Foundations of Cybersecurity
Digital Forensics
Cybersecurity Capstone
Instructions for Cybersecurity Courses
Today: Three topics
Load Balancing
Network Segmentation
VPN Concentrators
Certification choices
Study Materials for Security+ Exam
Network Segmentation
Slides
Quiz
Professor Messer Video
Network Segmentation (9:49)
Topic
Slides
Quiz
Professor Messer Video
Video
Topic
Slides
Quiz
Professor Messer Video
Video
Embedded Systems and Specialized Tools
Slides
Quiz
Case Study - Fish Tank Casino Hack
Professor Messer Video
Embedded Systems (13:39)
Embedded Systems Communications and Constraints
Slides
Quiz
Professor Messer Video
Embedded Systems Communication (5:43)
Embedded Systems Constraints (5:31)
Professor Messer Video
Load Balancing (6:35)
Professor Messer Video
Automation and Scripting (3:09)
Redundancy and Replication
Slides
Quiz
Professor Messer Video
Disk Redundancy (5:09)
Network Redundancy (5:43)
Power Redundancy (5:31)
Replication (4:27)
Professor Messer Video
Backup Types (10:26)
Virtualization Security
Slides
Quiz
Case Study - "Venom" Vulnerability
Professor Messer Video
Virtualization Security (3:18)
Application Development Environments
Slides
Quiz
Professor Messer Video
Secure Deployments (6:26)
Provisioning, Deprovisioning, and Integrity
Slides
Quiz
Professor Messer Video
Provisioning and Deprovisioning (5:50)
Professor Messer Video
Software Diversity (2:05)
Configuration Management
Slides
Quiz
Professor Messer Video
Configuration Management (5:15)
Cloud Deployment Model
Slides
Quiz
Professor Messer Video
Cloud Deployment Models
Cloud Computing Concepts
Slides
Quiz
Professor Messer Video
Cloud Models (11:19)
Professor Messer Video
DNS Attacks (8:19)
Malicious Code or Script Executions
Slides
Quiz
Professor Messer Video
Malicious Scripts (4:47)
RFID and NFC Attacks
Slides
Quiz
Professor Messer Video
RFID and NFC Attacks (4:00)
Initialization Vector Attacks
Slides
Quiz
Professor Messer Video
Randomizing Cryptography (4:18)
Adversary-in-the-Middle Attack
Slides
Quiz
Professor Messer Video
On-Path Attacks (6:04)
Deception and Disruptions
Slides
Quiz
Professor Messer Video
Honeypots and Deception (5:52)
Rogue Access Points and Evil Twins
Slides
Quiz
Professor Messer Video
Rogue Access Points and Evil Twins (3:43)
Professor Messer Video
Bluejacking and Bluesnarfing (2:09)
Wireless Disassociation Attacks
Slides
Quiz
Professor Messer Video
Wireless Disassociation Attacks (5:50)
Cross-site Scripting
Slides
Quiz
Professor Messer Video
Cross-site Scripting (7:25)
Request Forgery Attacks
Slides
Quiz
Lab - Intro to CSRF
Lab - CSRF Application
Lab - Session Replay
Professor Messer
Request Forgeries (8:14)
Professor Messer Video
Endpoint Protection (9:48)
Professor Messer Video
Boot Integrity (8:25)
Professor Messer Video
Application Hardening (9:49)
Driver Manipulation Attacks
Slides
Quiz
Professor Messer Videos
Driver Manipulation (4:51)
Juice Shop Set Up
Slides
Lab - Command Injection
Lab - SQL Injection DVWA
Professor Messer Video
Injection Attacks (4:25)
Professor Messer Videos
Adversarial Artificial Intelligence (3:54)
Supply-Chain Attacks
Slides
Quiz
Professor Messer Videos
Supply Chain Attacks (3:27)
Cloud-Based vs. On-Premises Attacks
Slides
Quiz
Professor Messer Videos
Cloud-based vs. On-Premises Attacks (3:32)
Memory Leaks and SSL Stripping
Slides
Quiz
Professor Messer Videos
SSL Stripping (5:58)
Replay Attacks and Pass the Hash
Slides
Quiz
Setting up DVWA
Lab - Session Hijacking
Lab - Pass the Hash
Professor Messer Videos
Replay Attacks (7:20)
Buffer Overflows and Race Conditions
Slides
Quiz
Lab - Buffer Overflow
