Table of contents
Course Overview
1m 55s
Lock icon
Course Overview | 1m 55s
Implementing Secure Protocols
25m 50s
Lock icon
Intro | 50s
Lock icon
Network Protocols and TCP Three-Way Handshake | 3m 44s
Lock icon
Domain Name System Security Extensions (DNSSEC) | 3m 48s
Lock icon
Secure Shell (SSH) | 1m 17s
Lock icon
Secure/Multipurpose Internet Mail Extensions (SMIME) | 1m 2s
Lock icon
Secure Real Time Transport Protocol (SRTP) | 42s
Lock icon
Lightweight Directory Access Protocol Over SSL LDAPS | 58s
Lock icon
File Transfer Protocol (FTP) and Secure File Transfer Protocol (SFTP) | 1m 35s
Lock icon
Simple Network Management Protocol (SNMP) | 1m 15s
Lock icon
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) | 1m 2s
Lock icon
Hypertext Transfer Protocol Secure (HTTPS) | 1m 28s
Lock icon
Secure Post Office Protocol (POP) and Internet Messaging Access Protocol (IMAP) | 2m 53s
Lock icon
Use Cases | 4m 13s
Lock icon
Review | 1m 3s
Understanding Host or Application Security Solutions
51m 6s
Lock icon
Overview | 43s
Lock icon
Antivirus | 1m 16s
Lock icon
Endpoint Detection and Response | 2m 10s
Lock icon
Data Loss Prevention | 2m 24s
Lock icon
Next Generation Firewall | 1m 42s
Lock icon
Host-based Intrusion Detection System and Host-based Intrusion Prevention System | 59s
Lock icon
Host-based Firewall | 1m 30s
Lock icon
Boot Loader Protections and Secure Boot | 2m 31s
Lock icon
Measured Launch | 40s
Lock icon
Integrity Measurement Architecture (IMA) | 30s
Lock icon
Basic Input/Output System and Unified Extensible Firmware Interface | 36s
Lock icon
Hashing | 2m 12s
Lock icon
Salt | 1m 7s
Lock icon
Secure Coding Techniques | 6m 28s
Lock icon
Code Quality and Testing | 2m 47s
Lock icon
Static Code Analysis | 2m 9s
Lock icon
Fuzzing | 3m 36s
Lock icon
Additional Secure Coding Concepts | 1m 55s
Lock icon
Peripherals Security | 2m 24s
Lock icon
Hardening the Environment | 2m 26s
Lock icon
Common Ports | 1m 12s
Lock icon
Registry Hardening | 1m 32s
Lock icon
Self-Encrypting Drives (SED) | 2m 11s
Lock icon
Hardware Root of Trust | 1m 14s
Lock icon
Hardware Based Encryption | 2m 47s
Lock icon
Sandboxing | 2m 5s
Implementing Secure Network Designs Part 1
44m 58s
Lock icon
Overview | 48s
Lock icon
Load Balancers | 4m 13s
Lock icon
Security Segmentation Models | 2m 50s
Lock icon
Virtualization | 1m 15s
Lock icon
Air Gaps | 2m 4s
Lock icon
East West Traffic | 1m 52s
Lock icon
Zero Trust | 1m 44s
Lock icon
VPN | 4m 10s
Lock icon
Split Tunnel | 49s
Lock icon
IPSec and Transport Encryption | 1m 31s
Lock icon
VPN Concentrator | 1m 4s
Lock icon
Domain Name System Security Extensions (DNSSEC) | 3m 47s
Lock icon
Network Access Control | 2m 35s
Lock icon
In-Band vs Out-of-Band Management | 3m 58s
Lock icon
Port Security and 802.1x | 4m 2s
Lock icon
Loop Protection and Flood Guards | 2m 7s
Lock icon
Spanning Tree Protocol (STP) | 2m 41s
Lock icon
Dynamic Host Configuration Protocol (DHCP) Snooping | 1m 5s
Lock icon
MAC Filtering | 1m 56s
Lock icon
Review | 27s
Implementing Secure Network Designs Part 2
44m 39s
Lock icon
Overview | 44s
Lock icon
