Table of contents
Course Overview
1m 51s
Lock icon
Course Overview | 1m 51s
Understanding Security Concepts in an Enterprise Environment
47m 5s
Lock icon
Module Intro | 1m 32s
Lock icon
Configuration Management | 3m 44s
Lock icon
Diagrams | 1m 10s
Lock icon
Baseline Configuration | 2m
Lock icon
IP Address Schema | 2m 17s
Lock icon
Data Sovereignty | 1m 29s
Lock icon
Data Loss Prevention (DLP) | 2m 27s
Lock icon
Types of Data to Secure | 1m 22s
Lock icon
Data Masking | 4m 20s
Lock icon
Tokenization | 2m 18s
Lock icon
Digital Rights Management (DRM) | 1m 2s
Lock icon
Hardware Based Encryption (TPM and HSM) | 1m 28s
Lock icon
Geographical Considerations | 1m 31s
Lock icon
Cloud Access Security Broker (CASB) | 1m 7s
Lock icon
Security-as-a-Service (SECaaS) | 1m 6s
Lock icon
Differences between CASB and SECaaS | 1m 7s
Lock icon
Recovery | 1m 34s
Lock icon
Secure Protocols and SSL/TLS Inspection | 1m 40s
Lock icon
Hashing | 1m 45s
Lock icon
API Considerations and API Gateways | 2m 11s
Lock icon
Recovery Site Options (Cold, Warm, Hot, and Cloud-based Sites) | 3m
Lock icon
Disaster Area Example | 1m 41s
Lock icon
Honeypots and Honeyfiles | 1m
Lock icon
Honeynets | 1m
Lock icon
Fake Telemetry | 1m 16s
Lock icon
DNS Sinkhole | 1m 58s
Understanding Virtualization and Cloud Computing
50m 37s
Lock icon
Module Intro | 47s
Lock icon
Cloud Storage | 2m 23s
Lock icon
Cloud Computing | 1m 40s
Lock icon
"X" as a Service | 38s
Lock icon
Infrastructure as a Service (IaaS) | 1m 42s
Lock icon
IaaS and Automation | 1m 31s
Lock icon
Platform as a Service (PaaS) | 1m 51s
Lock icon
Software as a Service (SaaS) | 1m 12s
Lock icon
IaaS, PaaS, and SaaS Differentiators | 58s
Lock icon
Types of Clouds | 58s
Lock icon
Managed Service Providers (MSP) | 4m 21s
Lock icon
Fog Computing | 2m 42s
Lock icon
Edge Computing | 32s
Lock icon
VDI | 4m 10s
Lock icon
Virtualization | 4m 10s
Lock icon
Containers | 5m 54s
Lock icon
Microservices and APIs | 3m 47s
Lock icon
Infrastructure as Code (IAC) | 48s
Lock icon
Software Defined Networking (SDN) | 1m
Lock icon
Software Defined Visibility (SDV) | 43s
Lock icon
Serverless Architecture | 1m 48s
Lock icon
IaaS, PaaS, FaaS, and SaaS Differentiators | 59s
Lock icon
Service Integrations and Resource Policies | 1m 31s
Lock icon
Transit Gateway | 44s
Lock icon
VM Sprawl Avoidance | 1m 42s
Lock icon
VM Escape | 1m 29s
Lock icon
Module Review | 37s
Implementing Secure Application Development, Deployment, and Automation
32m 53s
Lock icon
Module Intro | 56s
Lock icon
Environments (Dev, Test, Staging, and Production) | 3m 31s
Lock icon
Environment Example | 2m 13s
Lock icon
Provisioning and Deprovisioning | 2m 21s
Lock icon
Integrity Measurement | 1m 52s
Lock icon
Static Code Analysis | 2m 9s
Lock icon
Secure Coding Techniques | 6m 28s
Lock icon
Security Automation | 2m 26s
Lock icon
Continuous Monitoring and Validation | 1m 23s
Lock icon
