Foundations of Cybersecurity

Unit 15 - Governance, Risk, and Compliance

Security Controls
Slides
Quiz

Professor Messer Video
Security Controls (4:14)

Security Frameworks
Slides
Quiz

Professor Messer Video
Security Frameworks (7:31)

Security Guides
Slides
Quiz

Professor Messer Video
Secure Configurations (5:23)

Personnel Management
Slides
Quiz

Professor Messer Video
Personnel Security (10:10)

Personnel Agreement & Policies
Slides
Quiz

Professor Messer Video
Credential Policies (7:50)
Organizational Policies (4:37)

Risk Types
Slides
Quiz

Professor Messer Video
Risk Management Types (5:56)

Risk Management Strategies
Slides
Quiz

Professor Messer Video
Risk Management Types (5:56)

Risk Assessment
Slides
Quiz

Professor Messer Video
Risk Analysis (11:01)

Business Impact Analysis
Slides
Quiz

Professor Messer Video
Business Impact Analysis (7:48)

Data Roles and Responsibilities
Slides
Quiz

Professor Messer Video
Data Roles and Responsibilities (2:53)

Data Assessments, Agreements, and Notices
Slides
Quiz

Professor Messer Video
Data Classifications (5:12)

Unit 14 - Mobile Devices and PKI

Mobile Device Connectivity
Slides
Quiz

Professor Messer Video
Mobile Networks (9:58)
Mobile Device Security (5:34)

Mobile Device Management
Slides
Quiz

Case Study - Geolocation

Professor Messer Video
Mobile Device Management (13:44)

Mobile Device Enforcement
Slides
Quiz

Professor Messer Video
Mobile Device Enforcement (13:50)

Mobile Device Deployment
Slides
Quiz

Professor Messer Video
Mobile Deployment Models (4:19)

Cloud Security Solutions
Slides
Quiz

Professor Messer Video
Cloud Security Solutions (6:32)

PKI Components
Slides
Quiz

Professor Messer Video
Public Key Infrastructure (13:07)

PKI Certificates
Slides
Quiz

Lab - Certificates

Professor Messer Video
Certificates (8:04)

PKI Certificate Formats
Slides
Quiz

Professor Messer Video
Certificate Formats (4:23)

PKI Concepts
Slides
Quiz

Professor Messer Video
Certificate Concepts (7:52)

Unit 13 - Network Security

Load Balancing
Slides
Quiz

Professor Messer Video
Load Balancing (6:35)

Network Segmentation
Slides
Quiz

Professor Messer Video
Network Segmentation (9:49)

Network Appliances
Slides
Quiz

Professor Messer Video
Other Network Appliances (4:31)

Network Access Control
Slides
Quiz

Professor Messer Video
Network Access Control (5:06)

Port Security
Slides
Quiz

Professor Messer Video
Port Security (10:25)

Access Control List
Slides
Quiz

Professor Messer Video
Network Access Control (5:06)

Unit 12 - Architecture and Design

Configuration Management
Slides
Quiz

Professor Messer Video
Configuration Management (5:15)

Security Concepts
Slides
Quiz

Cloud Deployment Model
Slides
Quiz

Professor Messer Video
Cloud Deployment Models

Cloud Computing Concepts
Slides
Quiz

Professor Messer Video
Cloud Models (11:19)

Application Development Environments
Slides
Quiz

Professor Messer Video
Secure Deployments (6:26)

Provisioning, Deprovisioning, and Integrity
Slides
Quiz

Professor Messer Video
Provisioning and Deprovisioning (5:50)

Software Diversity
Slides
Quiz

Professor Messer Video
Software Diversity (2:05)

Software Automation
Slides
Quiz

Professor Messer Video
Automation and Scripting (3:09)

Backup Types
Slides
Quiz

Professor Messer Video
Backup Types (10:26)

Non-persistence, Availability, and Restoration Order
Slides
Quiz

Diversity Security
Slides
Quiz

Embedded Systems and Specialized Tools
Slides
Quiz

Case Study - Fish Tank Casino Hack

Professor Messer Video
Embedded Systems (13:39)

Embedded Systems Communications and Constraints
Slides
Quiz

Professor Messer Video
Embedded Systems Communication (5:43)
Embedded Systems Constraints (5:31)

Unit 11 - Malware and Attacks, Part 4

Rogue Access Points and Evil Twins
Slides
Quiz

Professor Messer Video
Rogue Access Points and Evil Twins (3:43)

Bluetooth Attacks
Slides
Quiz

Professor Messer Video
Bluejacking and Bluesnarfing (2:09)

Wireless Disassociation Attacks
Slides
Quiz

Case Study - Blocking WiFi

Professor Messer Video
Wireless Disassociation Attacks (5:50)

