Curriculum For This Course
Video tutorials list
-
Identify Security Control Types
Video Name Time 1. Identify Security Control Types (Introduction) 1:00 2. Cybersecurity Roles and Responsibilities (OBJ 5.3) 7:00 3. Security Operations Center (SOC) (OBJ 5.3) 5:00 4. Security Control Categories (OBJ 5.3) 15:00 5. Selecting Security Controls (OBJ 5.3) 5:00 -
Threat Intelligence
Video Name Time 1. Threat Intelligence Sharing (Introduction) 1:00 2. Security and Threat Intelligence (OBJ 1.1) 5:00 3. Intelligence Cycle (OBJ 1.1) 10:00 4. Intelligence Sources (OBJ 1.1) 9:00 5. Information Sharing and Analysis Centers (ISACS) (OBJ 1.1) 4:00 6. Threat Intelligence Sharing (OBJ 1.2) 5:00 -
Classifying Threats
Video Name Time 1. Classifying Threats (Introduction) 1:00 2. Threat Classification (OBJ 1.1) 9:00 3. Threat Actors (OBJ 1.1) 9:00 4. Malware (OBJ 1.1) 8:00 5. Threat Research (OBJ 1.2) 11:00 6. Attack Frameworks (OBJ 1.2) 11:00 7. Indicator Management (OBJ 1.1) 7:00 -
Threat Hunting
Video Name Time 1. Threat Hunting (Introduction) 1:00 2. Threat Modeling (OBJ 1.2) 8:00 3. Threat Hunting (OBJ 3.3) 7:00 4. Open-source Intelligence (OBJ 1.1) 4:00 5. Google Hacking (OBJ 1.1) 8:00 6. Profiling Techniques (OBJ 1.1) 5:00 7. Harvesting Techniques (OBJ 1.1) 4:00 -
Network Forensics
Video Name Time 1. Network Forensics (Introduction) 2:00 2. Network Forensic Tools (OBJ 3.1) 4:00 3. tcpdump (OBJ 4.4) 8:00 4. Wireshark (OBJ 4.4) 11:00 5. Flow Analysis (OBJ 3.1) 6:00 6. IP and DNS Analysis (OBJ 3.1) 7:00 7. URL Analysis (OBJ 3.1) 16:00 8. Conduct Packet Analysis (OBJ 4.4) 6:00 -
Appliance Monitoring
Video Name Time 1. Appliance Monitoring (Introduction) 1:00 2. Firewall Logs (OBJ 3.1) 11:00 3. Firewall Configurations (OBJ 3.2) 19:00 4. Proxy Logs (OBJ 3.1) 6:00 5. Web Application Firewall Logs (OBJ 3.1) 3:00 6. IDS and IPS Configuration (OBJ 3.2) 7:00 7. IDS and IPS Logs (OBJ 3.1) 9:00 8. Port Security Configuration (OBJ 3.2) 6:00 9. NAC Configuration (OBJ 3.2) 7:00 10. Analysis of Security Appliances (OBJ 3.2) 16:00 -
Endpoint Monitoring
Video Name Time 1. Endpoint Monitoring (Introduction) 2:00 2. Endpoint Analysis (OBJ 3.1) 6:00 3. Sandboxing (OBJ 3.2) 4:00 4. Reverse Engineering (OBJ 3.1) 11:00 5. Malware Exploitation (OBJ 3.1) 8:00 6. Behavior Analysis (OBJ 3.1) 12:00 7. Malware Analysis (OBJ 3.1) 26:00 8. EDR Configuration (OBJ 3.2) 5:00 9. Blacklisting and Whitelisting (OBJ 3.2) 9:00 -
Email Monitoring
