|
Lecture 30: Social engineering techniques
· Phishing
· Smishing
· Vishing
· Spam
· Spam over Internet messaging (SPIM)
· Spear phishing
· Dumpster diving
· Shoulder surfing
· Pharming
· Tailgating
· Eliciting information
· Whaling
· Prepending
· Identity fraud
· Invoice scams
· Credential harvesting
· Reconnaissance
· Hoax
· Impersonation
· Watering hole attack
· Typo squatting
· Pretexting
· Influence campaigns
· Principles (reasons for effectiveness)
· Practical Exercise
|
|
|
|
Lecture 31: Type of attack
· Malware
· Password attacks
· Adversarial artificial intelligence (AI)
· Physical attacks
· Supply-chain attacks
· Cloud-based vs. on-premises attacks
· Cryptographic attacks
· Practical Exercise
|
|
|
|
Lecture 32: Potential indicators associated with application attacks
· Privilege escalation
· Cross-site scripting
· Injections
· Pointer/object dereference
· Directory traversal
· Buffer overflows
· Race conditions
· Error handling
· Improper input handling
· Replay attack
· Integer overflow
· Request forgeries
· Application programming interface (API) attacks
· Resource exhaustion
· Memory leak
· Secure sockets layer (SSL) stripping
· Driver manipulation
· Pass the hash
· Practical Exercise
|
|
|
|
Lecture 33: Potential indicators associated with network attacks
· Wireless
· Man-in-the-browser
· Man-in-the-middle
· Layer 2 attacks
· Distributed denial-of-service (DDoS)
· Malicious code or script execution
· Domain name system (DNS)
· Practical Exercise
|
|
|
|
Lecture 34: Threat actors, vectors & intelligence sources
· Actors and threats
· Attributes of actors
· Vectors
· Threat intelligence sources
· Research sources
· Practical Exercise
|
|
|
|
Lecture 35: Security concerns associated with types of vulnerabilities
· Cloud-based vs. on-premises vulnerabilities
· Zero-day
· Weak configurations
· Third-party risks
· Improper or weak patch management
· Legacy platforms
· Impacts
· Practical Exercise
|
|
|
|
Lecture 36: Techniques used in security assessments
· Threat hunting
· Vulnerability scans
· Syslog/Security information and event management (SIEM)
· Security orchestration, automation, and response (SOAR)
· Practical Exercise
|
|
|
|
Lecture 37: Techniques used in penetration testing
· Penetration testing
· Passive and active reconnaissance
· Exercise types
· Practical Exercise
|
|
|
|
Lecture 38: Security concepts in an enterprise environment
· Configuration management
· Hardware security module (HSM)
· Deception and disruption
· Data sovereignty
· Data protection
· Geographical considerations
· Cloud access security broker (CASB)
· Response and recovery controls
· Secure Sockets Layer (SSL)
· Transport Layer Security (TLS) inspection
· Hashing
· API considerations
· Site resiliency
· Practical Exercise
|
|
|
|
Lecture 39: Virtualization & cloud computing concepts
· Cloud models
· Cloud service providers
· Managed service provider (MSP)
· Managed security service provider (MSSP)
· On-premises vs. off-premises
· Fog computing
· Edge computing
· Thin client
· Containers
· Microservices/API
· Infrastructure as code
· Serverless architecture
· Services integration
· Resource policies
· Transit gateway
· Virtualization
· Practical Exercise
|
|
|
|
Lecture 40: Secure application development, deployment, & automation concepts
· Environment
· Provisioning and deprovisioning
· Integrity measurement
· Secure coding techniques
· Open Web Application Security Project (OWASP)
· Software diversity
· Automation/scripting
· Elasticity
· Scalability
· Version control
· Practical Exercise
|
|
|
|
Lecture 41:Authentication & authorization design concepts
· Authentication methods
· Biometrics
· Multifactor authentication (MFA) factors and attributes
· Authentication, authorization, and accounting (AAA)
· Cloud vs. on-premises requirements
· Practical Exercise
|
|
|
|
Lecture 42: Implement cyber security resilience
· Redundancy
· Replication
· On-premises vs. cloud
· Backup types
· Non-persistence
· High availability
· Restoration order
· Diversity
· Practical Exercise
|
|
|
|
Lecture 43: Security implications of embedded & specialized systems
· Embedded systems
· Supervisory control & data acquisition(SCADA)
· Industrial control system (ICS)
· Internet of Things (IoT)
· Specialized
· Voice over IP (VoIP)
· Heating, ventilation, air conditioning (HVAC)
· Drones/AVs
· Multifunction printer (MFP)
· Real-time operating system (RTOS)
· Surveillance systems
· System on chip (SoC)
· Communication considerations
· Constraints
· Practical Exercise
|
|
|
|
Lecture 44: Physical security controls
· Bollards/barricades
· Mantraps
· Badges
· Alarms
· Signage
· Cameras
· Closed-circuit television (CCTV)
· Industrial camouflage
· Personnel
· Locks
· USB data blocker
· Lighting
· Fencing
