Foundations of Cybersecurity
Instructions for Foundations of Cybersecurity
Today's Task:
Study cybersecurity
For the labs, log into Cyber.org cyber range.
Go to https://apps.cyber.org/
Your username and password were sent to your school Gmail.
Certification choices
Unit 15 - Governance, Risk, and Compliance
Professor Messer Video
Security Controls (4:14)
Security Regulations
Slides
Quiz
Professor Messer Video
Security Regulations and Standards (4:33)
Professor Messer Video
Security Frameworks (7:31)
Professor Messer Video
Secure Configurations (5:23)
Personnel Management
Slides
Quiz
Professor Messer Video
Personnel Security (10:10)
Personnel Agreement & Policies
Slides
Quiz
Professor Messer Video
Credential Policies (7:50)
Organizational Policies (4:37)
Professor Messer Video
Risk Management Types (5:56)
Risk Management Strategies
Slides
Quiz
Professor Messer Video
Risk Management Types (5:56)
Professor Messer Video
Risk Analysis (11:01)
Business Impact Analysis
Slides
Quiz
Professor Messer Video
Business Impact Analysis (7:48)
Organizational Breach Consequences
Slides
Quiz
Case Study - Sony Playstation Breach
Case Study - Failure to Disclose
Professor Messer Video
Privacy and Data Breaches (5:44)
Handling Sensitive Data
Slides
Quiz
Case Study - Handling Sensitive Data
Professor Messer Video
Enhancing Privacy (7:35)
Data Roles and Responsibilities
Slides
Quiz
Professor Messer Video
Data Roles and Responsibilities (2:53)
Data Assessments, Agreements, and Notices
Slides
Quiz
Professor Messer Video
Data Classifications (5:12)
Unit 14 - Mobile Devices and PKI
Mobile Device Connectivity
Slides
Quiz
Professor Messer Video
Mobile Networks (9:58)
Mobile Device Security (5:34)
Mobile Device Management
Slides
Quiz
Professor Messer Video
Mobile Device Management (13:44)
Mobile Device Enforcement
Slides
Quiz
Professor Messer Video
Mobile Device Enforcement (13:50)
Mobile Device Deployment
Slides
Quiz
Professor Messer Video
Mobile Deployment Models (4:19)
Cloud Security Controls
Slides
Quiz
Case Study - Exposure Through Cloud Misconfiguration
Professor Messer Video
Cloud Security Controls (5:02)
Cloud Security Solutions
Slides
Quiz
Professor Messer Video
Cloud Security Solutions (6:32)
Professor Messer Video
Public Key Infrastructure (13:07)
PKI Certificate Formats
Slides
Quiz
Professor Messer Video
Certificate Formats (4:23)
Professor Messer Video
Certificate Concepts (7:52)
Unit 13 - Network Security
Professor Messer Video
Load Balancing (6:35)
Network Segmentation
Slides
Quiz
Professor Messer Video
Network Segmentation (9:49)
Professor Messer Video
Other Network Appliances (4:31)
Network Access Control
Slides
Quiz
Professor Messer Video
Network Access Control (5:06)
Professor Messer Video
Port Security (10:25)
Professor Messer Video
Network Access Control (5:06)
Unit 12 - Architecture and Design
Configuration Management
Slides
Quiz
Professor Messer Video
Configuration Management (5:15)
Cloud Deployment Model
Slides
Quiz
Professor Messer Video
Cloud Deployment Models
Cloud Computing Concepts
Slides
Quiz
Professor Messer Video
Cloud Models (11:19)
Virtualization Security
Slides
Quiz
Case Study - "Venom" Vulnerability
Professor Messer Video
Virtualization Security (3:18)
Application Development Environments
Slides
Quiz
Professor Messer Video
Secure Deployments (6:26)
Provisioning, Deprovisioning, and Integrity
Slides
Quiz
Professor Messer Video
Provisioning and Deprovisioning (5:50)
Professor Messer Video
Software Diversity (2:05)
Professor Messer Video
Automation and Scripting (3:09)
Redundancy and Replication
Slides
Quiz
Professor Messer Video
Disk Redundancy (5:09)
Network Redundancy (5:43)
Power Redundancy (5:31)
Replication (4:27)