Case Study - iPhone Integer Overflow
Case Study - Race Conditions
Professor Messer Videos
Buffer Overflows (2:38)
Race Conditions (5:00)
Rootkits
Slides
Quiz
Lab - RAT/Bot
Lab - RAT Removal
Professor Messer Videos
Rootkits (2:45)
Exploitation Frameworks
Slides
Quiz
Professor Messer Videos
Attack Frameworks (7:21)
Privilege Escalation
Slides
Quiz
Lab - Privilege Escalation
Professor Messer Videos
Privilege Escalation (3:18)
Malware
Slides
Quiz
Case Study - Malware
Professor Messer Videos
An Overview of Malware (4:01)
Viruses and Worms
Slides
Quiz
Professor Messer Videos
Viruses and Worms (6:20)
Ransomware and Cryptomalware
Slides
Quiz
Case Study - Ransomware
Lab - Ransomware Attack
Professor Messer Videos
Ransomware and Crypto-malware (3:53)
Trojans, Backdoors, and RATs
Slides
Quiz
Lab - Backdoor
Lab - Backdoor Removal
Lab - Trojan
Professor Messer Videos
Trojans and RATs (5:26)
Vulnerability Scans
Slides
Quiz
Professor Messer Videos
Vulnerability Scans (14:53)
SIEM and SOAR
Slides
Quiz
Professor Messer Videos
SIEM Dashboards (5:02)
Pentesting
Slides
Quiz
Case Study - Bug Bounty
Case Study - Pentesting
Professor Messer Videos
Penetration Testing (7:27)
Pentest Exercise Types
Slides
Quiz
Professor Messer Videos
Reconnaissance (5:08)
Security Teams (4:17)
Threat Intelligence Sources
Slides
Quiz
Professor Messer Videos
Threat Intelligence (10:46)
Threat Research (7:34)
Vulnerability Types
Slides
Quiz
Case Study - Facebook Help the FBI
Professor Messer Videos
Vulnerability Types (14:32)
Vulnerability Impacts
Slides
Quiz
Professor Messer Videos
Vulnerability Impacts (6:24)
Threat Hunting
Slides
Quiz
Professor Messer Videos
Threat Hunting (5:15)
Influence Campaigns
Slides
Quiz
Case Study - IT Army of Ukraine
Case Study - Influence Campaigns Are a Cybersecurity Problem
Professor Messer Videos
Influence Campaigns (3:01)
Threat Actors
Slides
Quiz
Case Study - Insider Threat
Case Study - Stuxnet
Professor Messer Videos
Threat Actors (9:58)
Threat Vectors
Slides
Quiz
Professor Messer Videos
Attack Vectors (10:34)
Reconnaissance
Slides
Quiz
Professor Messer Videos
Reconnaissance (5:08)
Hoaxes
Slides
Quiz
Case Study - Hoaxes
Professor Messer Videos
Hoaxes (4:08)
Watering Hole Attacks
Slides
Quiz
Case Study - Watering Hole
Professor Messer Videos
Watering Hole Attacks (4:02)
Client Hijacking Attacks
Slides
Quiz
Lab: Typosquatting
Shoulder Surfing
Slides
Quiz
Professor Messer Videos
Shoulder Surfing (2:25)
Tailgating and Impersonation
Slides
Quiz
Professor Messer Videos
Impersonation (5:40)
Tailgating & Impersonation
Principles of Social Engineering
Slides
Quiz
Professor Messer Videos
Principles of Social Engineering (4:56)
Credential Harvesting
Slides
Quiz
Lab: Credential Harvesting
Professor Messer Videos
Phishing and Spam
Slides
Quiz
Lab: Phishing
Professor Messer Videos
Phishing (8:57)
Spam (5:23)
Dumpster Diving
Slides
Quiz
Professor Messer Videos
Dumpster Diving (3:00)
Wireless Authentication Protocols
Slides
Quiz
Professor Messer Videos
Wireless Authentication Protocols (8:26)
Wireless Security Methods
Slides
Quiz
Professor Messer Videos
Wireless Authentication Methods (8:15)
Wireless Installation Considerations
Slides
Quiz
Professor Messer Videos
Installing Wireless Networks (7:32)
Packet Capture and Replay Tools
Slides
Quiz
Lab: TCPDump
Lab: Wireshark
Professor Messer Videos
Packet Tools (4:43)
Account Access Control Models
Slides
Quiz
Professor Messer Videos
Access Control (10:04)
Physical Security Controls
Slides
Quiz
Professor Messer Videos
Physical Security Controls (19:15)
Secure Protocols
Slides
Quiz
Case Study: China's Great Firewall
