Course Overview

Course Overview to be entered here

Course Curriculum

Course Content

  • Designing Secure Systems, Networks & Devices

    Preview
    • Lesson 01: Risk Management

      01:20:21Preview
      • 1.01 Defining Business Risk
        05:12
      • 1.02 Threat Actors Part 1
        04:37
      • 1.03 Threat Actors Part 2
        02:29
      • 1.04 Threat Intelligence
        10:49
      • 1.05 Risk Management Concepts
        07:18
      • 1.06 Security Controls
        09:13
      • 1.07 Risk Assessments and Treatments
        05:38
      • 1.08 Quantitative Risk Assessments
        06:31
      • 1.09 Qualitative Risk Assessments
        03:49
      • 1.10 Security and the Information Life Cycle
        08:58
      • 1.11 Data Destruction
        05:58
      • 1.12 Chapter 1 Exam Question Review
        01:46
      • 1.13 Wiping Disks with the dd Command Lab
        05:44
      • 1.14 Chapter 1 Ask Me Anything AMA
        02:19
    • Lesson 02: Testing Infrastructure

      40:07Preview
      • 2.01 Testing Infrastructure Overview
        04:37
      • 2.02 Social Engineering Attacks
        05:29
      • 2.03 Vulnerability Assessments
        08:49
      • 2.04 Penetration Testing
        09:35
      • 2.05 The Metasploit Framework
        07:58
      • 2.06 Chapter 12 Exam Question Review
        01:52
      • 2.07 Chapter 12 Ask Me Anything AMA
        01:47
    • Lesson 03: Business Security Impact

      01:51:00Preview
      • Introduction to Business Security
        05:59
      • Business Impact Analysis
        09:10
      • Data Types and Roles
        11:21
      • Personnel Risk and Policies
        10:17
      • Attestation
        03:18
      • Internal Audits and Assessments
        05:25
      • External Audits and Assessments
        06:18
      • Third Party Risk Management
        08:21
      • Agreement Types
        06:21
      • Change Management
        04:07
      • Technical Change Management
        07:03
      • What Is Automation and Orchestration
        03:46
      • Benefits of Automation and Orchestration
        02:53
      • Use Cases of Automation and Orchestration
        07:31
      • Other Considerations of Automation and Orchestration
        05:28
      • Putting It All Together
        06:06
      • Exploring the NIST Frameworks
        07:36
    • Lesson 05: Securing Individual Systems

      01:45:34Preview
      • Malware
        13:18
      • Weak Configurations
        11:28
      • Common Attacks
        09:00
      • Overflow Attacks
        05:51
      • Password Attacks
        07:58
      • Bots and Botnets
        06:09
      • Disk RAID Levels
        10:07
      • Securing Hardware
        10:56
      • Securing Endpoints
        08:51
      • Securing Data with Encryption
        06:27
      • Chapter 6 Exam Question Review
        02:25
      • Linux Software RAID Lab
        07:38
      • Secure Enclave Lab in macOS
        03:36
      • Chapter 6 Ask Me Anything AMA
        01:50
    • Lesson 04: Identity and Account Management

      01:20:48Preview
      • 4.01 Identification Authentication and Authorization
        07:54
      • 4.02 Enabling Multifactor Authentication
        04:43
      • 4.03 Authorization
        04:48
      • 4.04 Accounting
        05:21
      • 4.05 Authentication Methods
        14:00
      • 4.06 Access Control Schemes
        06:45
      • 4.07 Account Management
        12:57
      • 4.08 Network Authentication
        08:56
      • 4.09 Identity Management Systems
        05:50
      • 4.10 Chapter 4 Exam Question Review
        02:21
      • 4.11 Creating Linux Users and Groups Lab
        05:50
      • 4.12 Chapter 4 Ask Me Anything AMA
        01:23
    • Lesson 07: Securing Wireless LANs

