Information Systems Security

(UOP-CMGT431.AE2)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Week 1 - Security Governance and Risk

  • Security 101
  • Understand and Apply Security Concepts
  • Security Boundaries
  • Evaluate and Apply Security Governance Principles
  • Manage the Security Function
  • Security Policy, Standards, Procedures, and Guidelines
  • Threat Modeling
  • Supply Chain Risk Management
  • Personnel Security Policies and Procedures
  • Understand and Apply Risk Management Concepts
  • Social Engineering
  • Establish and Maintain a Security Awareness, Education, and Training Program
  • Planning for Business Continuity
  • Project Scope and Planning
  • Business Impact Analysis
  • Continuity Planning
  • Plan Approval and Implementation
  • Categories of Laws
  • Laws
  • State Privacy Laws
  • Compliance
  • Contracting and Procurement
  • Identifying and Classifying Information and Assets
  • Establishing Information and Asset Handling Requirements
  • Data Protection Methods
  • Understanding Data Roles
  • Using Security Baselines
2

Week 2 - Security Architecture and Engineering

  • Cryptographic Foundations
  • Modern Cryptography
  • Symmetric Cryptography
  • Cryptographic Life Cycle
  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Hybrid Cryptography
  • Applied Cryptography
  • Cryptographic Attacks
  • Secure Design Principles
  • Techniques for Ensuring CIA
  • Understand the Fundamental Concepts of Security Models
  • Select Controls Based on Systems Security Requirements
  • Understand Security Capabilities of Information Systems
  • Apply Security Principles to Site and Facility Design
  • Implement Site and Facility Security Controls
  • Implement and Manage Physical Security
3

Week 3 - Network Security and Identity Management

  • OSI Model
  • TCP/IP Model
  • Analyzing Network Traffic
  • Common Application Layer Protocols
  • Transport Layer Protocols
  • Domain Name System
  • Internet Protocol (IP) Networking
  • ARP Concerns
  • Secure Communication Protocols
  • Implications of Multilayer Protocols
  • Segmentation
  • Edge Networks
  • Wireless Networks
  • Satellite Communications
  • Cellular Networks
  • Content Distribution Networks (CDNs)
  • Secure Network Components
  • Protocol Security Mechanisms
  • Secure Voice Communications
  • Remote Access Security Management
  • Multimedia Collaboration
  • Monitoring and Management
  • Load Balancing
  • Manage Email Security
  • Virtual Private Network
  • Switching and Virtual LANs
  • Network Address Translation
  • Third-Party Connectivity
  • Switching Technologies
  • WAN Technologies
  • Fiber-Optic Links
  • Prevent or Mitigate Network Attacks
  • Controlling Access to Assets
  • The AAA Model
  • Implementing Identity Management
  • Managing the Identity and Access Provisioning Life Cycle
  • Comparing Access Control Models
  • Implementing Authentication Systems
  • Zero-Trust Access Policy Enforcement
  • Understanding Access Control Attacks
4

Week 4 - Security Assessment and Threats

  • Shared Responsibility
  • Data Localization and Data Sovereignty
  • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Client-Based Systems
  • Server-Based Systems
  • Industrial Control Systems
  • Distributed Systems
  • High-Performance Computing (HPC) Systems
  • Real-Time Operating Systems
  • Internet of Things
  • Edge and Fog Computing
  • Embedded Devices and Cyber-Physical Systems
  • Microservices
  • Infrastructure as Code
  • Immutable Architecture
  • Virtualized Systems
  • Containerization
  • Mobile Devices
  • Essential Security Protection Mechanisms
  • Common Security Architecture Flaws and Issues
  • Building a Security Assessment and Testing Program
  • Performing Vulnerability Assessments
  • Testing Your Software
  • Training and Exercises
  • Implementing Security Management Processes and Collecting Security Process Data
  • Introducing Systems Development Controls
  • Establishing Databases and Data Warehousing
  • Storage Threats
  • Understanding Knowledge-Based Systems
  • Malware
  • Malware Prevention
  • Application Attacks
  • Injection Vulnerabilities
  • Exploiting Authorization Vulnerabilities
  • Exploiting Web Application Vulnerabilities
  • Application Security Controls
  • Secure Coding Practices
5

Week 5 - Security Operations and Resilience

  • Apply Foundational Security Operations Concepts
  • Address Personnel Safety and Security
  • Provision Information and Assets Securely
  • Apply Resource Protection
  • Managed Services in the Cloud
  • Perform Configuration Management (CM)
  • Manage Change
  • Manage Patches and Reduce Vulnerabilities
  • Conducting Incident Management
  • Implementing Detection and Preventive Measures
  • Logging and Monitoring
  • Automating Incident Response
  • The Nature of Disaster
  • Understand System Resilience, High Availability, and Fault Tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing and Maintenance
  • Investigations
  • Major Categories of Computer Crime
  • Ethics

1

Week 1 - Security Governance and Risk

  • Encrypting a Disk
  • Encrypting a Folder
  • Performing a Social Engineering Attack
2

Week 2 - Security Architecture and Engineering

  • Using a Digital Signature
  • Using Symmetric Encryption
  • Using OpenSSL to Create a Public/Private Key Pair
  • Observing an MD5-Generated Hash Value
  • Observing an SHA-256-Generated Hash Value
  • Examining PKI Certificates
  • Hiding Text Using Steganography
  • Using SSH Login
  • Implementing PGP for Secure Email and File Encryption
  • Protecting a Computer Using a UPS
  • Setting Up a Surge-Protected Computer System
  • Implementing Physical Security
3

Week 3 - Network Security and Identity Management

  • Using Windows Defender Firewall
  • Configuring IPSec
  • Configuring a VPN Connection
  • Configuring VLANs
  • Configuring Static NAT
  • Configuring Dynamic NAT
  • Enforcing a Password Policy
  • Resetting an Account Password
  • Exploiting LDAP-Based Authentication
  • Restricting Local Accounts
  • Assigning Permissions to a Folder
  • Examining Kerberos Settings
  • Using a Rainbow Table
  • Performing ARP Spoofing
  • Simulating an Eavesdropping Attack Using Wireshark
4

Week 4 - Security Assessment and Threats

  • Installing RAM in a Laptop
  • Setting a Secure Passcode on an iPhone
  • Detecting Rootkits
  • Configuring Audit Group Policy
  • Using Nmap for Scanning
  • Conducting Vulnerability Scanning Using Nessus
  • Exploiting Windows 7 Using Metasploit
  • Scanning Ports Using Metasploit
  • Using the curl Command
  • Exploiting a Website Using SQL Injection
  • Attacking a Website Using XSS Injection
  • Conducting a CSRF Attack
5

Week 5 - Security Operations and Resilience

  • Configuring Windows Update
  • Enabling Intrusion Prevention and Detection
  • Performing a DoS Attack with a SYN Flood
  • Taking a Full Backup
  • Taking an Incremental Backup
  • Using Volatility for Memory Forensic Analysis
  • Analyzing Digital Evidence with Autopsy

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

We can Information Systems Security

$279.99

Buy Now

Related Courses

All Courses
scroll to top