Video Name Time 1. Email Monitoring (Introduction) 2:00 2. Email IOCs (OBJ 3.1) 5:00 3. Email Header Analysis (OBJ 3.1) 11:00 4. Email Content Analysis (OBJ 3.1) 4:00 5. Email Server Security (OBJ 3.1) 8:00 6. SMTP Log Analysis (OBJ 3.1) 5:00 7. Email Message Security (OBJ 3.1) 6:00 8. Analyzing Email Headers (OBJ 4.3) 4:00 -
Configuring Your SIEM
Video Name Time 1. Configuring Your SIEM (Introduction) 1:00 2. SIEM (OBJ 3.1) 9:00 3. Security Data Collection (OBJ 3.1) 5:00 4. Data Normalization (OBJ 3.1) 8:00 5. Event Log (OBJ 3.1) 4:00 6. Syslog (OBJ 3.1) 6:00 7. Configuring a SIEM Agent (OBJ 3.1) 20:00 -
Analyzing Your SIEM
Video Name Time 1. Analyzing Your SIEM (Introduction) 1:00 2. SIEM Dashboards (OBJ 3.1) 12:00 3. Analysis and Detection (OBJ 3.1) 7:00 4. Trend Analysis (OBJ 3.1) 10:00 5. Rule and Query Writing (OBJ 3.1) 5:00 6. Searching and Piping Commands (OBJ 3.1) 18:00 7. Scripting Tools (OBJ 3.1) 9:00 8. Analyzing, Filtering, and Searching Logs (OBJ 3.1) 7:00 -
Digital Forensics
Video Name Time 1. Digital Forensics (Introduction) 2:00 2. Digital Forensic Analysts (OBJ 4.4) 5:00 3. Forensics Procedures (OBJ 4.4) 9:00 4. Work Product Retention (OBJ 4.4) 3:00 5. Data Acquisition (OBJ 4.4) 5:00 6. Forensics Tools (OBJ 4.4) 8:00 7. Memory Acquisition (OBJ 4.4) 5:00 8. Disk Image Acquisition (OBJ 4.4) 12:00 9. Hashing (OBJ 4.4) 5:00 10. Timeline Generation (OBJ 4.4) 5:00 11. Carving (OBJ 4.4) 6:00 12. Chain of Custody (OBJ 4.4) 6:00 13. Collecting and Validating Evidence (OBJ 4.4) 9:00 -
Analyzing Network IOCs
Video Name Time 1. Analyzing Network IOCs (Introduction) 1:00 2. Analyzing Network IOCs (OBJ 4.3) 2:00 3. Traffic Spikes (OBJ 4.3) 18:00 4. Beaconing (OBJ 4.3) 14:00 5. Irregular P2P Communications (OBJ 4.3) 8:00 6. Rogue Devices (OBJ 4.3) 11:00 7. Scans and Sweeps (OBJ 4.3) 5:00 8. Nonstandard Port Usage (OBJ 4.3) 11:00 9. TCP Ports (OBJ 4.3) 8:00 10. UDP Ports (OBJ 4.3) 7:00 11. Data Exfiltration (OBJ 4.3) 6:00 12. Covert Channels (OBJ 4.3) 8:00 13. Analysis of Network IOCs (OBJ 4.3) 13:00 -
Analyzing Host-related IOCs
Video Name Time 1. Analyzing Host-related IOCs (Introduction) 1:00 2. Host-related IOCs (OBJ 4.3) 2:00 3. Malicious Processes (OBJ 4.3) 10:00 4. Memory Forensics (OBJ 4.3) 7:00 5. Consumption (OBJ 4.3) 9:00 6. Disk and File System (OBJ 4.3) 11:00 7. Unauthorized Privilege (OBJ 4.3) 5:00 8. Unauthorized Software (OBJ 4.3) 6:00 9. Unauthorized Change/Hardware (OBJ 4.3) 3:00 10. Persistence (OBJ 4.3) 10:00 -
Analyzing Application-related IOCs