Case Study: Heartbleed
Professor Messer Videos
Secure Protocols (13:21)
Wireless Cryptographic Protocols
Slides
Quiz
Case Study: Wireless Security
Professor Messer Videos
Wireless Cryptography (7:52)
AAA and Multi-Factor Authentication
Slides
Quiz
Professor Messer Videos
Multi-factor Authentication (9:00)
Account Types and Identities
Slides
Quiz
Professor Messer Videos
Account Types (7:08)
Account Policies
Slides
Quiz
Case Study: Equifax
Professor Messer Videos
Account Policies (8:34)
Account Authentication
Slides
Quiz
Case Study: MS-CHAP v2 Exploit
Professor Messer Videos
Authentication Management (5:44)
Secure Coding Techniques
Slides
Quiz
Lab: Obfuscation
Professor Messer Videos
Secure Coding Techniques (11:33)
Data Sovereignty and Protection
Slides
Quiz
Lab: Linux Personal File Encryption
Lab: Windows 7 Personal File Encryption
Professor Messer Videos
Protecting Data (10:36)
Authentication Methods
Slides
Quiz
Professor Messer Videos
Authentication Methods (11:14)
Biometric Authentication
Slides
Quiz
Case Study: Biometrics
Professor Messer Videos
Biometrics (4:28)
Common Cryptography Use Cases
Slides
Quiz
Professor Messer Videos
Cryptography Use Cases (3:36)
Cryptography Limitations
Slides
Quiz
Professor Messer Videos
Cryptography Limitations (6:35)
Database Security
Slides
Quiz
Lab: File Hashing
Professor Messer Videos
Database Security (7:18)
Cryptographic Attacks
Slides
Quiz
Lab: Collision
Lab: Cuckoo
Professor Messer Videos
Cryptographic Attacks (5:19)
Quantum Cryptography and Ephemeral Keys
Slides
Quiz
Case Study
Professor Messer Videos
Quantum Computing (5:45)
Cryptography Modes of Operation and Blockchains
Slides
Quiz
Professor Messer Videos
Blockchain Technology (3:14)
Block Ciphers and Lightweight Cryptography
Slides
Quiz
Professor Messer Videos
Stream and Block Ciphers (7:36)
Steganography and Homomorphic Encryption
Slides
Quiz
Lab: Steganography
Case Study
Professor Messer Videos
Steganography (3:47)
Hashing and Digital Signatures
Slides
Quiz
Professor Messer Videos
Hashing and Digital Signatures (10:52)
Cryptographic Keys (7:25)
Cryptography Concepts (5:31)
Password Attacks
Slides
Quiz
Lab: Passwords
Lab: Brute Force - Offline
Professor Messer Videos
Password Attacks (13:03)
Password Cracking Tools
Slides
Quiz
Lab: Dictonary
Lab: Rainbow Table
Incident Response Process
Slides
Quiz
Case Study
Professor Messer Videos
Incident Reponse Process (10:27)
Incident Response Planning (12:09)
Attack Frameworks (7:21)
Post-Incident Mitigation Techniques
Slides
Quiz
Professor Messer Videos
Endpoint Security Configuration (4:26)
Security Configurations (8:10)
Digital Forensics Evidence
Slides
Quiz
Professor Messer Videos
Digital Forensics (8:11)
Managing Evidence (6:18)
Digital Forensics Evidence Acquisition
Slides
Quiz
Case Study
Professor Messer Videos
Forensics Data Acquisition (10:33)
On-Premises vs. Cloud Forensics (4:33)
Linux File Manipulation Tools
Slides
Quiz
Lab: Linux 101
Lab: Linux 102
Linux Online Terminal (JSLinux)
Linux Command Cheat Sheet
Professor Messer Videos
File Manipulation Tools (13:36)
Shell and Script Environments
Slides
Quiz
Professor Messer Videos
Shell and Script Environments (4:17)
Network Reconnaissance and Discovery Tools
Slides
Quiz
Lab: ifconfig
Lab: Traceroute
Professor Messer Videos
Reconnaissance Tools – Part 1 (17:33)
Reconnaissance Tools – Part 2 (17:53)
Log File Types & Types of Logs
Log File Types Quiz
Types of Logs Quiz
Professor Messer Videos
SIEM Dashboards (5:02)
Log Files (9:49)
Log Management (9:51)
Digital Forensics: WMFWZCQX9B
Foundations of Cybersecurity: LERWR0F6TU