SEC401: Security Essentials: Network, Endpoint, and Cloud
SECTION 1: Network Security & Cloud Essentials A typical way attackers gain access to a company’s resources is through a network connected to the Internet. Organizations try to prevent as many attacks as possible, but since not all attacks will ultimately be prevented, they must be detected in a timely manner. Therefore, an understanding of and ability to create and identify the goals of building a defensible network architecture are critical. A defensible network would not be complete without an in-depth understanding of what the cloud is and, more importantly, the security abilities (and related concerns) of the cloud that must also be taken into account. It is just as important to know and understand the architecture of the system, types of designs, communication flow and how to protect against attacks using devices such as routers and firewalls. These essentials, and more, will be covered in this first section in order to provide a firm foundation for the consecutive sections of training. TOPICS: Defensible Network Architecture; Protocols and Packet Analysis; Virtualization and Cloud Essentials; Securing Wireless Networks.
SECTION 2: Defense-in-Depth This course section looks at the “big picture” threats to our systems and how to defend against them. You will learn that protections need to be layered, leveraging a principle called defense-in-depth. Starting with information assurance foundations, we will move into identity and access management (IAM), then progress to modern security controls that work in the presence of an adversary and conclude with the benefits (and security risks) of mobile devices ranging from Bring Your Own Device (BYOD) to Mobile Device Management (MDM). TOPICS: Defense-in-Depth; Identity and Access Management (IAM); Critical Controls; Authentication and Password Security; Security Frameworks; Data Loss Prevention; Mobile Device Security.
SECTION 3: Vulnerability Management and Response Vulnerabilities represent weaknesses that adversaries exploit. In this section you will discover various areas where vulnerabilities arise. The section begins with vulnerability assessments and penetration testing, then move into attack methodologies and conclude with how to create a proper response plan. TOPICS: Vulnerability Assessments; Penetration Testing; Attacks and Malicious Software; Web Application Security; Security Operations and Log Management; Digital Forensics and Incident Response.
SECTION 4: Data Security Technologies There is no silver bullet when it comes to security. However, there is one technology that would help solve a lot of security issues, though few companies deploy it correctly. This technology is cryptography. Concealing the meaning of a message can prevent unauthorized parties from reading sensitive information. This course section looks at various aspects of encryption and how it can be used to secure a company’s assets. A related area called steganography, or information hiding, is also covered. TOPICS: Cryptography; Cryptography Algorithms and Deployment; Applying Cryptography; Network Security Devices; Endpoint Security.
SECTION 5: Windows and Azure Security Remember when Windows was simple? Windows XP desktops in a little workgroup…what could be easier? A lot has changed over time. Now, we have Windows tablets, Azure, Active Directory, PowerShell, Office 365, Hyper-V, Virtual Desktop Infrastructure (VDI), and so on. Microsoft is battling Google, Apple, Amazon.com, and other cloud giants for supremacy. The trick is to do it securely, of course. Windows is the most widelyused and targeted operating system on the planet. At the same time, the complexities of Active Directory, Public Key Infrastructure, BitLocker, AppLocker, and User Account Control represent both challenges and opportunities. This section will help you quickly master the world of Windows security while showing you the tools that can simplify and automate your work. You will complete the section with a solid grounding in Windows security by looking at automation, auditing and forensics. TOPICS: Windows Security Infrastructure; Windows as a Service; Windows Access Controls; Enforcing Security Policy; Microsoft Cloud Computing; Automation, Logging, and Auditing.
SECTION 6: Linux, Mac and Smartphone Security While organizations do not have as many Linux systems, those that they do have are often some of the most critical systems that need to be protected. This final section focuses on the practical guidance necessary to improve the security of any Linux system. The day combines practical “how to” instructions with background information for Linux beginners, as well as security advice and best practices for administrators with various levels of expertise. You will learn what containers are, what they do and best practices for their management. Next you will learn about Linux and UNIX concepts, discuss AWS in relation to Microsoft Azure and end the course with a through review of Apple’s MacOS. TOPICS: Linux Fundamentals: Linux Security Enhancements and Infrastructure; Containerized Security; AWS Fundamentals; AWS Security Controls, AWS Hardening; macOS Security.