English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 141 Lessons (14h 20m) | 3.21 GB
Start your cybersecurity career by learning security principles and practices from cybersecurity expert Omar Santos.
The Practical Cybersecurity Fundamentals LiveLessons gives you the core knowledge to start your own cybersecurity journey. This course is suitable for anyone looking to start their journey or anyone who is looking to get a security certification such as CompTIA Security+, Cisco CyberOps Associate, Certified Ethical Hacker (CEH), and GIAC Information.
Omar Santos takes you on a deep dive into Cybersecurity fundamentals with a training full of demos and real-world examples that allow you to test your skills in a practical scenario. Theres never been a better time to get started on your cybersecurity career!
Topics covered include:
- Cybersecurity Fundamentals-Introduces the fundamental topics of security principles, business continuity (BC), disaster recovery (DR), and incident responses. This module will also cover network security and how to operate security and software defined networking including cryptography, AAA, and identity management.
- Incident Response, Digital Forensics, and Threat Hunting-Explores the core fundamentals of incident response, threat hunting, and digital forensics. It will teach you tactical, operational, and strategic level cyber threat intelligence skills and tradecraft required to make security teams better, threat hunting more accurate, incident response more effective, and organizations more aware of the evolving threat landscape.
- Ethical Hacking, Penetration Testing, and Bug Hunting-Starts with an overview of security penetration testing and bug hunting. It covers important ethical hacking topics of passive reconnaissance, OSINT, active reconnaissance, enumeration, and scanning. You will be able to conduct successful penetration testing (ethical hacking) assessments for a modern enterprise, including on-premises systems and cloud offers.
- Cloud, DevOps, and IoT Security-Covers cloud security concepts, DevOps, and IOT security. It provides a foundational set of standardized skills and knowledge for IoT and industrial control systems (ICS) cybersecurity professionals. You will learn foundational concepts on how to keep the ICS/SCADA/IoT operational environment safe, secure, and resilient against current and emerging cyber threats.
- AI Security, Ethics, and Privacy: Balancing Innovation with Protection-Introduces AI security, where you will explore LLMs, ChatGPT, Co-Pilot, and more. You will get a deep dive into different types of AI threats: data poison, model inversion, membership inference, model theft, and MITRE’s ATLAS. You will also learn the principle of secure AI development.
Learn How To:
- Understand core cybersecurity fundamentals
- Perform ethical hacking, penetration testing and bug hunting
- Explore system and application including active and passive reconnaissance
- Understand cloud security concepts including IoT and DevSecOps
Table of Contents
Introduction
Practical Cybersecurity Fundamentals Introduction
Lesson 1 Security Principles
Learning objectives
Understanding the Security Concepts of Information Assurance
Understanding the Risk Management Process
Understanding Security Controls
Understanding Governance Processes
Building Your Cybersecurity Lab
Lesson 2 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts
Learning objectives
Understanding Business Continuity (BC)
Understanding Disaster Recovery (DR)
Understanding Incident Response
Lesson 3 Access Control Concepts
Learning objectives
Understanding Physical Access Controls
Exploring the Principle of Least Privilege
Understanding the Concept of Segregation of Duties
Introducing Discretionary Access Control (DAC)
Understanding Mandatory Access Control (MAC)
Understanding Role-based Access Control (RBAC)
Lesson 4 Network Security
Learning objectives
Understanding Computer Networking
Understanding Network Threats and Attacks
Understanding Network Security Infrastructure
Introducing Network Segmentation
Introducing Cloud Security
Lesson 5 Security Operations
Learning objectives
Understanding Data Security
Understanding Hashing
Understanding System Hardening
Understanding Best Practice Security Policies
Understanding Security Awareness Training
Lesson 6 Software Defined Networking and Infrastructure as Code
Learning objectives
Software Defined Networking Security
Understanding the Threats Against SDN Solutions
Introducing Network Programmability
Introducing SD-WAN and Modern Architectures
Surveying the OWASP Top 10
Lesson 7 Cryptography
Learning objectives
Introducing Cryptography and Cryptanalysis
Understanding Encryption Protocols
Describing Hashing Algorithms
Introducing Public Key Infrastructure (PKI)
Introducing Certificate Authorities (CAs) and Certificate Enrollment
Surveying SSL and TLS Implementations
Surveying IPsec Implementations and Modern VPN Implementations