Video Name Time 1. Analyzing Application-related IOCs (Introduction) 2:00 2. Application-related IOCs (OBJ 4.3) 2:00 3. Anomalous Activity (OBJ 4.3) 4:00 4. Service Interruptions (OBJ 4.3) 5:00 5. Application Logs (OBJ 4.3) 13:00 6. New Accounts (OBJ 4.3) 6:00 7. Virtualization Forensics (OBJ 4.3) 6:00 8. Mobile Forensics (OBJ 4.3) 12:00 -
Analyzing Lateral Movement and Pivoting IOCs
Video Name Time 1. Analyzing Lateral Movement and Pivoting IOCs (Introduction) 1:00 2. Lateral Movement and Pivoting (OBJ 4.3) 3:00 3. Pass the Hash (OBJ 4.3) 10:00 4. Golden Ticket (OBJ 4.3) 7:00 5. Lateral Movement (OBJ 4.3) 7:00 6. Pivoting (OBJ 4.3) 6:00 -
Incident Response Preparation
Video Name Time 1. Incident Response Preparation (Introduction) 2:00 2. Incident Response Phases (OBJ 4.2) 12:00 3. Documenting Procedures (OBJ 4.2) 7:00 4. Data Criticality (OBJ 4.1) 14:00 5. Communication Plan (OBJ 4.1) 7:00 6. Reporting Requirements (OBJ 4.1) 5:00 7. Response Coordination (OBJ 4.1) 8:00 8. Training and Testing (OBJ 4.2) 7:00 -
Detection and Containment
Video Name Time 1. Detection and Containment (Introduction) 2:00 2. OODA Loop (OBJ 4.2) 6:00 3. Defensive Capabilities (OBJ 4.2) 5:00 4. Detection and Analysis (OBJ 4.2) 7:00 5. Impact Analysis (OBJ 3.1) 8:00 6. Incident Classification (OBJ 4.2) 6:00 7. Containment (OBJ 4.2) 6:00 -
Eradication, Recovery, and Post-incident Actions
Video Name Time 1. Eradication, Recovery, and Post-incident Actions (Introduction) 1:00 2. Eradication (OBJ 4.2) 6:00 3. Eradication Actions (OBJ 4.2) 4:00 4. Recovery (OBJ 4.2) 3:00 5. Recovery Actions (OBJ 4.2) 6:00 6. Post-Incident Activities (OBJ 4.2) 6:00 7. Lessons Learned (OBJ 4.2) 7:00 -
Risk Mitigation
Video Name Time 1. Risk Mitigation (Introduction) 1:00 2. Risk Identification Process (OBJ 5.2) 8:00 3. Conducting an Assessment (OBJ 5.2) 9:00 4. Risk Calculation (OBJ 5.2) 12:00 5. Business Impact Analysis (OBJ 5.2) 12:00 6. Risk Prioritization (OBJ 5.2) 17:00 7. Communicating Risk (OBJ 5.2) 8:00 8. Training and Exercises (OBJ 5.2) 5:00 -
Frameworks, Policies, and Procedures
Video Name Time 1. Frameworks, Policies, and Procedures (Introduction) 1:00 2. Enterprise Security Architecture (OBJ 5.3) 3:00 3. Prescriptive Frameworks (OBJ 5.3) 4:00 4. Risk-based Frameworks (OBJ 5.3) 5:00 5. Audits and Assessments (OBJ 5.3) 7:00 6. Continuous Monitoring (OBJ 5.3) 5:00 -
Enumeration Tools
Video Name Time 1. Enumeration Tools (OBJ 1.4) 8:00 2. Nmap Discovery Scans (OBJ 1.4) 9:00 3. Nmap Port Scans (OBJ 1.4) 6:00 4. Nmap Port States (OBJ 1.4) 4:00 5. Nmap Fingerprinting Scans (OBJ 1.4) 4:00 6. Using Nmap (OBJ 1.4) 11:00 7. Hping (OBJ 1.4) 6:00 8. Responder (OBJ 1.4) 2:00 9. Wireless Assessment Tools (OBJ 1.4) 6:00 10. Hashcat (OBJ 1.4) 3:00 11. Testing Credential Security (OBJ 1.4) 3:00 -