Wireless Jamming
Slides
Quiz

Case Study - GPS Jamming

Professor Messer Video
Wireless Jamming (3:15)

RFID and NFC Attacks
Slides
Quiz

Professor Messer Video
RFID and NFC Attacks (4:00)

Initialization Vector Attacks
Slides
Quiz

Professor Messer Video
Randomizing Cryptography (4:18)

Adversary-in-the-Middle Attack
Slides
Quiz

Professor Messer Video
On-Path Attacks (6:04)

DNS Attacks
Slides
Quiz

Professor Messer Video
DNS Attacks (8:19)

DoS and DDoS Attacks
Slides
Quiz

Lab - Denial of Service

Professor Messer Video
Denial of Service (8:35)

Malicious Code or Script Executions
Slides
Quiz

Professor Messer Video
Malicious Scripts (4:47)

Unit 10 - Malware and Attacks, Part 3

Juice Shop Set Up
Slides

Endpoint Projection
Slides
Quiz

Professor Messer Video
Endpoint Protection (9:48)

Boot Integrity
Slides
Quiz

Professor Messer Video
Boot Integrity (8:25)

Application Security
Slides
Quiz

Lab - Metadata Juice Shop

Professor Messer Video
Application Security (13:31)

Hardening
Slides
Quiz

Professor Messer Video
Application Hardening (9:49)

Hardware Security
Slides
Quiz

Lab - Brute Force Online

Professor Messer Video
Hardware Security

Unit 9 - Malware and Attacks, Part 2

API and Resource Exhaustion Attacks
Slides
Quiz

Error and Improper Input Handling
Slides
Quiz

Case Study - Chome Crash Catastrophe

PUPs and Fileless Viruses
Slides
Quiz

Lab - Trojan

Adware and Spyware
Slides
Quiz

Physical Attacks
Slides
Quiz

Professor Messer  Videos
Physical Attacks (6:03)

Adversarial AI
Slides
Quiz

Professor Messer Videos
Adversarial Artificial Intelligence (3:54)

Supply-Chain Attacks
Slides
Quiz

Professor Messer Videos
Supply Chain Attacks (3:27)

Cloud-Based vs. On-Premises Attacks
Slides
Quiz

Professor Messer Videos
Cloud-based vs. On-Premises Attacks (3:32)

Memory Leaks and SSL Stripping
Slides
Quiz

Professor Messer Videos
SSL Stripping (5:58)

Driver Manipulation Attacks
Slides
Quiz

Professor Messer  Videos
Driver Manipulation (4:51)

Unit 8 - Malware and Attacks, Part 1

Viruses and Worms
Slides
Quiz

Professor Messer Videos
Viruses and Worms (6:20)

Trojans, Backdoors, and RATs
Slides
Quiz

Professor Messer Videos
Trojans and RATs (5:26)

Bots and Botnets
Slides
Quiz

Case Study - Botnet

Professor Messer Videos
Bots and Botnets (2:30)

Unit 7 - Threat Vectors

Threat Vectors
Slides
Quiz

Professor Messer Videos
Attack Vectors (10:34)

Threat Intelligence Sources
Slides
Quiz

Professor Messer Videos
Threat Intelligence (10:46)
Threat Research (7:34)

Threat Hunting
Slides
Quiz

Professor Messer Videos
Threat Hunting (5:15)

Vulnerability Impacts
Slides
Quiz

Professor Messer Videos
Vulnerability Impacts (6:24)

Vulnerability Scans
Slides
Quiz

Professor Messer Videos
Vulnerability Scans (14:53)

SIEM and SOAR
Slides
Quiz

Professor Messer Videos
SIEM Dashboards (5:02)

Unit 6 - Social Engineering

Principles of Social Engineering
Slides
Quiz

Professor Messer Videos
Principles of Social Engineering (4:56)

Phishing and Spam
Slides
Quiz
Lab: Phishing

Professor Messer Videos
Phishing (8:57)
Spam (5:23)

Dumpster Diving
Slides
Quiz

Professor Messer Videos
Dumpster Diving (3:00)

Shoulder Surfing
Slides
Quiz

Professor Messer Videos
Shoulder Surfing (2:25)

Tailgating and Impersonation
Slides
Quiz

Professor Messer Videos
Impersonation (5:40)
Tailgating & Impersonation

Prepending
Slides
Quiz


Identity Fraud
Slides
Quiz

Reconnaissance
Slides
Quiz

Professor Messer Videos
Reconnaissance (5:08)

Watering Hole Attacks
Slides
Quiz
Case Study - Watering Hole

Professor Messer Videos
Watering Hole Attacks (4:02)

Client Hijacking Attacks
Slides
Quiz
Lab: Typosquatting

Unit 5 - Authentication and Security Protocols

Authentication Methods
Slides
Quiz

Professor Messer Videos
Authentication Methods (11:14)