Lesson 8 AAA, Identity Management, Network Visibility, and Segmentation
Learning objectives
Introducing AAA and Identity Management
Implementing Zero Trust and Multifactor Authentication
Understanding Identity Management in the Cloud
Surveying Single-Sign On (SSO) Implementations
Lesson 9 Incident Response Fundamentals
Learning objectives
Exploring How to Get Started in Incident Response
Understanding the Incident Response Process
Defining Playbooks and Run Book Automation (RBA)
Understanding Cyber Threat Intelligence (CTI)
Understanding Data Normalization
Deconstructing Universal Data Formats and 5-tuple Correlation
Understanding Security Monitoring Fundamentals
Surveying Security Monitoring Tools
Lesson 10 Threat Hunting Fundamentals
Learning objectives
Introducing the Threat Hunting Process
MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®)
Understanding Automated Adversarial Emulation
Lesson 11 Digital Forensics
Learning objectives
Introducing Digital Forensics
Introducing Reverse Engineering
Understanding Evidence Preservation and Chain of Custody
Collecting Evidence from Endpoints and Servers
Collecting Evidence from Mobile and IoT Devices
Exploring Memory Analysis with Volatility
Lesson 12 Introduction to Security Penetration Testing and Bug Hunting
Learning objectives
How to Start a Career in Ethical Hacking
Understanding the Difference Between Traditional Pen Testing, Bug Bounties, and Red Team Assessments
Exploring Bug Bounty Programs
Understanding the Ethical Hacking and Bug Hunting Methodology
Planning and Scoping a Penetration Testing Assessment
Lesson 13 Passive Reconnaissance and OSINT
Learning objectives
Understanding Information Gathering and Vulnerability Identification
Introducing Open Source Intelligence (OSINT) Techniques
Performing DNS-based Passive Recon
Identifying Cloud vs. Self-hosted Assets
Introducing Shodan, Maltego, AMass, Recon-NG, and other Recon Tools
Surveying Password Dumps, File Metadata, and Public Source-code Repositories
Introduction to Google Hacking and Search Engine Reconnaissance
Lesson 14 Active Reconnaissance, Enumeration, and Scanning
Learning objectives
Introduction to Host and Service Enumeration
Mastering Nmap
Performing Website and Web Application Reconnaissance
Discovering Cloud Assets
Crafting Packets with Scapy to Perform Reconnaissance
Lesson 15 Exploiting Systems and Applications
Learning objectives
Performing On-Path Attacks
Exploring the OWASP Top 10 Risks in Web Applications
Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF) Vulnerabilities
Understanding Server-side Request Forgery (SSRF) Vulnerabilities
Hacking Databases
Exploiting Wireless Vulnerabilities
Exploiting Buffer Overflows and Creating Payloads
Lesson 16 Post Exploitation Techniques and Reporting
Learning objectives
Avoiding Detection and Evading Security Tools
Introduction to Lateral Movement and Exfiltration
Exploring Command and Control (C2) Techniques
Understanding Living-off-the-land and Fileless Malware
Best Practices when Creating Pen Testing and Bug Bounty Reports
Understanding Post-Engagement Cleanup
Lesson 17 Cloud Security Concepts
Learning objectives
Introducing the Different Cloud Deployment and Service Models
Surveying Patch Management in the Cloud
Performing Security Assessments in Cloud Environments
Exploring Cloud Logging and Monitoring Methodologies
Lesson 18 DevSecOps
Learning objectives
Introducing DevSecOps
Securing Code, Applications, and Building DevSecOps Pipelines
Lesson 19 IoT Security
Learning objectives
Introducing IoT Concepts
Surveying IoT Hacking Methodologies and IoT Hacking Tools
Introducing OT, ICS, and SCADA Concepts and Attacks
Lesson 20 Introduction to AI Security
Learning objectives
Surveying the AI Landscape and Use Cases
Exploring LLMs, ChatGPT, Co-pilot and More
Understanding the Importance of AI Security
Exploring the OWASP Top 10 for LLMs
Lesson 21 A Deep Dive into the Different Types of AI Threats
Learning objectives
Exploring Data Poisoning Attacks
Understanding Model Inversion Attacks
Discussing Membership Inference Attacks
Explaining the Model Theft Attack
Introducing MITRE’s ATLAS
Lesson 22 Principles of Secure AI Development
Learning objectives
Exploring the Secure AI Development Lifecycle
Understanding Privacy-preserving AI Techniques
Understanding Robustness and Resilience in AI Models
Surveying AI Security Best Practices
Exploring AI Security Tools and Frameworks
Understanding the Legal Landscape and Potential New Regulations
Investigating Ethical Implications of Artificial Intelligence
Module 1 Cybersecurity Fundamentals
Module Introduction
Module 2 Incident Response, Digital Forensics, and Threat Hunting
Module Introduction
Module 3 Ethical Hacking, Penetration Testing, and Bug Hunting
Module Introduction
Module 4 Cloud, DevOps, and IoT Security
Module Introduction
Module 5 AI Security, Ethics, and Privacy Balancing Innovation with Protection
Module Introduction
Summary
Practical Cybersecurity Fundamentals Summary
Resolve the captcha to access the links!