Professor Messer Video
Backup Types (10:26)
Embedded Systems and Specialized Tools
Slides
Quiz
Case Study - Fish Tank Casino Hack
Professor Messer Video
Embedded Systems (13:39)
Embedded Systems Communications and Constraints
Slides
Quiz
Professor Messer Video
Embedded Systems Communication (5:43)
Embedded Systems Constraints (5:31)
Unit 11 - Malware and Attacks, Part 4
Rogue Access Points and Evil Twins
Slides
Quiz
Professor Messer Video
Rogue Access Points and Evil Twins (3:43)
Professor Messer Video
Bluejacking and Bluesnarfing (2:09)
Wireless Disassociation Attacks
Slides
Quiz
Professor Messer Video
Wireless Disassociation Attacks (5:50)
RFID and NFC Attacks
Slides
Quiz
Professor Messer Video
RFID and NFC Attacks (4:00)
Initialization Vector Attacks
Slides
Quiz
Professor Messer Video
Randomizing Cryptography (4:18)
Adversary-in-the-Middle Attack
Slides
Quiz
Professor Messer Video
On-Path Attacks (6:04)
Professor Messer Video
DNS Attacks (8:19)
Malicious Code or Script Executions
Slides
Quiz
Professor Messer Video
Malicious Scripts (4:47)
Unit 10 - Malware and Attacks, Part 3
Juice Shop Set Up
Slides
Professor Messer Video
Endpoint Protection (9:48)
Professor Messer Video
Boot Integrity (8:25)
Application Security
Slides
Quiz
Professor Messer Video
Application Security (13:31)
Professor Messer Video
Application Hardening (9:49)
Cross-site Scripting
Slides
Quiz
Lab - XSS DVWA
Lab - XSS Juice Shop
Professor Messer Video
Cross-site Scripting (7:25)
Request Forgery Attacks
Slides
Quiz
Lab - Intro to CSRF
Lab - CSRF Application
Lab - Session Replay
Professor Messer
Request Forgeries (8:14)
Deception and Disruptions
Slides
Quiz
Professor Messer Video
Honeypots and Deception (5:52)
Unit 9 - Malware and Attacks, Part 2
Buffer Overflows and Race Conditions
Slides
Quiz
Lab - Buffer Overflow
Case Study - iPhone Integer Overflow
Case Study - Race Conditions
Professor Messer Videos
Buffer Overflows (2:38)
Race Conditions (5:00)
Professor Messer Videos
Physical Attacks (6:03)
Professor Messer Videos
Adversarial Artificial Intelligence (3:54)
Supply-Chain Attacks
Slides
Quiz
Professor Messer Videos
Supply Chain Attacks (3:27)
Cloud-Based vs. On-Premises Attacks
Slides
Quiz
Professor Messer Videos
Cloud-based vs. On-Premises Attacks (3:32)
Memory Leaks and SSL Stripping
Slides
Quiz
Professor Messer Videos
SSL Stripping (5:58)
Driver Manipulation Attacks
Slides
Quiz
Professor Messer Videos
Driver Manipulation (4:51)
Unit 8 - Malware and Attacks, Part 1
Malware
Slides
Quiz
Case Study - Malware
Professor Messer Videos
An Overview of Malware (4:01)
Viruses and Worms
Slides
Quiz
Professor Messer Videos
Viruses and Worms (6:20)
Ransomware and Cryptomalware
Slides
Quiz
Case Study - Ransomware
Lab - Ransomware Attack
Professor Messer Videos
Ransomware and Crypto-malware (3:53)
Trojans, Backdoors, and RATs
Slides
Quiz
Professor Messer Videos
Trojans and RATs (5:26)
Exploitation Frameworks
Slides
Quiz
Lab - Backdoor
Professor Messer Videos
Attack Frameworks (7:21)
Privilege Escalation
Slides
Quiz
Lab - Privilege Escalation
Professor Messer Videos
Privilege Escalation (3:18)
Replay Attacks and Pass the Hash
Slides
Quiz
Lab - Pass the Hash
Professor Messer Videos
Replay Attacks (7:20)
Unit 7 - Threat Vectors
Threat Actors
Slides
Quiz
Case Study - Insider Threat
Case Study - Stuxnet
Professor Messer Videos
Threat Actors (9:58)
Threat Vectors
Slides
Quiz
Professor Messer Videos
Attack Vectors (10:34)
Threat Intelligence Sources
Slides
Quiz
Professor Messer Videos
Threat Intelligence (10:46)
Threat Research (7:34)
Threat Hunting
Slides
Quiz
Professor Messer Videos
Threat Hunting (5:15)
Vulnerability Types
Slides
Quiz
Case Study - Facebook Help the FBI