Vulnerability Scanning
Video Name Time 1. Identifying Vulnerabilities (OBJ 1.3) 4:00 2. Scanning Workflow (OBJ 1.3) 7:00 3. Scope Considerations (OBJ 1.3) 8:00 4. Scanner Types (OBJ 1.3) 9:00 5. Scanning Parameters (OBJ 1.3) 6:00 6. Scheduling and Constraints (OBJ 1.3) 9:00 7. Vulnerability Feeds (OBJ 3.4) 3:00 8. Scan Sensitivity (OBJ 1.3) 5:00 9. Scanning Risks (OBJ 1.3) 3:00 -
Analyzing Output from Vulnerability Scanners
Video Name Time 1. Scan Reports (OBJ 1.4) 3:00 2. Common Identifiers (OBJ 1.2) 7:00 3. CVSS (OBJ 1.2) 8:00 4. Vulnerability Reports (OBJ 1.3) 11:00 5. Nessus (OBJ 1.4) 7:00 6. OpenVAS and Qualys (OBJ 1.4) 3:00 7. Assessing Scan Outputs (OBJ 1.4) 14:00 -
Mitigating Vulnerabilities
Video Name Time 1. Mitigating Vulnerabilities (Introduction) 2:00 2. Remediation and Mitigation (OBJ 1.3) 6:00 3. Configuration Baselines (OBJ 1.3) 4:00 4. Hardening and Patching (OBJ 1.3) 11:00 5. Remediation Issues (OBJ 1.3) 9:00 -
Identity and Access Management Solutions
Video Name Time 1. Identity and Access Management (OBJ 2.1) 7:00 2. Password Policies (OBJ 5.3) 6:00 3. SSO and MFA (OBJ 2.1) 6:00 4. Certificate Management (OBJ 2.1) 4:00 5. Federation (OBJ 2.1) 5:00 6. Privilege Management (OBJ 2.1) 6:00 7. IAM Auditing (OBJ 2.1) 6:00 8. Conduct and Use Policies (OBJ 5.3) 3:00 9. Account and Permissions Audits (OBJ 2.1) 5:00 -
Network Architecture and Segmentation
Video Name Time 1. Asset and Change Management (OBJ 2.1) 10:00 2. Network Architecture (OBJ 2.1) 9:00 3. Segmentation (OBJ 2.1) 6:00 4. Jumpbox (OBJ 2.1) 5:00 5. Virtualization (OBJ 2.1) 6:00 6. Virtualized Infrastructure (OBJ 2.1) 7:00 7. Honeypots (OBJ 2.1) 7:00 8. Configuring Network Segmentation (OBJ 3.2) 10:00 -
Hardware Assurance Best Practices
Video Name Time 1. Supply Chain Assessment (OBJ 5.2) 5:00 2. Root of Trust (OBJ 2.3) 5:00 3. Trusted Firmware (OBJ 2.3) 5:00 4. Security Processing (OBJ 2.3) 4:00 -
Specialized Technology
Video Name Time 1. Mobile Vulnerabilities (OBJ 1.5) 12:00 2. IoT Vulnerabilities (OBJ 1.5) 3:00 3. Embedded System Vulnerabilities (OBJ 1.5) 7:00 4. ICS & SCADA Vulnerabilities (OBJ 1.5) 8:00 5. Mitigating Vulnerabilities (OBJ 1.5) 4:00 6. Premise System Vulnerabilities (OBJ 1.5) 6:00 7. Vehicular Vulnerabilities (OBJ 1.5) 7:00 -
Non-technical Data and Privacy Controls
