Course curriculum

    1. A message from the instructor Fawad Bacha

    2. How to use this course

    1. Short Warm-up Domain 1 Introduction

    2. Policies and Standards

    3. Guidelines, Procedures and Baselines

    4. Policies and Procedures Samples

    5. What is Security Frameworks

    6. Security Frameworks-What is ISO and IEC

    7. Intellectual property Laws- An Introduction to Intellectual Property Laws

    8. Intellectual property Laws- Trade Secret

    9. Intellectual property Laws- Copyright

    10. Intellectual property Laws- Trademark

    11. Intellectual property Laws - Patent

    12. Senior Management

    13. Data Breaches and Notifications

    14. Risk Managment-Organizational Risk Management Framework

    15. Risk Management-Conducting Risk Assessments

    16. Risk Management-Acceptable Level of Risk - Risk Management Options

    17. Risk Management-Risk Management Framework-RMF

    18. Risk Management-The Risk Management lifecycle

    19. Risk Management-Risk Analysis and Risk Registers

    20. Risk Management-Quantitative Risk Analysis

    21. Types of Attackers -Anonymous

    22. Types of Attacks and Hackers

    23. Security Threat Model -Attack Tree

    24. Security Threat Model and Methodology

    25. Disaster in 3 Categories

    26. Business Continuity Plan Part A

    27. Business Continuity Plan Part B

    28. Business Impact Analysis Part A

    29. Business Impact Analysis Part B

    30. Business Impact Analysis Part C

    31. Personnel Security

    32. Personnel Security 2

    33. Personnel Security - Hiring process

    34. Personnel Security - Onboarding

    35. Personnel Security Employee Termination and Security Awareness Training

    36. Ethics - CISSP Course

    37. Domain 1 Security and Risk Managment

    38. Quiz

    1. Subjects and Obejcts Access

    2. Information Life Cycle- Data Acquisition and Use

    3. Information Life Cycle- Data Archive and Disposal

    4. Data Classification Levels in Government

    5. Data Classification Levels in Private Sector

    6. Layers of Responsibility CEO CIO

    7. Layers of Responsibility Data Owner - Custodian and Security Admin

    8. Layers of Responsibility Auditor

    9. Privacy is different from Security

    10. Retention Policies

    11. Paper Records and Disposal

    12. Digital Records and Disposal

    13. Protecting Privacy

    14. Data Remanence

    15. Types of Memory

    16. Types of Safes

    17. Protecting Assets – Data Loss Prevention DLP

    18. Domain 2 Asset Security

    19. Quiz

    1. Short Intro of Domain 3

    2. System Architecture

    3. Computer Architecture and The Ring Model

    4. Motherboard

    5. Central Processing Unit CPU 1

    6. CPU Thread and Processing

    7. Buffer Overflow in Hardware and Software

    8. Operating Systems

    9. Virtualization

    10. Virtualization - Hypervisor

    11. System Security Architecture - Trusted Computing Base

    12. System Security Architecture - Security Perimeter

    13. System Security Architecture - Reference Monitor

    14. Security Models Fundamental Concepts

    15. Security Models - Bell–LaPadula Security Model

    16. Security Models Biba Security Model

    17. Security Models - Clark-Wilson and Non-interference Security Model

    18. Certification vs Accreditation

    19. Open vs Closed System

    20. Client Based - Mobile System Security

    21. Grid Computing and Peer to Peer Computer System

    22. Mobile Devices Threats and Security

    23. Cloud Computing

    24. Cloud Computing Amazon AWS Walk-Through

    25. IoT Embadded System

    26. Parallel Computing

    27. Industrial Control System - ICS Introduction

    28. Industrial Control System ICS Remote Terminal Unit RTU - Programmable Logic Controller PLC

    29. Distributed Control System DCS - SCADA

    30. SCADA Threats and Security