Biometric Authentication
Slides
Quiz
Case Study: Biometrics

Professor Messer Videos
Biometrics (4:28)

AAA and Multi-Factor Authentication
Slides
Quiz

Professor Messer Videos
Multi-factor Authentication (9:00)

Account Types and Identities
Slides
Quiz

Professor Messer Videos
Account Types (7:08)

Account Policies
Slides
Quiz
Case Study: Equifax

Professor Messer Videos
Account Policies (8:34)

Account Access Control Models
Slides
Quiz

Professor Messer Videos
Access Control (10:04)

Physical Security Controls
Slides
Quiz

Professor Messer Videos
Physical Security Controls (19:15)

Wireless Cryptographic Protocols
Slides
Quiz
Case Study: Wireless Security

Professor Messer Videos
Wireless Cryptography (7:52)

Wireless Authentication Protocols
Slides
Quiz

Professor Messer Videos
Wireless Authentication Protocols (8:26)

Wireless Security Methods
Slides
Quiz

Professor Messer Videos
Wireless Authentication Methods (8:15)

Wireless Installation Considerations
Slides
Quiz

Professor Messer Videos
Installing Wireless Networks (7:32)

Unit 4 - Encryption and Cryptography

Cryptography Modes of Operation and Blockchains
Slides
Quiz

Professor Messer Videos
Blockchain Technology (3:14)

Block Ciphers and Lightweight Cryptography
Slides
Quiz

Professor Messer Videos
Stream and Block Ciphers (7:36)

Steganography and Homomorphic Encryption
Slides
Quiz

Lab: Steganography
Case Study

Professor Messer Videos
Steganography (3:47)

Common Cryptography Use Cases
Slides
Quiz

Professor Messer Videos
Cryptography Use Cases (3:36)

Cryptography Limitations
Slides
Quiz

Professor Messer Videos
Cryptography Limitations (6:35)

Quantum Cryptography and Ephemeral Keys
Slides
Quiz

Professor Messer Videos
Quantum Computing (5:45)

Database Security
Slides
Quiz
Lab: File Hashing

Professor Messer Videos
Database Security (7:18)

Cryptographic Attacks
Slides
Quiz
Lab: Collision
Lab: Cuckoo

Professor Messer Videos
Cryptographic Attacks (5:19)

Unit 3 - Passwords

Elliptic Curves and Perfect Forward Secrecy
Slides
Quiz

Password Cracking Tools
Slides
Quiz

Unit 2 - Forensics

Data Sanitization Tools
Slides
Quiz
Lab: Data Sanitization

Data Destruction
Slides
Quiz
Case Study: Data Destruction

Professor Messer Video
Secure Data Destruction (5:58)

Forensic Tools
Slides
Quiz
Lab: Autopsy

Professor Messer Video
Forensic Tools (9:11)

Log Files
Slides
Quiz

Professor Messer Videos
SIEM Dashboards (5:02)
Log Files (9:49)

Digital Forensics Evidence
Slides
Quiz

Professor Messer Videos
Digital Forensics (8:11)
Managing Evidence (6:18)

Unit 1 - Intro to Linux

Linux File Manipulation Tools
Slides
Quiz
Lab: Linux 101
Lab: Linux 102
Linux Command Cheat Sheet

Professor Messer Videos
File Manipulation Tools (13:36)

Shell and Script Environments
Slides
Quiz

Professor Messer Videos
Shell and Script Environments (4:17)

Packet Capture and Replay Tools
Slides
Quiz
Lab: TCPDump
Lab: Wireshark

Professor Messer Videos
Packet Tools (4:43)

Unit 15 - Governance, Risk, and Compliance

Security Controls
Slides
Quiz

Professor Messer Video
Security Controls (4:14)

Security Frameworks
Slides
Quiz

Professor Messer Video
Security Frameworks (7:31)

Security Guides
Slides
Quiz

Professor Messer Video
Secure Configurations (5:23)

Personnel Management
Slides
Quiz

Professor Messer Video
Personnel Security (10:10)

Personnel Agreement & Policies
Slides
Quiz

Professor Messer Video
Credential Policies (7:50)
Organizational Policies (4:37)

Risk Types
Slides
Quiz

Professor Messer Video
Risk Management Types (5:56)

Risk Management Strategies
Slides
Quiz

Professor Messer Video
Risk Management Types (5:56)

Risk Assessment
Slides
Quiz

Professor Messer Video
Risk Analysis (11:01)

Business Impact Analysis
Slides
Quiz

Professor Messer Video
Business Impact Analysis (7:48)

Data Roles and Responsibilities
Slides
Quiz

Professor Messer Video
Data Roles and Responsibilities (2:53)

Data Assessments, Agreements, and Notices
Slides
Quiz

Professor Messer Video
Data Classifications (5:12)