logo

Chapter 07 - Network and Application Security I - 12/25

Chapter 07 - Network and Application Security I - 12/25
Course content
Chapter Kick-off
Network & Application Security I Chapter Kick-off
Foundations of Defense Mechanisms
The CIA Triad
Privacy, Anonymity, and Pseudonymity
Security, Vulnerabilities, Threats, and Adversaries
Defense in Depth (DID)
The DID Model in Network Security
Zero Trust
Network Security Design
Threat Prevention
Threat Detection
Incident Response
Locking Down Your Network
Security Defense Appliances
Demilitarized Zones (DMZs)
Honeypots
Cryptography
Introduction to Cryptography
Cryptography in Cybersecurity
Encryption and Decryption
Goals and Services
Symmetric Key Cryptography
Asymmetric Key Cryptography
Asymmetric Key Cryptography: An Example
Types of Asymmetric Encryption
Ready, Set, Lab! - File Encryption/Decryption
What Is Hashing?
Use of Hashing
How Does a Hashing Algorithm Work?
Hashing Algorithm Example
Popular Hashing Algorithms
Ready, Set, Lab! - Hash Functions
LS: Hash Functions
Access Control
The Importance of Authentication
Single Factor Authentication
Two Factor Authentication
Multi Factor Authentication
Introduction
Lightweight Directory Access Protocol (LDAP)
Kerberos
NTLM
The Difference Between NTLM and Kerberos
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Active Directory - Tool Introduction
What Does Active Directory Do?
Active Directory's Hierarchical Structure
Ready, Set, Lab! - Windows Server Configuration
Ready, Set, Lab! - Creating & Managing AD Objects
Ready, Set, Lab! - Basic GPO Configuration
Chapter Closure
Network & Application Security I Quiz
10Questions

Teachers


TechDX