Professor Messer Videos
Vulnerability Types (14:32)
Vulnerability Impacts
Slides
Quiz
Professor Messer Videos
Vulnerability Impacts (6:24)
Vulnerability Scans
Slides
Quiz
Professor Messer Videos
Vulnerability Scans (14:53)
SIEM and SOAR
Slides
Quiz
Professor Messer Videos
SIEM Dashboards (5:02)
Pentesting
Slides
Quiz
Case Study - Bug Bounty
Case Study - Pentesting
Professor Messer Videos
Penetration Testing (7:27)
Pentest Exercise Types
Slides
Quiz
Professor Messer Videos
Reconnaissance (5:08)
Security Teams (4:17)
Unit 6 - Social Engineering
Principles of Social Engineering
Slides
Quiz
Professor Messer Videos
Principles of Social Engineering (4:56)
Credential Harvesting
Slides
Quiz
Lab: Credential Harvesting
Professor Messer Videos
Other Social Engineering Attacks (5:16)
Phishing and Spam
Slides
Quiz
Lab: Phishing
Professor Messer Videos
Phishing (8:57)
Spam (5:23)
Dumpster Diving
Slides
Quiz
Professor Messer Videos
Dumpster Diving (3:00)
Shoulder Surfing
Slides
Quiz
Professor Messer Videos
Shoulder Surfing (2:25)
Tailgating and Impersonation
Slides
Quiz
Professor Messer Videos
Impersonation (5:40)
Tailgating & Impersonation
Reconnaissance
Slides
Quiz
Professor Messer Videos
Reconnaissance (5:08)
Hoaxes
Slides
Quiz
Case Study - Hoaxes
Professor Messer Videos
Hoaxes (4:08)
Watering Hole Attacks
Slides
Quiz
Case Study - Watering Hole
Professor Messer Videos
Watering Hole Attacks (4:02)
Client Hijacking Attacks
Slides
Quiz
Lab: Typosquatting
Influence Campaigns
Slides
Quiz
Case Study - IT Army of Ukraine
Case Study - Influence Campaigns Are a Cybersecurity Problem
Professor Messer Videos
Influence Campaigns (3:01)
Unit 5 - Authentication and Security Protocols
Authentication Methods
Slides
Quiz
Professor Messer Videos
Authentication Methods (11:14)
Biometric Authentication
Slides
Quiz
Case Study: Biometrics
Professor Messer Videos
Biometrics (4:28)
AAA and Multi-Factor Authentication
Slides
Quiz
Professor Messer Videos
Multi-factor Authentication (9:00)
Account Types and Identities
Slides
Quiz
Professor Messer Videos
Account Types (7:08)
Account Policies
Slides
Quiz
Case Study: Equifax
Professor Messer Videos
Account Policies (8:34)
Account Authentication
Slides
Quiz
Case Study: MS-CHAP v2 Exploit
Professor Messer Videos
Authentication Management (5:44)
Account Access Control Models
Slides
Quiz
Professor Messer Videos
Access Control (10:04)
Physical Security Controls
Slides
Quiz
Professor Messer Videos
Physical Security Controls (19:15)
Secure Protocols
Slides
Quiz
Case Study: China's Great Firewall
Case Study: Heartbleed
Professor Messer Videos
Secure Protocols (13:21)
Wireless Cryptographic Protocols
Slides
Quiz
Case Study: Wireless Security
Professor Messer Videos
Wireless Cryptography (7:52)
Wireless Authentication Protocols
Slides
Quiz
Professor Messer Videos
Wireless Authentication Protocols (8:26)
Wireless Security Methods
Slides
Quiz
Professor Messer Videos
Wireless Authentication Methods (8:15)
Wireless Installation Considerations
Slides
Quiz
Professor Messer Videos
Installing Wireless Networks (7:32)
Unit 4 - Encryption and Cryptography
Cryptography Modes of Operation and Blockchains
Slides
Quiz
Professor Messer Videos
Blockchain Technology (3:14)
Block Ciphers and Lightweight Cryptography
Slides
Quiz
Professor Messer Videos
Stream and Block Ciphers (7:36)
Steganography and Homomorphic Encryption
Slides
Quiz
Lab: Steganography
Case Study
Professor Messer Videos
Steganography (3:47)
Common Cryptography Use Cases
Slides
Quiz
Professor Messer Videos
Cryptography Use Cases (3:36)
Cryptography Limitations
Slides
Quiz
Professor Messer Videos
Cryptography Limitations (6:35)
Quantum Cryptography and Ephemeral Keys
Slides
Quiz
