Operating System and Computer Security Systems Security

(WU-SEC6030.AB1)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Computer Security and Networks

  • How Seriously Should You Take Threats to Network Security?
  • Identifying Types of Threats
  • Assessing the Likelihood of an Attack on Your Network
  • Basic Security Terminology
  • Concepts and Approaches
  • How Do Legal Issues Impact Network Security?
  • Online Security Resources
  • Network Basics
  • How the Internet Works
  • History of the Internet
  • Basic Network Utilities
  • Other Network Devices
  • Advanced Network Communications Topics
  • Cloud Computing
2

Cyber Stalking, Fraud, Abuse and Denial of Service Attacks

  • How Internet Fraud Works
  • Identity Theft
  • Cyber Stalking
  • Protecting Yourself Against Cybercrime
  • DoS Attacks
  • Illustrating an Attack
  • Common Tools Used for DoS Attacks
  • DoS Weaknesses
  • Specific DoS Attacks
  • Real-World Examples of DoS Attacks
  • How to Defend Against DoS Attacks
3

Malware and Hackers Techniques

  • Viruses
  • Trojan Horses
  • The Buffer-Overflow Attack
  • Spyware
  • Other Forms of Malware
  • Detecting and Eliminating Viruses and Spyware
  • Basic Terminology
  • The Reconnaissance Phase
  • Actual Attacks
  • Malware Creation
  • Penetration Testing
  • The Dark Web
4

Industrial Espionage in Cyberspace and Encryption

  • What Is Industrial Espionage?
  • Information as an Asset
  • Real-World Examples of Industrial Espionage
  • How Does Espionage Occur?
  • Protecting Against Industrial Espionage
  • Trade Secrets
  • The Industrial Espionage Act
  • Spear Phishing
  • Cryptography Basics
  • History of Encryption
  • Modern Cryptography Methods
  • Public Key (Asymmetric) Encryption
  • PGP
  • Legitimate Versus Fraudulent Encryption Methods
  • Digital Signatures
  • Hashing
  • MAC and HMAC
  • Steganography
  • Cryptanalysis
  • Cryptography Used on the Internet
  • Quantum Computing Cryptography
5

Computer Security Policies and Vulnerability Scanning

  • Virus Scanners
  • Firewalls
  • Antispyware
  • IDSs
  • Digital Certificates
  • SSL/TLS
  • Virtual Private Networks
  • Wi-Fi Security
  • What Is a Policy?
  • Important Standards
  • Defining User Policies
  • Defining System Administration Policies
  • Security Breaches
  • Defining Access Control
  • Development Policies
  • Standards, Guidelines, and Procedures
  • Disaster Recovery
  • Zero Trust
  • Important Laws
  • Basics of Assessing a System
  • Securing Computer Systems
  • Scanning Your Network
  • Testing and Scanning Standards
  • Getting Professional Help
6

Cyber Terrorism and Detective

  • Actual Cases of Cyber Terrorism
  • Weapons of Cyber Warfare
  • Economic Attacks
  • Military Operations Attacks
  • General Attacks
  • Supervisory Control and Data Acquisitions (SCADA)
  • Information Warfare
  • Actual Cases of Cyber Terrorism
  • Future Trends
  • Defense Against Cyber Terrorism
  • Terrorist Recruiting and Communication
  • TOR and the Dark Web
  • General Searches
  • Company Searches
  • Court Records and Criminal Checks
  • Usenet
  • Google
  • Maltego
7

Forensics and Cybersecurity Engineering

  • General Guidelines
  • Finding Evidence on a PC
  • Finding Evidence in System Logs
  • Getting Back Deleted Files
  • Operating System Utilities
  • The Windows Registry
  • Mobile Forensics: Cell Phone Concepts
  • The Need for Forensic Certification
  • Expert Witnesses
  • Additional Types of Forensics
  • Defining Cybersecurity Engineering
  • Standards
  • SecML
  • Modeling

1

Computer Security and Networks

  • Using the tracert command
  • Using the ping Command
  • Using Routes
  • Using the netstat command
  • Using ARP
  • Using the ipconfig Command
  • Using the nslookup command for Passive Reconnaissance
2

Cyber Stalking, Fraud, Abuse and Denial of Service Attacks

  • Performing a Phishing Attack
  • Performing DoS Attacks with an SYN Flood
  • Performing a DHCP Starvation Attack
  • Simulating the DDoS Attack with an SYN Flood
  • Protecting Yourself from the DOS Attack
3

Malware and Hackers Techniques

  • Detecting Viruses using Windows Defender
  • Creating a RAT
  • Using eLiTeWrap
  • Using nmap for Network Enumeration
  • Cracking a Password Using the John the Ripper Tool
4

Industrial Espionage in Cyberspace and Encryption

  • Creating PGP Certification
  • Observing the SHA-Generated Hash Value
  • Using Rainbow Tables
  • Using Steganography
5

Computer Security Policies and Vulnerability Scanning

  • Configuring Snort
  • Configuring Iptables to Block ICMP Packets
  • Disabling a Service
  • Performing an MBSA Scan
6

Forensics and Cybersecurity Engineering

  • Observing the Security Event log
  • Using openfiles and net sessions
  • Using the fc command
  • Exporting the Registry Keys

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

We can Operating System and Computer Security Systems Security

$279.99

Buy Now

Related Courses

All Courses
scroll to top