Foundations of Cybersecurity
Digital Forensics
Cybersecurity Capstone

Network Segmentation
Slides
Quiz

Professor Messer Video
Network Segmentation (9:49)

Topic
Slides
Quiz

Professor Messer Video
Video

Topic
Slides
Quiz

Professor Messer Video
Video

Diversity Security
Slides
Quiz

Embedded Systems and Specialized Tools
Slides
Quiz

Case Study - Fish Tank Casino Hack

Professor Messer Video
Embedded Systems (13:39)

Embedded Systems Communications and Constraints
Slides
Quiz

Professor Messer Video
Embedded Systems Communication (5:43)
Embedded Systems Constraints (5:31)

Load Balancing
Slides
Quiz

Professor Messer Video
Load Balancing (6:35)

Software Automation
Slides
Quiz

Professor Messer Video
Automation and Scripting (3:09)

Backup Types
Slides
Quiz

Professor Messer Video
Backup Types (10:26)

Non-persistence, Availability, and Restoration Order
Slides
Quiz

Application Development Environments
Slides
Quiz

Professor Messer Video
Secure Deployments (6:26)

Provisioning, Deprovisioning, and Integrity
Slides
Quiz

Professor Messer Video
Provisioning and Deprovisioning (5:50)

Software Diversity
Slides
Quiz

Professor Messer Video
Software Diversity (2:05)

Configuration Management
Slides
Quiz

Professor Messer Video
Configuration Management (5:15)

Security Concepts
Slides
Quiz

Cloud Deployment Model
Slides
Quiz

Professor Messer Video
Cloud Deployment Models

Cloud Computing Concepts
Slides
Quiz

Professor Messer Video
Cloud Models (11:19)

DNS Attacks
Slides
Quiz

Professor Messer Video
DNS Attacks (8:19)

DoS and DDoS Attacks
Slides
Quiz

Lab - Denial of Service

Professor Messer Video
Denial of Service (8:35)

Malicious Code or Script Executions
Slides
Quiz

Professor Messer Video
Malicious Scripts (4:47)

Wireless Jamming
Slides
Quiz

Case Study - GPS Jamming

Professor Messer Video
Wireless Jamming (3:15)

RFID and NFC Attacks
Slides
Quiz

Professor Messer Video
RFID and NFC Attacks (4:00)

Initialization Vector Attacks
Slides
Quiz

Professor Messer Video
Randomizing Cryptography (4:18)

Adversary-in-the-Middle Attack
Slides
Quiz

Professor Messer Video
On-Path Attacks (6:04)

Deception and Disruptions
Slides
Quiz

Lab - Honeypot

Professor Messer Video
Honeypots and Deception (5:52)

Rogue Access Points and Evil Twins
Slides
Quiz

Professor Messer Video
Rogue Access Points and Evil Twins (3:43)

Bluetooth Attacks
Slides
Quiz

Professor Messer Video
Bluejacking and Bluesnarfing (2:09)

Wireless Disassociation Attacks
Slides
Quiz

Case Study - Blocking WiFi

Professor Messer Video
Wireless Disassociation Attacks (5:50)

Hardware Security
Slides
Quiz

Lab - Brute Force

Professor Messer Video
Hardware Security

Cross-site Scripting
Slides
Quiz

Lab - Cross-site Scripting

Professor Messer Video
Cross-site Scripting (7:25)

Dereferencing and Directory Traversal
Slides
Quiz

Lab - Directory Traversal

Endpoint Projection
Slides
Quiz

Professor Messer Video
Endpoint Protection (9:48)

Boot Integrity
Slides
Quiz

Professor Messer Video
Boot Integrity (8:25)

Application Security
Slides
Quiz

Lab - Fuzzing

Professor Messer Video
Application Security (13:31)

Hardening
Slides
Quiz

Professor Messer Video
Application Hardening (9:49)

Driver Manipulation Attacks
Slides
Quiz

Professor Messer  Videos
Driver Manipulation (4:51)

Juice Shop Set Up
Slides

Adversarial AI
Slides
Quiz

Professor Messer Videos
Adversarial Artificial Intelligence (3:54)

Supply-Chain Attacks
Slides
Quiz

Professor Messer Videos
Supply Chain Attacks (3:27)

Cloud-Based vs. On-Premises Attacks
Slides
Quiz

Professor Messer Videos
Cloud-based vs. On-Premises Attacks (3:32)

Memory Leaks and SSL Stripping
Slides
Quiz

Professor Messer Videos
SSL Stripping (5:58)

Error and Improper Input Handling
Slides
Quiz

Case Study - Chome Crash Catastrophe

Adware and Spyware
Slides
Quiz

Physical Attacks
Slides
Quiz

Professor Messer  Videos
Physical Attacks (6:03)

API and Resource Exhaustion Attacks
Slides
Quiz

PUPs and Fileless Viruses
Slides
Quiz

Vulnerability Scans
Slides
Quiz

Professor Messer Videos
Vulnerability Scans (14:53)