Jump Server | 2m 1s
Lock icon
Proxies | 3m 37s
Lock icon
Web Security Gateways | 1m 48s
Lock icon
Intrusion Detection and Prevention | 5m 53s
Lock icon
IDS vs IPS Component Workflow | 1m 19s
Lock icon
Four Approaches to IDS | 1m 54s
Lock icon
Network-based IDS | 2m 9s
Lock icon
Security Device Placement | 2m 26s
Lock icon
Firewalls | 6m 20s
Lock icon
Web Application Firewalls | 2m 13s
Lock icon
Unified Threat Management (UTM) | 1m 2s
Lock icon
Content Filters | 1m 2s
Lock icon
Implicit Deny and Access Control List | 40s
Lock icon
Route Security | 1m 36s
Lock icon
Quality of Service (QoS) | 1m 47s
Lock icon
Implications of IPv6 | 2m 20s
Lock icon
Port Mirroring, Port Spanning and Port Taps | 3m 6s
Lock icon
File Integrity Check | 2m 10s
Lock icon
Review | 32s
Installing and Configuring Wireless Security Settings
34m 44s
Lock icon
Overview | 37s
Lock icon
Wireless Definitions | 1m 58s
Lock icon
WEP, WPA, and WPA2 | 1m 27s
Lock icon
WPA and WPA2 Security | 3m 50s
Lock icon
WPA3 | 4m 9s
Lock icon
Wireless Security Examples | 1m 54s
Lock icon
Wireless Security and Pen Testing Tools | 2m 32s
Lock icon
EAP, PEAP, and LEAP | 2m 21s
Lock icon
802.1x Wireless Protocols | 2m 21s
Lock icon
Radius Federation | 27s
Lock icon
Wi-Fi Protected Setup | 57s
Lock icon
Captive Portal | 2m 6s
Lock icon
Installation Considerations | 1m 7s
Lock icon
Access Points Wi-Fi Security | 3m 41s
Lock icon
Band Selection Width | 1m 52s
Lock icon
Fat vs Thin Access and Stand-Alone vs Controller Based | 2m 55s
Lock icon
Review | 30s
Implementing Secure Mobile Solutions
40m 7s
Lock icon
Overview | 33s
Lock icon
Cellular | 7m 16s
Lock icon
Securing Wi-Fi | 1m 37s
Lock icon
Near Field Communication | 1m 18s
Lock icon
Additional Areas of Concern | 2m 26s
Lock icon
MicroSD Hardware Security Module | 54s
Lock icon
Mobile Device Management, Mobile Application Management, and Unified Endpoint Management | 1m 16s
Lock icon
Security Enhancements for Android | 1m 6s
Lock icon
Device Security | 4m 3s
Lock icon
Application Security and Key Credential Management | 2m 55s
Lock icon
Authentication | 1m 49s
Lock icon
Geo-Tagging | 1m 31s
Lock icon
Context Aware Authentication | 2m 5s
Lock icon
Enforcement and Monitoring | 4m 25s
Lock icon
BYOD Concerns and Deployment Models | 3m 41s
Lock icon
Additional BYOD Concerns | 2m 48s
Lock icon
Review | 24s
Applying Cybersecurity Solutions to the Cloud
34m 16s
Lock icon
Overview | 42s
Lock icon
High Availability | 2m 11s
Lock icon
Resource Policies | 1m 18s
Lock icon
Secrets Management | 2m 20s
Lock icon
Storage in the Cloud | 2m 50s
Lock icon
Virtual Networks | 2m 40s
Lock icon
API Inspection and Integration | 1m 35s
Lock icon
Growth of Enterprise Cloud Application | 1m 30s
Lock icon
Cyber Kill Chain in the Cloud | 3m 54s
Lock icon
Compute in the Cloud | 3m 41s
Lock icon
Cloud Access Security Broker | 56s
Lock icon
Application Security | 1m 4s
Lock icon
Next Gen Secure Web Gateway | 47s
Lock icon
Firewall Considerations in a Cloud Environment | 1m 57s
Lock icon
Transmission Control Protocol,Internet Protocol, and Open Systems Interconnection Models | 39s