Professor Messer Videos
Quantum Computing (5:45)
Database Security
Slides
Quiz
Lab: File Hashing
Professor Messer Videos
Database Security (7:18)
Cryptographic Attacks
Slides
Quiz
Lab: Collision
Lab: Cuckoo
Professor Messer Videos
Cryptographic Attacks (5:19)
Secure Coding Techniques
Slides
Quiz
Lab: Obfuscation
Professor Messer Videos
Secure Coding Techniques (11:33)
Data Sovereignty and Protection
Slides
Quiz
Lab: Linux Personal File Encryption
Lab: Windows 7 Personal File Encryption
Professor Messer Videos
Protecting Data (10:36)
Unit 3 - Passwords
Hashing and Digital Signatures
Slides
Quiz
Professor Messer Videos
Hashing and Digital Signatures (10:52)
Cryptographic Keys (7:25)
Cryptography Concepts (5:31)
Password Attacks
Slides
Quiz
Lab: Passwords
Lab: Brute Force Offline
Lab: Dictonary Attack
Lab: Rainbow Table
Professor Messer Videos
Password Attacks (13:03)
Unit 2 - Forensics
Data Sanitization Tools
Slides
Quiz
Lab: Data Sanitization
Data Destruction
Slides
Quiz
Case Study: Data Destruction
Professor Messer Video
Secure Data Destruction (5:58)
Forensic Tools
Slides
Quiz
Lab: Autopsy
Professor Messer Video
Forensic Tools (9:11)
Professor Messer Videos
SIEM Dashboards (5:02)
Log Files (9:49)
Professor Messer Videos
Log Management (9:51)
Incident Response Process
Slides
Quiz
Case Study
Professor Messer Videos
Incident Reponse Process (10:27)
Incident Response Planning (12:09)
Attack Frameworks (7:21)
Post-Incident Mitigation Techniques
Slides
Quiz
Professor Messer Videos
Endpoint Security Configuration (4:26)
Security Configurations (8:10)
Digital Forensics Evidence
Slides
Quiz
Professor Messer Videos
Digital Forensics (8:11)
Managing Evidence (6:18)
Digital Forensics Evidence Acquisition
Slides
Quiz
Case Study
Professor Messer Videos
Forensics Data Acquisition (10:33)
On-Premises vs. Cloud Forensics (4:33)
Unit 1 - Intro to Linux
Linux File Manipulation Tools
Slides
Quiz
Lab: Linux 101
Lab: Linux 102
Linux Command Cheat Sheet
Professor Messer Videos
File Manipulation Tools (13:36)
Network Reconnaissance and Discovery Tools
Slides
Quiz
Lab: ifconfig
Lab: Traceroute
Professor Messer Videos
Reconnaissance Tools – Part 1 (17:33)
Reconnaissance Tools – Part 2 (17:53)
Shell and Script Environments
Slides
Quiz
Professor Messer Videos
Shell and Script Environments (4:17)
Packet Capture and Replay Tools
Slides
Quiz
Lab: TCPDump
Lab: Wireshark
Professor Messer Videos
Packet Tools (4:43)
Unit 15 - Governance, Risk, and Compliance
Professor Messer Video
Security Controls (4:14)
Security Regulations
Slides
Quiz
Professor Messer Video
Security Regulations and Standards (4:33)
Professor Messer Video
Security Frameworks (7:31)
Professor Messer Video
Secure Configurations (5:23)
Personnel Management
Slides
Quiz
Professor Messer Video
Personnel Security (10:10)
Personnel Agreement & Policies
Slides
Quiz
Professor Messer Video
Credential Policies (7:50)
Organizational Policies (4:37)
Professor Messer Video
Risk Management Types (5:56)
Risk Management Strategies
Slides
Quiz
Professor Messer Video
Risk Management Types (5:56)
Professor Messer Video
Risk Analysis (11:01)
Business Impact Analysis
Slides
Quiz
Professor Messer Video
Business Impact Analysis (7:48)
Organizational Breach Consequences
Slides
Quiz
Case Study - Sony Playstation Breach
Case Study - Failure to Disclose
Professor Messer Video
Privacy and Data Breaches (5:44)
Handling Sensitive Data
Slides
Quiz
Case Study - Handling Sensitive Data
Professor Messer Video
Enhancing Privacy (7:35)
Data Roles and Responsibilities
Slides
Quiz
Professor Messer Video
Data Roles and Responsibilities (2:53)
Data Assessments, Agreements, and Notices
Slides
Quiz
Professor Messer Video
Data Classifications (5:12)