CMGT433 - CyberSecurity

(UOP-CMGT433.AE2)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Instructor-Led (Add-on)
Get A Free Trial

Skills You’ll Get

Get the support you need. Enroll in our Instructor-Led Course.

1

Week 1 – Security Architecture and Infrastructure

  • The Cybersecurity Analyst+ Exam
  • Cybersecurity Objectives
  • Privacy vs. Security
  • Evaluating Security Risks
  • Building a Secure Network
  • Secure Endpoint Management
  • Penetration Testing
  • Reverse Engineering
  • Efficiency and Process Improvement
  • The Future of Cybersecurity Analytics
  • Infrastructure Concepts and Design
  • Operating System Concepts
  • Logging, Logs, and Log Ingestion
  • Network Architecture
  • Identity and Access Management
  • Federation
  • Encryption and Sensitive Data Protection
2

Week 2 – Threat Intelligence and Malicious Activity

  • Analyzing Network Events
  • Investigating Host-Related Issues
  • Investigating Service- and Application-Related Issues
  • Determining Malicious Activity Using Tools and Techniques
  • Threat Data and Intelligence
  • Threat Classification
  • Applying Threat Intelligence Organizationwide
  • Mapping, Enumeration, and Asset Discovery
  • Passive Discovery
3

Week 3 – Vulnerability Management

  • Identifying Vulnerability Management Requirements
  • Configuring and Executing Vulnerability Scans
  • Developing a Remediation Workflow
  • Overcoming Risks of Vulnerability Scanning
  • Vulnerability Assessment Tools
  • Reviewing and Interpreting Scan Reports
  • Validating Scan Results
  • Common Vulnerabilities
  • Analyzing Risk
  • Managing Risk
  • Implementing Security Controls
  • Threat Classification
  • Managing the Computing Environment
  • Software Assurance Best Practices
  • Designing and Coding for Security
  • Software Security Testing
  • Policies, Governance, and Service Level Objectives
4

Week 4 – Incident Detection and Response

  • Security Incidents
  • Phases of Incident Response
  • Building the Foundation for Incident Response
  • Creating an Incident Response Team
  • Classifying Incidents
  • Attack Frameworks
  • Indicators of Compromise
  • Investigating IoCs
  • Evidence Acquisition and Preservation
  • Containing the Damage
  • Incident Eradication and Recovery
  • Validating Data Integrity
  • Wrapping Up the Response
5

Week 5 – Reporting and Forensics

  • Vulnerability Management Reporting and Communication
  • Incident Response Reporting and Communication
  • Building a Forensics Capability
  • Understanding Forensic Software
  • Conducting Endpoint Forensics
  • Network Forensics
  • Cloud, Virtual, and Container Forensics
  • Post-Incident Activity and Evidence Acquisition
  • Forensic Investigation: An Example

1

Week 1 – Security Architecture and Infrastructure

  • Creating a Firewall Rule
  • Setting Up a Honeypot on Kali Linux
  • Installing Docker
  • Exporting the Windows File Registry
  • Installing the AD FS Role
  • Examining PKI Certificates
2

Week 2 – Threat Intelligence and Malicious Activity

  • Performing a DoS Attack with the SYN Flood
  • Confirming the Spoofing Attack in Wireshark
  • Examining Audited Events
  • Enabling Logging for Audited Objects
  • Using TCPdump to Capture Packets
  • Analyzing Malware Using Virustotal
  • Using the hping Program
  • Scanning the Local Network
  • Using Shodan to Find Webcams
3

Week 3 – Vulnerability Management

  • Using OWASP ZAP
  • Consulting a Vulnerability Database
  • Conducting Vulnerability Scanning Using Nessus
  • Using Nikto
  • Performing Session Hijacking Using Burp Suite
  • Exploiting LFI and RFI Vulnerabilities
  • Conducting CSRF Attacks
  • Defending Against a Buffer Overflow Attack
  • Performing a MITM Attack
  • Attacking a Website Using XSS Injection
4

Week 4 – Incident Detection and Response

  • Performing Incident Response Activities
  • Preparing and Performing Post-Incident Activities
  • Documenting and Communicating an Incident Response Report
  • Reviewing IoC and Threat Intelligence Sources
  • Creating a Forensic Image with FTK Imager
5

Week 5 – Reporting and Forensics

  • Using EnCase Imager
  • Observing an MD5-Generated Hash Value
  • Observing a SHA256-Generated Hash Value
  • Analyzing Forensics with Autopsy
  • Cracking Passwords Using Cain and Abel
  • Finding Hard Drives on the System
  • Completing the Chain of Custody

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

We can CMGT433 - CyberSecurity

$279.99

Buy Now

Related Courses

All Courses
scroll to top