    31. SCADA Real Life Cyberattack

    32. What is Cryptography

    33. Timeline of Cryptography Part A

    34. Timeline of Cryptography Part B

    35. What is Cryptosystem and Algorithm

    36. One Time Passcode Types of Cipher and Steganography

    37. Symmetric Algorithm - DES

    38. Symmetric Algorithm - Brute Force Attack - 3 DES

    39. Symmetric Algorithm - AES

    40. Asymmetric Algorithm

    41. Introduction to Physical Security

    42. Physical Security and Alarm and Sensor system

    43. Front Desk Tailgating – Mantrap – Turnstiles

    44. Contraband Check

    45. Human or Dog Guard

    46. Dumpster Diving

    47. Video Surveillance System DVR NVR CCTV

    48. Lightning Security

    49. Fences Gates and Bollards

    50. Types of Locks

    51. Types of Smart Cards

    52. Facilities Selection and Construction Check Up

    53. Data Center

    54. Electricity Part 1

    55. Electricity Part 2

    56. Fire Part 1

    57. Fire Part 2

    58. Domain 3 - Security Architecture and Engineering

    59. Quiz

    1. Short Introductions Domain 4

    2. Network Basics and Definitions Part A

    3. Network Basics and Definitions Part B

    4. OSI Model

    5. TCP_IP Model and Real World Example

    6. TCP Further Discussion

    7. IPv4 and IPv6 Addresses

    8. IPv4 and IPv6 Addresses Real Life Example

    9. Types of Ports - Analog vs Digital Signal and Asynchronous & Synchronous

    10. Types of Cables

    11. FHSS-Frequency Hopping Spread Spectrum - DSSS-Direct Sequence Spread Spectrum

    12. Wireless Technology

    13. Wireless Technology

    14. Wireless Technology

    15. Bluetooth and its Attacks

    16. Best Practices for Securing WLANs

    17. Satellite Network

    18. Mobile Wireless Communication

    19. Types of Network Topologies

    20. CSMA ARP MAC_Media Access Control

    21. Dynamic Host Configuration Protocol - DHCP and ICMP

    22. Simple Network Management Protocol - SNMP

    23. Domain Name System - DNS

    24. DNS - Root Servers Around The World

    25. Simple Mail Transfer Protocol - SMTP POP3 IMAP

    26. Network Address Translation - NAT

    27. What are Routers, Hubs, Switches, Bridges

    28. What Private Branch Exchange System PBX and Phreaker - Phone Hackers

    29. What is Firewall and Types of Firewall

    30. What is Firewall and Types of Firewall

    31. What is Firewall and Types of Firewall

    32. What is a Proxy Server

    33. What is a Honeypot

    34. What is a VPN_ Virtual Private Network

    35. Quiz

    1. Introduction to Domain 5 Identity and Access Management

    2. Subject to Objects and Access Control

    3. Centralized and Decentralized Access Control

    4. Authentication Something You Know Part A

    5. Authentication Something You Know Part B

    6. Authentication Something You Have Type 2

    7. Authentication Something You Are Type 3

    8. Authorization Accountability and Auditing

    9. Identity Management System and Active Directory

    10. Single Sign On - SSO

    11. OAuth, SAML and Identity Provider

    12. Kerberos - The Network Authentication Protocol

    13. SESAME Authentication Protocol

    14. RADIUS, DIAMETE, PAP, CHAP Authentication Protocols

    15. Security Domain and Thin Clients

    16. Security Domain and Auditing

    17. Protecting Audit Logs and What is SIEM System

    18. Access Control Mechanism - MAC and DAC

    19. Access Control Mechanism - RBAC, ABAC and RB-RBAC

    20. Access Control Mechanism - TACACS and Radious

    21. Managing the Identity and Access Provisioning Life Cycle

    22. Controlling Physical and Logical Access

    23. Monitoring and Threats to Access Control

    24. How long does it takes to crack your password

    25. Domain 5 Summary

    26. Quiz

About this course

  • Free
  • 192 lessons
  • 34.5 hours of video content

Discover your potential, starting today