Module 01 – NETWORK CONCEPTS
- Workbook (Pdf)
- Overview
- Describe Network Models
- Describe Network Models Part 2
- Describe Network Models Part 3
- Describe Basic Networking Protocols
- Describe Basic Networking Protocols Part 2
- Describe Basic Networking Services
- Describe Basic Networking Services Part 2
- Describe Networking Devices Operations
- Describe Networking Devices Operations Part 2
- Describe Network Security Systems
- Describe Basic Network Addressing
- Describe Basic Network Addressing Part 2
- Describe VLANS And Data Visability
- Describe ACL Usage On Interfaces
- Describe ACL Usage On Interfaces Part 2
- Compare Different Filtering Methods
- Compare Packet Capture Methods
- Compare Packet Analysis Output
- Compare Packet Analysis Output Part 2
- Identify Traffic Loss From Packet Analysis
- Review Quiz (Number of attempts allowed: Unlimited)
Module 03 – CRYPTOGRAPHY
- Workbook (Pdf)
- Describe Crypto Algorithm Usage
- Describe Crypto Algorithm Usage Part 2
- Describe Digital Signature Creation
- Describe PKI Operations
- Describe Key Exchange Security
- Describe SSL TLS Components
- Describe SSL TLS Components Part 2
- Describe Hashing Algorithms
- Encryption Algorithms And Protocols
- Encryption Algorithms And Protocols Part 2
- Review Quiz (Number of attempts allowed: Unlimited)
Module 05 – SECURITY MONITORING
- Workbook (Pdf)
- Identify Data Types
- Identify Data Types Part 2
- Identify Data Types Part 3
- Describe NSM Data
- Describe Monitoring Context
- Describe Monitoring Context Part 2
- Describe NGIPS Events
- Monitor Protocols
- Monitor Protocols Part 2
- Review Quiz (Number of attempts allowed: Unlimited)
Module 02 – SECURITY CONCEPTS
- Workbook (Pdf)
- Describe Defense In Depth Principles
- Define Security Concepts And Terms
- Define Security Concepts And Terms Part 2
- Understand Access Control Models
- Compare Security Admin Terms
- Describe Security Management Concepts
- Review Quiz (Number of attempts allowed: Unlimited)
Module 04 – HOST-BASE ANALYSIS
- Workbook (Pdf)
- Define Windows Terms
- Define Linux Terms
- Define Linux Terms Part 2
- Describe Endpoint Security Monitoring
- Interpret OS Log Data
- Interpret OS Log Data Part 2
- Review Quiz (Number of attempts allowed: Unlimited)
Module 06 – ATTACK METHODS
- Workbook (Pdf)
- Describe Security Attack Concepts
- Describe Network And Web App Attacks
- Describe Network And Web App Attacks Part 2
- Describe Attacks And Evasion Methods
- Describe Attacks And Evasion Methods Part 2
- Review Quiz (Number of attempts allowed: Unlimited)