Wi-Fi Security
  • Summary
  • Introduction
  • What Is a Policy?
  • Defining User Policies
  • Defining System Administration Policies
  • Defining Access Control
  • Developmental Policies
  • Standards, Guidelines, and Procedures
  • Data Classification
  • Disaster Recovery
  • Important Laws
  • Summary
  • Introduction
  • Basics of Assessing a System
  • Securing Computer Systems
  • Scanning Your Network
  • Getting Professional Help
  • Summary
  • Introduction
  • Actual Cases of Cyber Terrorism
  • Weapons of Cyber Warfare
  • Economic Attacks
  • Military Operations Attacks
  • General Attacks
  • Supervisory Control and Data Acquisitions (SCADA)
  • Information Warfare
  • Actual Cases
  • Future Trends
  • Defense Against Cyber Terrorism
  • Terrorist Recruiting and Communication
  • TOR and the Dark Web
  • Summary
  • Introduction
  • General Searches
  • Court Records and Criminal Checks
  • Usenet
  • Summary
  • Introduction
  • General Guidelines
  • Finding Evidence on the PC
  • Finding Evidence in System Logs
  • Getting Back Deleted Files
  • Operating System Utilities
  • The Windows Registry
  • Mobile Forensics: Cell Phone Concepts
  • The Need for Forensic Certification
  • Expert Witnesses
  • Additional Types of Forensics
  • Summary
  • Module 1 Introduction
  • Lesson 1: Analyze Indicators of Compromise and Determine Malware
  • Lesson 2: Compare and Contrast Cyber Attacks
  • Lesson 3: Explain Threat Actors and Attributes
  • Lesson 4: Explain Penetration Testing
  • Lesson 5: Explain Vulnerability Scanning
  • Lesson 6: Explain the Impact of Vulnerabilities
  • Lesson 7: Install and Configure Network Components
  • Lesson 8: Assessing Security Posture
  • Lesson 9: Troubleshoot Common Security Issues
  • Lesson 10: Interpreting Output
  • Lesson 11: Deploy Mobile Devices Securely
  • Lesson 12: Implement Secure Protocols
  • Lesson 13: Explain Use Cases and Purpose of Frameworks, Configuration Guides, and Best Practices
  • Lesson 14: Implement Secure Network Architecture
  • Lesson 15: Implement Secure System Design
  • Lesson 16: Explain the Importance of Secure Staging and Deployment
  • Lesson 17: Explain the Security Implications of Embedded Systems
  • Lesson 18: Summarize Secure Application Development and Deployment Concepts
  • Lesson 19: Summarize Cloud and Virtualization Concepts
  • Lesson 20: Explain Risk Reducing Resiliency and Automation Strategies
  • Lesson 21: Explain the Importance of Physical Security Controls
  • Lesson 22: Compare and Contrast Identity and Access Management Concepts
  • Lesson 23: Install and Configure Identity and Access Services
  • Lesson 24: Implement Identity and Access Management Controls
  • Lesson 25: Differentiate Common Account Management Practices
  • Lesson 26: Explain the Importance of Policies, Plans and Procedures
  • Lesson 27: Summarize Business Impact Analysis Concepts
  • Lesson 28: Explain Risk Management Concepts
  • Lesson 29: Follow Incident Response Procedures
  • Lesson 30: Summarize the Basic Concepts of Forensics
  • Lesson 31: Explain Disaster Recovery and Continuity of Operations Concepts
  • Lesson 32: Compare and Contrast Controls
  • Lesson 33: Carry Out Data Security and Privacy Practices
  • Lesson 34: Compare and Contrast Basic Concepts of Cryptography
  • Lesson 35: Explain Cryptographic Algorithms and Their Basic Characteristics
  • Lesson 36: Install and Configure Wireless Security Standards
  • Lesson 37: Implement PKI
  • Lesson 38: Understanding the Security+ Exam Structure
  • Lesson 39: Test Taking Strategies
  • Lesson 40: The Week Leading Up to Your Exam
  • Lesson 41: What to Expect at the Testing Center
  • Lesson 42: Attaining and Maintaining Your Security+ Certification

Hands on Activities (Labs)

  • Creating a DoS attack scenario
  • Installing Trojan virus
  • Installing Cain & Abel
  • Using Cain & Abel
  • Using data encryption recovery agent
  • Encrypting and decrypting using CrypTool
  • Using AES encryption and decryption
  • Running and installing HashCalc
  • Installing and using MD5 calculator
  • Updating Windows Defender
  • Using anti-malware scanner
  • Configuring antivirus server application
  • Verifying Windows Firewall and examining inbound rules
  • Creating an inbound rule
  • Configuring Windows firewall settings
  • Installing an intrusion detection tool
  • Running snort tool
  • Rerunning Snort tool
  • Editing snort configuration file
  • Creating folder and rules file in snort folder
  • Requesting user certificates
  • Configuring IPSec
  • Managing SSL settings
  • Configuring connection security rules
  • Creating policy for guest account
  • Configuring password policy
  • Configuring Local Security Policy
  • Analyzing OWASP ZAP
  • Using netcat to verify network service
  • Scanning the PC for unsigned device drivers
  • Scanning the URI using Vega
  • Running Windows security related commands
  • Adding counters
  • Running the MBSA tool
  • Examining Computer Management
  • Creating account in Shodan
  • Managing cases using OSForensics
  • Configuring and scanning recent activity
  • Creating a drive image
  • Creating Index
  • Recovering deleted files
  • Managing services
  • Running the Windows commands
pearson-comp-sec-fund-complete pearson-comp-sec-fund-complete
pearson-comp-sec-fund-complete
Pearson Computer Security Fundamentals
ISBN : 9781616913656
Rating :
(16)