Video Name Time 1. Data Classification (OBJ 5.1) 9:00 2. Data Types (OBJ 5.1) 3:00 3. Legal Requirements (OBJ 5.1) 9:00 4. Data Policies (OBJ 5.1) 6:00 5. Data Retention (OBJ 5.1) 7:00 6. Data Ownership (OBJ 5.1) 4:00 7. Data Sharing (OBJ 5.1) 6:00 -
Technical Data and Privacy Controls
Video Name Time 1. Access Controls (OBJ 5.1) 3:00 2. File System Permissions (OBJ 3.2) 10:00 3. Encryption (OBJ 5.1) 3:00 4. Data Loss Prevention (OBJ 5.1) 4:00 5. DLP Discovery and Classification (OBJ 3.2) 4:00 6. Deidentification Controls (OBJ 5.1) 7:00 7. DRM and Watermarking (OBJ 5.1) 4:00 8. Analyzing Share Permissions (OBJ 5.1) 4:00 -
Mitigate Software Vulnerabilities and Attacks
Video Name Time 1. SDLC Integration (OBJ 2.2) 12:00 2. Overflow Attacks (OBJ 1.7) 14:00 3. Race Conditions (OBJ 1.7) 6:00 4. Improper Error Handling (OBJ 1.7) 5:00 5. Design Vulnerabilities (OBJ 1.7) 4:00 6. Platform Best Practices (OBJ 2.2) 7:00 -
Mitigate Web Application Vulnerabilities and Attacks
Video Name Time 1. Directory Traversal (OBJ 1.7) 8:00 2. Cross-site Scripting (OBJ 1.7 8:00 3. SQL Injection (OBJ 1.7) 8:00 4. XML Vulnerabilities (OBJ 1.7) 5:00 5. Secure Coding (OBJ 2.2) 10:00 6. Authentication Attacks (OBJ 1.7) 7:00 7. Session Hijacking (OBJ 1.7) 7:00 8. Sensitive Data Exposure (OBJ 1.7) 3:00 9. Clickjacking (OBJ 1.7) 2:00 10. Web Applications Vulnerabilities (OBJ 1.7) 9:00 -
Analyzing Application Assessments
Video Name Time 1. Software Assessments (OBJ 2.2) 8:00 2. Reverse Engineering (OBJ 1.4) 7:00 3. Dynamic Analysis (OBJ 1.4) 8:00 4. Web Application Scanners (OBJ 1.4) 3:00 5. Burp Suite (OBJ 1.4) 11:00 6. OWASP ZAP (OBJ 1.4) 3:00 7. Analyzing Web Applications (OBJ 1.4) 16:00 -
Cloud and Automation
Video Name Time 1. Cloud Models (OBJ 1.6) 16:00 2. Service Models (OBJ 1.6) 11:00 3. Cloud-based Infrastructure (OBJ 2.1) 7:00 4. CASB (OBJ 2.1) 4:00 -
Service-Oriented Architecture
Video Name Time 1. SOA and Microservices (OBJ 2.2) 6:00 2. SOAP (OBJ 2.2) 5:00 3. SAML (OBJ 2.2) 7:00 4. REST (OBJ 2.2) 10:00 5. API (OBJ 3.4) 6:00 6. Scripting (OBJ 3.4) 4:00 7. Workflow Orchestration (OBJ 3.4) 6:00 8. FAAS and Serverless (OBJ 1.6) 8:00 -
Cloud Infrastructure Assessments
Video Name Time 1. Cloud Threats (OBJ 1.6) 8:00 2. Cloud Tools (OBJ 1.4) 4:00 3. Cloud Forensics (OBJ 4.4) 4:00 -
Automation Concepts and Technologies
Video Name Time 1. CI/CD (OBJ 3.4) 7:00 2. DevSecOps (OBJ 2.2) 5:00 3. IAC (OBJ 1.6) 4:00 4. Machine Learning (OBJ 3.4) 9:00 5. Data Enrichment (OBJ 3.4) 4:00 6. SOAR (OBJ 3.4) 3:00
Add Comment