Continuous Integration | 1m 41s
Lock icon
Continuous Delivery and Continuous Development | 2m 6s
Lock icon
OWASP | 35s
Lock icon
Software Diversity, Compiler, and Binary | 1m 33s
Lock icon
Elasticity and Scalability | 1m 8s
Lock icon
Version Control | 2m 31s
Understanding Authentication and Authorizations Methods
31m 35s
Lock icon
Module Intro | 47s
Lock icon
Directory Services | 1m 46s
Lock icon
Usernames | 55s
Lock icon
Federation | 59s
Lock icon
Transitive Trust / Authentication | 1m 12s
Lock icon
Attestation | 41s
Lock icon
Time-Based One-Time Password (TOTP) | 1m 32s
Lock icon
HMAC-Based One-Time Password (HOTP) | 48s
Lock icon
SMS Authentication | 57s
Lock icon
Tokens | 1m 9s
Lock icon
Static Codes | 45s
Lock icon
Authentication Applications | 1m 1s
Lock icon
Push Notifications | 57s
Lock icon
Smart Cards | 59s
Lock icon
Proximity Cards | 1m 20s
Lock icon
Personal Identification Verification Card (PIV) | 46s
Lock icon
Common Access Card | 45s
Lock icon
Biometric Factors | 1m 4s
Lock icon
Facial Recognition | 1m 32s
Lock icon
Vein and Gait Analysis | 1m 39s
Lock icon
Efficacy Rates | 1m 9s
Lock icon
Identification vs. Authentication vs. Authorization | 1m 13s
Lock icon
Multifactor Authentication | 1m 5s
Lock icon
Authentication Factors | 1m 7s
Lock icon
Authorization | 59s
Lock icon
Authentication Factors | 1m 7s
Lock icon
Authentication, Authorization, and Accounting (AAA) | 45s
Lock icon
On-prem vs. Cloud Requirements | 2m 36s
Implementing Cybersecurity Resilience
36m 50s
Lock icon
Module Intro | 2m 14s
Lock icon
Geographically Disperse | 47s
Lock icon
Geographical Dispersal of Assets | 1m 14s
Lock icon
RAID | 2m 49s
Lock icon
Multipath | 2m 7s
Lock icon
Load Balancer | 1m 8s
Lock icon
Power Resiliency | 1m 58s
Lock icon
Replication | 1m 53s
Lock icon
On-prem vs. Cloud | 1m 35s
Lock icon
Backup Plans / Policies | 1m 5s
Lock icon
Backup Execution / Frequency | 1m 11s
Lock icon
Backup Types | 3m 15s
Lock icon
Backup Environments | 1m 18s
Lock icon
Online vs. Offline Backups | 1m 28s
Lock icon
Backups - Distance Considerations | 2m 2s
Lock icon
Non-persistence, Snapshots, and Live Boot Media | 2m 3s
Lock icon
High Availability | 2m 15s
Lock icon
Redundancy | 1m 35s
Lock icon
Fault Tolerant Hardware | 46s
Lock icon
Technology and Vendor Diversity | 1m 35s
Lock icon
Crypto and Control Diversity | 2m 32s
Recognizing Security Implications of Embedded and Specialized Systems
36m 55s
Lock icon
Module Intro | 1m 10s
Lock icon
Module Goal | 1m 18s
Lock icon
Embedded Systems | 55s
Lock icon
Embedded Systems Examples | 1m 42s
Lock icon
SCADA / ICS | 4m 12s
Lock icon
SCADA Security Concerns | 2m 54s
Lock icon
Smart Devices / IoT | 2m 9s
Lock icon
Smart Devices / IoT Weak Defaults | 1m 1s
Lock icon
Special Purpose Devices | 1m 2s
Lock icon
Vehicles | 1m 28s
Lock icon
Voice over IP (VoIP) | 2m 10s
Lock icon
HVAC | 2m 27s
Lock icon
Aircraft/UAV | 1m 45s