· Fire suppression
· Sensors
· Drones/UAV
· Visitor logs
· Faraday cages
· Air gap
· Demilitarized zone (DMZ)
· Protected cable distribution
· Secure areas
· Secure data destruction
· Practical Exercise
|
|
|
|
Lecture 45: Basics of cryptographic concepts
· Digital signatures
· Key length
· Key stretching
· Salting
· Hashing
· Key exchange
· Elliptic-curve cryptography
· Perfect forward secrecy
· Quantum
· Post-quantum
· Ephemeral
· Modes of operation
· Blockchain
· Cipher suites
· Symmetric vs. asymmetric
· Lightweight cryptography
· Steganography
· Homomorphic encryption
· Common use cases
· Limitations
· Practical Exercise
|
|
|
|
Lecture 46: Implement secure protocols
· Protocols
· Use cases
· Practical Exercise
|
|
|
|
Lecture 47: Implement host or application security solutions
· Endpoint protection
· Boot integrity
· Database
· Application security
· Hardening
· Self-encrypting drive (SED)/ full-disk encryption (FDE)
· Hardware root of trust
· Trusted Platform Module (TPM)
· Sandboxing
· Practical Exercise
|
|
|
|
Lecture 48: Implement secure network designs
· Load balancing
· Out-of-band management
· Network segmentation
· Virtual private network (VPN)
· DNS
· Network access control (NAC)
· Port security
· Network appliances
· Access control list (ACL)
· Route security
· Quality of service (QoS)
· Implications of IPv6
· Port spanning/port mirroring
· Monitoring services
· File integrity monitors
· Practical Exercise
|
|
|
|
Lecture 49: Wireless security settings
· Cryptographic protocols
· Authentication protocols
· Methods
· Installation considerations
· Practical Exercise
|
|
|
|
Lecture 50: Secure mobile solutions
· Connection methods and receivers
· Mobile device management (MDM)
· Mobile devices
· Enforcement and monitoring
· Deployment models
· Practical Exercise
|
|
|
|
Lecture 51: Cyber security solutions to the cloud
· Cloud security controls
· Solutions
· Cloud native controls vs. third-party solutions
· Practical Exercise
|
|
|
|
Lecture 52: Identity & account management controls
· Identity
· Account types
· Account policies
· Practical Exercise
|
|
|
|
Lecture 53: Authentication and authorization solutions
· Authentication management
· Authentication
· Access control schemes
· Practical Exercise
|
|
|
|
Lecture 54: Public key infrastructure
· Public key infrastructure (PKI)
· Types of certificates
· Certificate formats
· Concepts
· Practical Exercise
|
|
|
|
Lecture 55: Appropriate tool to assess organizational security
· Network reconnaissance and discovery
· File manipulation
· Shell and script environments
· Packet capture and replay
· Forensics
· Exploitation frameworks
· Password crackers
· Data sanitization
· Practical Exercise
|
|
|
|
Lecture 56: Policies, processes, & procedures for incident response
· Incident response plans
· Incident response process
· Exercises
· Stakeholder management
· Attack frameworks
· Communication plan
· Disaster recovery plan
· Business continuity plan
· Continuity of operations planning (COOP)
· Incident response team
· Retention policies
· Practical Exercise
|
|
|
|
Lecture 57: Appropriate data sources to support an investigation
· Vulnerability scan output
· SIEM dashboards
· Log files
· syslog/rsyslog/syslog-ng
· journalctl
· nxlog
· Retention
· Bandwidth monitors
· Metadata
· Netflow/sflow
· Protocol analyzer output
· Practical Exercise
|
|
|
|
Lecture 58: Mitigation techniques or controls
· Reconfigure endpoint security solutions
· Isolation
· Containment
· Segmentation
· SOAR
· Practical Exercise
|
|
|
|
Lecture 59: Key aspects of digital forensics
· Documentation/evidence
· Acquisition
· On-premises vs. cloud
· Integrity
· Preservation
· E-discovery
· Data recovery
· Non-repudiation
· Strategic intelligence/counter intelligence
· Practical Exercise
|
|
|
|
Lecture 60: Types of controls
· Category
· Control type
· Practical Exercise
|
|
|
|
Lecture 61: Applicable regulations, standards, or framework
· Regulations, standards, and legislation
· Key frameworks
· Benchmarks /secure configuration guides
· Practical Exercise
|
|
|
|
Lecture 62: Importance of policies to organizational security
· Personnel
· Diversity of training techniques
· Third-party risk management
· Data
· Credential policies
· Organizational policies
· Practical Exercise
|
|
|
|
Lecture 63: Risk management processes & concepts
· Risk types
· Risk management strategies
· Risk analysis
· Disasters
· Business impact analysis
· Practical Exercise
|
|
|
|
Lecture 64: Privacy & sensitive data concepts
· Organizational consequences of privacy breaches
· Notifications of breaches
· Data types
· Privacy enhancing technologies
· Roles and responsibilities
· Information life cycle
· Impact assessment
· Terms of agreement
· Privacy notice
· Practical Exercise
|
|
|