SIEM and SOAR
Slides
Quiz

Professor Messer Videos
SIEM Dashboards (5:02)

Pentest Exercise Types
Slides
Quiz

Professor Messer Videos
Reconnaissance (5:08)
Security Teams (4:17)

Threat Intelligence Sources
Slides
Quiz

Professor Messer Videos
Threat Intelligence (10:46)
Threat Research (7:34)

Vulnerability Impacts
Slides
Quiz

Professor Messer Videos
Vulnerability Impacts (6:24)

Threat Hunting
Slides
Quiz

Professor Messer Videos
Threat Hunting (5:15)

Reconnaissance
Slides
Quiz

Professor Messer Videos
Reconnaissance (5:08)

Watering Hole Attacks
Slides
Quiz
Case Study - Watering Hole

Professor Messer Videos
Watering Hole Attacks (4:02)

Client Hijacking Attacks
Slides
Quiz
Lab: Typosquatting

Shoulder Surfing
Slides
Quiz

Professor Messer Videos
Shoulder Surfing (2:25)

Tailgating and Impersonation
Slides
Quiz

Professor Messer Videos
Impersonation (5:40)
Tailgating & Impersonation

Prepending
Slides
Quiz


Identity Fraud
Slides
Quiz

Principles of Social Engineering
Slides
Quiz

Professor Messer Videos
Principles of Social Engineering (4:56)

Credential Harvesting
Slides
Quiz
Lab: Credential Harvesting

Professor Messer Videos

Phishing and Spam
Slides
Quiz
Lab: Phishing

Professor Messer Videos
Phishing (8:57)
Spam (5:23)

Dumpster Diving
Slides
Quiz

Professor Messer Videos
Dumpster Diving (3:00)

Wireless Authentication Protocols
Slides
Quiz

Professor Messer Videos
Wireless Authentication Protocols (8:26)

Wireless Security Methods
Slides
Quiz

Professor Messer Videos
Wireless Authentication Methods (8:15)

Wireless Installation Considerations
Slides
Quiz

Professor Messer Videos
Installing Wireless Networks (7:32)

Packet Capture and Replay Tools
Slides
Quiz
Lab: TCPDump
Lab: Wireshark

Professor Messer Videos
Packet Tools (4:43)

Account Access Control Models
Slides
Quiz

Professor Messer Videos
Access Control (10:04)

Physical Security Controls
Slides
Quiz

Professor Messer Videos
Physical Security Controls (19:15)

Wireless Cryptographic Protocols
Slides
Quiz
Case Study: Wireless Security

Professor Messer Videos
Wireless Cryptography (7:52)

AAA and Multi-Factor Authentication
Slides
Quiz

Professor Messer Videos
Multi-factor Authentication (9:00)

Account Types and Identities
Slides
Quiz

Professor Messer Videos
Account Types (7:08)

Account Policies
Slides
Quiz
Case Study: Equifax

Professor Messer Videos
Account Policies (8:34)

 Secure Coding Techniques
Slides
Quiz
Lab: Obfuscation

Professor Messer Videos
Secure Coding Techniques (11:33)

Authentication Methods
Slides
Quiz

Professor Messer Videos
Authentication Methods (11:14)

Biometric Authentication
Slides
Quiz
Case Study: Biometrics

Professor Messer Videos
Biometrics (4:28)

Common Cryptography Use Cases
Slides
Quiz

Professor Messer Videos
Cryptography Use Cases (3:36)

Cryptography Limitations
Slides
Quiz

Professor Messer Videos
Cryptography Limitations (6:35)

Database Security
Slides
Quiz
Lab: File Hashing

Professor Messer Videos
Database Security (7:18)

Cryptographic Attacks
Slides
Quiz
Lab: Collision
Lab: Cuckoo

Professor Messer Videos
Cryptographic Attacks (5:19)

Quantum Cryptography and Ephemeral Keys
Slides
Quiz
Case Study

Professor Messer Videos
Quantum Computing (5:45)

Cryptography Modes of Operation and Blockchains
Slides
Quiz

Professor Messer Videos
Blockchain Technology (3:14)

Block Ciphers and Lightweight Cryptography
Slides
Quiz

Professor Messer Videos
Stream and Block Ciphers (7:36)

Steganography and Homomorphic Encryption
Slides
Quiz
Lab: Steganography
Case Study

Professor Messer Videos
Steganography (3:47)

Elliptic Curves and Perfect Forward Secrecy
Slides
Quiz

Professor Messer Videos

Shell and Script Environments
Slides
Quiz

Professor Messer Videos
Shell and Script Environments (4:17)

Log File Types & Types of Logs
Log File Types     Quiz
Types of Logs      Quiz

Professor Messer Videos
SIEM Dashboards (5:02)
Log Files (9:49)
Log Management (9:51)


EPIC Cyber Range

Digital Forensics: WMFWZCQX9B
Foundations of Cybersecurity: LERWR0F6TU 

PicoCTF