Lock icon
Printers/MFDs | 2m 3s
Lock icon
Real Time Operating Systems (RTOS) | 51s
Lock icon
Surveillance Systems | 1m 33s
Lock icon
System on a Chip (SoC) | 1m 10s
Lock icon
5G Networks and Security Concerns | 1m 32s
Lock icon
Narrow-band and Baseband Radio | 43s
Lock icon
Zigbee | 2m 25s
Lock icon
Constraints | 2m 25s
Understanding the Importance of Physical Security Controls
47m 27s
Lock icon
Module Intro | 47s
Lock icon
Barricades | 1m 4s
Lock icon
Mantraps | 43s
Lock icon
Badges | 1m 47s
Lock icon
Alarms | 1m 31s
Lock icon
Lighting and Signs | 1m 39s
Lock icon
Cameras and Video Surveillance | 1m 33s
Lock icon
Guards | 41s
Lock icon
Robot Sentries | 1m 20s
Lock icon
Reception | 45s
Lock icon
Two Person Integrity (TPI) / Control | 44s
Lock icon
Hardware Locks | 48s
Lock icon
Biometrics | 52s
Lock icon
Cable Locks, Safes, and Locking Cabinets | 1m 20s
Lock icon
USB Data Blocker | 1m 10s
Lock icon
Fencing | 1m 27s
Lock icon
Fire Suppression | 2m 52s
Lock icon
Motion Detection / Infrared | 48s
Lock icon
Proximity Readers | 1m 8s
Lock icon
Drones / UAV | 55s
Lock icon
Logs | 47s
Lock icon
Air Gaps | 3m 10s
Lock icon
Demilitarized Zone (DMZ) | 4m 6s
Lock icon
Protected Distribution System (PDS) | 4m 1s
Lock icon
Hot and Cold Aisles | 2m 33s
Lock icon
Non-Digital and Digital Data Destruction | 1m 28s
Lock icon
Shredding | 50s
Lock icon
Pulping and Pulverizing | 1m 18s
Lock icon
Deguassing | 1m 33s
Lock icon
Purging | 40s
Lock icon
Wiping | 2m 31s
Lock icon
Module Review | 36s
Understanding the Basics of Cryptographic Concepts
56m 59s
Lock icon
Module Intro | 41s
Lock icon
Why You Should Care | 48s
Lock icon
Cryptographic Terminology and History | 3m 32s
Lock icon
Vigenere Table | 3m 22s
Lock icon
Digital Signatures | 1m 25s
Lock icon
Key Stretching | 3m 24s
Lock icon
Hashing | 2m 12s
Lock icon
In-band vs. Out-of-band Key Exchange | 1m 28s
Lock icon
Elliptic Curve Cryptography (ECC) | 1m 10s
Lock icon
Perfect Forward Secrecy | 1m 9s
Lock icon
Quantum Communications | 3m 15s
Lock icon
Quantum Computing | 1m 17s
Lock icon
Post Quantum | 1m 2s
Lock icon
Ephemeral Key | 42s
Lock icon
Cipher Modes | 38s
Lock icon
XOR Function | 1m 6s
Lock icon
Cryptographic Methods and Design | 3m 41s
Lock icon
Blockchain | 3m 58s
Lock icon
Fundamental Differences and Encryption Methods | 2m 24s
Lock icon
Session Keys | 54s
Lock icon
Asymmetric Encryption | 3m 28s
Lock icon
Lightweight Encryption | 53s
Lock icon
Steganography | 2m 14s
Lock icon
Homomorphic Encryption | 2m 3s
Lock icon
Common Use Cases | 3m 45s
Lock icon
Cipher Suites | 1m 47s
Lock icon
Limitations | 2m 25s
Lock icon
Random and Pseudorandom Number Generators (PRNG) | 1m 10s
Lock icon
Quantum Random Number Generators (QRNG) | 1m 6s
About the author
Christopher Rees
Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.
More Courses by Christopher R.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon