Chapter Kick-off
Network & Application Security I Chapter Kick-off
Foundations of Defense Mechanisms
Privacy, Anonymity, and Pseudonymity
Security, Vulnerabilities, Threats, and Adversaries
The DID Model in Network Security
Locking Down Your Network
Security Defense Appliances
Demilitarized Zones (DMZs)
Cryptography
Introduction to Cryptography
Cryptography in Cybersecurity
Encryption and Decryption
Symmetric Key Cryptography
Asymmetric Key Cryptography
Asymmetric Key Cryptography: An Example
Types of Asymmetric Encryption
Ready, Set, Lab! - File Encryption/Decryption
How Does a Hashing Algorithm Work?
Hashing Algorithm Example
Popular Hashing Algorithms
Ready, Set, Lab! - Hash Functions
Access Control
The Importance of Authentication
Single Factor Authentication
Two Factor Authentication
Multi Factor Authentication
Lightweight Directory Access Protocol (LDAP)
The Difference Between NTLM and Kerberos
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Active Directory - Tool Introduction
What Does Active Directory Do?
Active Directory's Hierarchical Structure
Ready, Set, Lab! - Windows Server Configuration
Ready, Set, Lab! - Creating & Managing AD Objects
Ready, Set, Lab! - Basic GPO Configuration
Chapter Closure
Network & Application Security I Quiz
10Questions