      01:06:48Preview
      • Wi Fi Encryption Standards
        09:31
      • RFID NFC and Bluetooth
        06:39
      • Wi Fi Coverage and Performance
        08:11
      • Wi Fi Discovery and Attacks
        12:02
      • Cracking WPA2
        10:19
      • Wi Fi Hardening
        10:21
      • Chapter 8 Exam Question Review
        01:48
      • WPA2 Cracking Lab
        06:34
      • Chapter 8 Ask Me Anything AMA
        01:23
    • Lesson 08: Securing Dedicated and Mobile Systems

      01:04:02Preview
      • Embedded Systems
        12:59
      • Industrial Control System ICS
        06:38
      • Internet of Things IoT Devices
        10:00
      • Connecting to Dedicated and Mobile Systems
        10:45
      • Security Constraints for Dedicated Systems
        05:04
      • Mobile Device Deployment and Hardening
        10:59
      • Chapter 10 Exam Question Review
        02:39
      • Smartphone Hardening Lab
        02:38
      • Chapter 10 Ask Me Anything AMA
        02:20
    • Lesson 06: Securing The Basic LAN

      03:53:45Preview
      • Data Protection
        09:28
      • Cryptographic Methods
        07:10
      • Symmetric Cryptosystems
        12:35
      • Symmetric Block Modes
        08:02
      • Asymmetric Cryptosystems
        12:41
      • Understanding Digital Certificates
        07:35
      • Trust Models
        04:42
      • Public Key Infrastructure
        03:28
      • Touring Certificates
        07:58
      • Network Architecture Planning
        03:38
      • The OSI Model
        12:37
      • ARP Cache Poisoning
        08:37
      • Other Layer 2 Attacks
        05:13
      • Network Planning
        07:00
      • Zero Trust Network Access ZTNA 20
        09:38
      • Load Balancing
        06:08
      • Securing Network Access
        06:14
      • Honeypots
        05:58
      • Static and Dynamic Code Analysis
        04:41
      • Firewalls
        11:15
      • Proxy Servers
        06:09
      • Web Filtering
        05:13
      • Network and Port Address Translation
        06:44
      • IP Security IPsec
        08:47
      • SD WAN and SASE
        03:04
      • Virtual Private Networks VPNs
        09:55
      • Intrusion Detection and Prevention Systems IDS IPS
        12:56
      • Chapter 7 Exam Question Review
        03:31
      • Linux Snort IDS Lab
        07:26
      • Chapter 7 Ask Me Anything AMA
        01:19
      • Securing The Basic LAN 8.9 Certificate Types
        14:03
    • Lesson 09: Securing Virtual and Cloud Environments

      01:08:41Preview
      • Defending a Public Server
        00:51
      • Common Attacks and Mitigations
        09:41
      • DDoS Attacks in the Real World
        02:40
      • Containers and Software Defined Networking
        11:22
      • Hypervisors and Virtual Machines
        08:18
      • Cloud Deployment Models
        08:40
      • Cloud Service Models
        08:21
      • Securing the Cloud
        10:11
      • Chapter 9 Exam Question Review
        02:17
      • Docker Container Lab
        04:14
      • Chapter 9 Ask Me Anything AMA
        02:06
    • Lesson 10: Dealing with Incidents

      46:28Preview
      • Incident Response Overview
        03:05
      • Incident Response Plans IRPs
        05:52
      • IRP Testing
        05:45
      • Threat Analysis and Mitigating Actions
        07:32
      • Digital Forensics
        05:05
      • Business Continuity and Alternate Sites
        06:08
      • Data Backup
        09:37
      • Chapter 14 Exam Question Review
        01:05
      • Chapter 14 Ask Me Anything AMA
        02:19

Why Join this Program

  • Develop skills for real career growthCutting-edge curriculum designed in guidance with industry and academia to develop job-ready skills
  • Learn from experts active in their field, not out-of-touch trainersLeading practitioners who bring current best practices and case studies to sessions that fit into your work schedule.
  • Learn by working on real-world problemsCapstone projects involving real world data sets with virtual labs for hands-on learning
  • Structured guidance ensuring learning never stops24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts
  • Acknowledgement
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, OPM3 and the PMI ATP seal are the registered marks of the Project Management Institute, Inc.