Lock icon
Application Layer, Protocol Layer, and Volumetric Attacks | 2m 6s
Lock icon
Cost | 1m 14s
Lock icon
Cloud Native Controls vs Third Party Solutions | 2m 52s
Implementing Identity and Account Management Controls
33m 36s
Lock icon
Overview | 29s
Lock icon
Identity Provider | 1m 28s
Lock icon
Identity Provider Example | 1m 45s
Lock icon
Certificates, Tokens, and SSH Keys | 1m 31s
Lock icon
Certificate Issues | 2m 48s
Lock icon
Smart Cards | 56s
Lock icon
User Accounts | 1m
Lock icon
Account Management | 1m 59s
Lock icon
Password Complexity | 1m 19s
Lock icon
Password History | 1m 50s
Lock icon
Password Reuse | 1m 18s
Lock icon
Time of Day Restrictions | 55s
Lock icon
User Access Best Practices | 2m 26s
Lock icon
Permissions, Auditing, and Review | 1m 14s
Lock icon
Recertification | 1m 45s
Lock icon
Group Policy | 2m 18s
Lock icon
Expiration | 2m 29s
Lock icon
Recovery | 1m 39s
Lock icon
Impossible Travel Risky Login | 2m 23s
Lock icon
Lockout | 45s
Lock icon
Disablement | 50s
Lock icon
Review | 29s
Implementing Authentication and Authorization Solutions
38m 36s
Lock icon
Overview | 47s
Lock icon
Authentication Management | 3m 6s
Lock icon
Extensible Authentication Protocol | 49s
Lock icon
Challenge Handshake Authentication Protocol | 59s
Lock icon
Password Authentication Protocol | 55s
Lock icon
Port Security and 802.1x Authentication | 4m 2s
Lock icon
Remote Authentication Dial-In User Service (RADIUS) | 2m 41s
Lock icon
Single Sign On (SSO) | 1m 22s
Lock icon
Security Assertion Markup Language (SAML) | 2m 17s
Lock icon
Terminal Access Controller Access Control System (TACACS) | 1m 12s
Lock icon
TACACS+ | 2m 8s
Lock icon
OAuth | 1m 57s
Lock icon
OpenID and Shibboleth | 1m 25s
Lock icon
Kerberos | 3m 37s
Lock icon
Attribute Based Access Control | 2m 53s
Lock icon
Role-Based and Role-Based Access Control | 1m 37s
Lock icon
Access Control Methods | 1m 13s
Lock icon
Mandatory Access Control | 1m 2s
Lock icon
Discretionary Access Control | 46s
Lock icon
Conditional Access | 1m 12s
Lock icon
Privileged Accounts | 1m 5s
Lock icon
Filesystem Permissions | 1m 31s
Implementing Public Key Infrastructure
28m 23s
Lock icon
Overview | 36s
Lock icon
Certificate Authorities and Digital Certificates | 52s
Lock icon
Certificate Authority | 1m 55s
Lock icon
Certification Revocation List (CRL) | 1m 28s
Lock icon
Online Certificate Status Protocol | 1m 52s
Lock icon
Certificate Signing Request (CSR) and Public Key Cryptography Standards (PKCS) | 48s
Lock icon
Public Key Infrastructure | 3m 55s
Lock icon
Public Key | 1m 11s
Lock icon
Private Key | 40s
Lock icon
Object Identifiers (OID) | 1m 53s
Lock icon
Types of Certificates | 5m 8s
Lock icon
Certificate Formats | 1m 5s
Lock icon
Online vs Offline Certificate Authority | 1m 59s
Lock icon
Stapling and Pinning | 53s
Lock icon
Trust Models | 1m 46s
Lock icon
Key Escrow | 1m 18s
Lock icon
Certificate Chaining | 1m 4s
About the author
Christopher Rees
Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.
More Courses by Christopher R.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon