Security Pro Outline

  • Videos: 133 (18:43:25)
  • Demonstrations: 95 (13:23:25)
  • Lab Simulations: 67
  • Written Lessons: 107
  • Section Quizzes: 69
  • Practice Exams: 25
  • Exam Questions: 920

Contents:

    1. 1.0 Introduction
      • 1.1 Security Overview
        • 1.1.1 Security Challenges (8:22)
        • 1.1.2 Security Roles and Concepts (5:36)
        • 1.1.3 Threat Agent Types (8:20)
        • 1.1.4 Security Introduction
        • 1.1.5 General Attack Strategy (8:51)
        • 1.1.6 General Defense Strategy (18:25)
        • 1.1.7 Attack and Defense Strategy Overview
        • 1.1.8 Exam Questions - Section 1.1 (12 questions)
      • 1.2 Using the Simulator
        • 1.2.1 Using the Simulator (13:19)
        • 1.2.2 Configure a Security Appliance
        • 1.2.3 Install a Security Appliance
    2. 2.0 Access Control and Identity Management
      • 2.1 Access Control Models
        • 2.1.1 Access Control Models (3:38)
        • 2.1.2 Access Control Facts
        • 2.1.3 Access Control Model Facts
        • 2.1.4 Access Control Model Examples
        • 2.1.5 Implementing Discretionary Access Control (1:34)
        • 2.1.6 Exam Questions - Section 2.1 (15 questions)
      • 2.2 Authentication
        • 2.2.1 Authentication (11:19)
        • 2.2.2 Authentication Facts
        • 2.2.3 Using a Biometric Scanner (3:49)
        • 2.2.4 Single Sign-on Facts
        • 2.2.5 Using Single Sign-on (12:20)
        • 2.2.6 Exam Questions - Section 2.2 (15 questions)
      • 2.3 Authorization
        • 2.3.1 Authorization (5:15)
        • 2.3.2 Cumulative Access (9:32)
        • 2.3.3 Authorization Facts
        • 2.3.4 Examining the Access Token (4:23)
        • 2.3.5 Exam Questions - Section 2.3 (4 questions)
      • 2.4 Access Control Best Practices
        • 2.4.1 Access Control Best Practices (3:12)
        • 2.4.2 Best Practices Facts
        • 2.4.3 Viewing Implicit Deny (3:26)
        • 2.4.4 Exam Questions - Section 2.4 (12 questions)
      • 2.5 Windows Domain Users and Groups
        • 2.5.1 Active Directory Introduction (9:04)
        • 2.5.2 Active Directory Structure (9:24)
        • 2.5.3 Viewing Active Directory (3:59)
        • 2.5.4 Active Directory Facts
        • 2.5.5 Creating User Accounts (3:13)
        • 2.5.6 Managing User Account Properties (13:20)
        • 2.5.7 User Account Management Facts
        • 2.5.8 Create User Accounts
        • 2.5.9 Manage User Accounts
        • 2.5.10 Managing Groups (4:10)
        • 2.5.11 Create a Group
        • 2.5.12 Create Global Groups
        • 2.5.13 Exam Questions - Section 2.5 (2 questions)
      • 2.6 Linux Users and Groups
        • 2.6.1 Linux User and Group Overview (19:14)
        • 2.6.2 Managing Linux Users (9:28)
        • 2.6.3 Linux User Commands and Files
        • 2.6.4 Create a User Account
        • 2.6.5 Rename a User Account
        • 2.6.6 Delete a User
        • 2.6.7 Change Your Password
        • 2.6.8 Change a User's Password
        • 2.6.9 Lock and Unlock User Accounts
        • 2.6.10 Managing Linux Groups (3:15)
        • 2.6.11 Linux Group Commands
        • 2.6.12 Rename and Create Groups
        • 2.6.13 Add Users to a Group
        • 2.6.14 Remove a User from a Group
        • 2.6.15 Exam Questions - Section 2.6 (10 questions)
      • 2.7 Linux User Security
        • 2.7.1 Linux User Security and Restrictions (9:53)
        • 2.7.2 Configuring Linux User Security and Restrictions (6:40)
        • 2.7.3 Linux User Security and Restriction Facts
        • 2.7.4 Exam Questions - Section 2.7 (5 questions)
      • 2.8 Group Policy Overview
        • 2.8.1 Group Policy Overview (8:41)
        • 2.8.2 Viewing Group Policy (7:47)
        • 2.8.3 Group Policy Facts
        • 2.8.4 Create and Link a GPO
        • 2.8.5 Exam Questions - Section 2.8 (3 questions)
      • 2.9 Hardening Authentication
        • 2.9.1 Hardening Authentication (19:31)
        • 2.9.2 Configuring User Account Restrictions (9:30)
        • 2.9.3 Configuring Account Policies and UAC Settings (14:18)
        • 2.9.4 Hardening User Accounts (10:20)
        • 2.9.5 Configuring Smart Card Authentication (4:39)
        • 2.9.6 Hardening Authentication Facts
        • 2.9.7 Configure User Account Restrictions
        • 2.9.8 Configure Account Policies
        • 2.9.9 Restrict Local Accounts
        • 2.9.10 Secure Default Accounts
        • 2.9.11 Enforce User Account Control
        • 2.9.12 Configure Smart Card Authentication
        • 2.9.13 Exam Questions - Section 2.9 (10 questions)
      • 2.10 Remote Access
        • 2.10.1 Remote Access (8:43)
        • 2.10.2 Remote Access Facts
        • 2.10.3 RADIUS and TACACS+ (6:51)
        • 2.10.4 RADIUS and TACACS+ Facts
        • 2.10.5 Exam Questions - Section 2.10 (15 questions)
      • 2.11 Network Authentication
        • 2.11.1 Network Authentication Protocols (14:09)
        • 2.11.2 Network Authentication via LDAP (10:30)
        • 2.11.3 Network Authentication Facts
        • 2.11.4 Controlling the Authentication Method (3:51)
        • 2.11.5 Configure Kerberos Policy Settings
        • 2.11.6 Browsing a Directory Tree via LDAP (6:38)
        • 2.11.7 Trusts and Transitive Access (5:33)
        • 2.11.8 Trusts and Transitive Access Facts
        • 2.11.9 Exam Questions - Section 2.11 (12 questions)
      • 2.12 Identity Management
        • 2.12.1 Identity Management (16:31)
        • 2.12.2 Identity Management Facts
        • 2.12.3 Exam Questions - Section 2.12 (2 questions)
    3. 3.0 Cryptography
      • 3.1 Cryptography
        • 3.1.1 Cryptography Concepts (4:29)
        • 3.1.2 Cryptography Facts
        • 3.1.3 Cryptographic Attacks (17:47)
        • 3.1.4 Cryptographic Attack Facts
        • 3.1.5 Exam Questions - Section 3.1 (15 questions)
      • 3.2 Hashing
        • 3.2.1 Hashing (11:31)
        • 3.2.2 Hashing Facts
        • 3.2.3 Using Hashes (7:43)
        • 3.2.4 Exam Questions - Section 3.2 (12 questions)
      • 3.3 Symmetric Encryption
        • 3.3.1 Symmetric Encryption (5:27)
        • 3.3.2 HMAC (6:13)
        • 3.3.3 Symmetric Encryption Facts
        • 3.3.4 Cracking a Symmetric Encryption Key (4:11)
        • 3.3.5 Exam Questions - Section 3.3 (15 questions)
      • 3.4 Asymmetric Encryption
        • 3.4.1 Asymmetric Encryption (8:56)
        • 3.4.2 Asymmetric Encryption Facts
        • 3.4.3 Exam Questions - Section 3.4 (11 questions)
      • 3.5 Public Key Infrastructure (PKI)
        • 3.5.1 Certificates (11:02)
        • 3.5.2 Managing Certificates (8:43)
        • 3.5.3 Manage Certificates
        • 3.5.4 Certificate Lifecycle Facts
        • 3.5.5 CA Implementation (5:17)
        • 3.5.6 Configuring a Subordinate CA (8:29)
        • 3.5.7 PKI Management Facts
        • 3.5.8 Exam Questions - Section 3.5 (15 questions)
      • 3.6 Cryptography Implementations
        • 3.6.1 Combining Cryptographic Methods (10:30)
        • 3.6.2 Hardware Based Encryption Devices (7:12)
        • 3.6.3 Cryptographic Implementation Facts
        • 3.6.4 Exam Questions - Section 3.6 (15 questions)
    4. 4.0 Policies, Procedures, and Awareness
      • 4.1 Security Policies
        • 4.1.1 Security Policies (7:23)
        • 4.1.2 Data Privacy Laws (9:42)
        • 4.1.3 Security Policy Facts
        • 4.1.4 Security Documentation Facts
        • 4.1.5 Security Management Facts
        • 4.1.6 Information Classification (5:40)
        • 4.1.7 Wiping a Hard Drive (12:58)
        • 4.1.8 Information Classification Facts
        • 4.1.9 Manageable Network Plan (16:49)
        • 4.1.10 Manageable Network Plan 2 (14:05)
        • 4.1.11 Manageable Network Plan Facts
        • 4.1.12 Exam Questions - Section 4.1 (15 questions)
      • 4.2 Business Continuity
        • 4.2.1 Business Continuity (2:39)
        • 4.2.2 Succession Planning (5:23)
        • 4.2.3 Business Continuity Facts
        • 4.2.4 Exam Questions - Section 4.2 (6 questions)
      • 4.3 Risk Management
        • 4.3.1 Risk Management (4:04)
        • 4.3.2 Security Controls (3:21)
        • 4.3.3 Risk Management Facts
        • 4.3.4 Exam Questions - Section 4.3 (15 questions)
      • 4.4 Incident Response
        • 4.4.1 First Responder (7:17)
        • 4.4.2 Basic Forensic Procedures (18:31)
        • 4.4.3 Incident Response Facts
        • 4.4.4 Using Forensic Tools (6:17)
        • 4.4.5 Exam Questions - Section 4.4 (10 questions)
      • 4.5 Social Engineering
        • 4.5.1 Social Engineering (4:39)
        • 4.5.2 Phishing Variations (13:04)
        • 4.5.3 Social Engineering Facts
        • 4.5.4 Investigating Social Engineering Attack (9:45)
        • 4.5.5 Respond to Social Engineering
        • 4.5.6 Exam Questions - Section 4.5 (15 questions)
      • 4.6 Certification and Accreditation
        • 4.6.1 Trusted Computing (10:01)
        • 4.6.2 Certification and Accreditation (5:20)
        • 4.6.3 Certification and Accreditation Facts
        • 4.6.4 Exam Questions - Section 4.6 (12 questions)
      • 4.7 Development
        • 4.7.1 System Development Life Cycle (8:40)
        • 4.7.2 System Development Life Cycle 2 (7:49)
        • 4.7.3 SDLC Facts
        • 4.7.4 Software Development Models
        • 4.7.5 Exam Questions - Section 4.7 (7 questions)
      • 4.8 Employee Management
        • 4.8.1 Employment Practices (13:45)
        • 4.8.2 Employee Management Facts
        • 4.8.3 Employee Documents Facts
        • 4.8.4 Ethics Facts
        • 4.8.5 Exam Questions - Section 4.8 (15 questions)
    5. 5.0 Physical Security
      • 5.1 Physical Security
        • 5.1.1 Physical Security (18:39)
        • 5.1.2 Tailgating and Piggybacking (3:28)
        • 5.1.3 Physical Security Facts
        • 5.1.4 Implement Physical Security
        • 5.1.5 Exam Questions - Section 5.1 (13 questions)
      • 5.2 Hardware Security
        • 5.2.1 Hardware Security Guidelines (7:50)
        • 5.2.2 Breaking into a System (7:30)
        • 5.2.3 Hardware Security Facts
        • 5.2.4 Exam Questions - Section 5.2 (2 questions)
      • 5.3 Environmental Controls
        • 5.3.1 Environmental Controls (6:00)
        • 5.3.2 Environmental Monitoring (11:33)
        • 5.3.3 Hot and Cold Aisles (5:17)
        • 5.3.4 Environmental Control Facts
        • 5.3.5 Fire Protection Facts
        • 5.3.6 Exam Questions - Section 5.3 (11 questions)
      • 5.4 Mobile Devices
        • 5.4.1 Mobile Device Security (7:33)
        • 5.4.2 Securing Mobile Devices (10:20)
        • 5.4.3 Mobile Device Security Facts
        • 5.4.4 Secure an iPad
        • 5.4.5 Exam Questions - Section 5.4 (3 questions)
      • 5.5 Telephony
        • 5.5.1 Telephony (15:00)
        • 5.5.2 Telephony Security Facts
        • 5.5.3 Exam Questions - Section 5.5 (4 questions)
    6. 6.0 Perimeter Defenses
      • 6.1 Networking Review
        • 6.1.1 OSI Model (4:08)
        • 6.1.2 OSI Model Facts
        • 6.1.3 IP Addressing (17:22)
        • 6.1.4 IP Address Facts
        • 6.1.5 Configuring IPv6 (2:39)
        • 6.1.6 IP Subnetting (12:35)
        • 6.1.7 Configuring Subnetting (8:07)
        • 6.1.8 Subnetting Facts
        • 6.1.9 Network Protocols (4:45)
        • 6.1.10 Network Protocol Facts
        • 6.1.11 Analyzing a TCP Three-way Handshake (2:14)
        • 6.1.12 TCP and UDP Ports (9:02)
        • 6.1.13 Common Ports
        • 6.1.14 Exam Questions - Section 6.1 (15 questions)
      • 6.2 Perimeter Attacks
        • 6.2.1 Reconnaissance (2:40)
        • 6.2.2 Performing Reconnaissance (9:01)
        • 6.2.3 Reconnaissance Facts
        • 6.2.4 Denial of Service (DoS) (7:49)
        • 6.2.5 Xmas Tree Attacks (3:23)
        • 6.2.6 DoS Attack Facts
        • 6.2.7 Performing a UDP Flood Attack (3:54)
        • 6.2.8 Session and Spoofing Attacks (6:41)
        • 6.2.9 Session Based Attack Facts
        • 6.2.10 Performing ARP Poisoning (4:24)
        • 6.2.11 Spoofing Facts
        • 6.2.12 DNS Attacks (4:30)
        • 6.2.13 DNS Attack Facts
        • 6.2.14 Examining DNS Attacks (11:12)
        • 6.2.15 Exam Questions - Section 6.2 (15 questions)
      • 6.3 Security Appliances
        • 6.3.1 Security Solutions (4:02)
        • 6.3.2 Security Zones (5:31)
        • 6.3.3 Security Zone Facts
        • 6.3.4 All-In-One Security Appliances (4:30)
        • 6.3.5 Security Solution Facts
        • 6.3.6 Configuring Network Security Appliance Access (6:55)
        • 6.3.7 Configure Network Security Appliance Access
        • 6.3.8 Exam Questions - Section 6.3 (3 questions)
      • 6.4 Demilitarized Zones (DMZ)
        • 6.4.1 Demilitarized Zones (9:49)
        • 6.4.2 Configuring a DMZ (5:42)
        • 6.4.3 Configure a DMZ
        • 6.4.4 DMZ Facts
        • 6.4.5 Exam Questions - Section 6.4 (7 questions)
      • 6.5 Firewalls
        • 6.5.1 Firewalls (5:33)
        • 6.5.2 Firewall Facts
        • 6.5.3 Configuring a Perimeter Firewall (9:46)
        • 6.5.4 Configure a Perimeter Firewall
        • 6.5.5 Exam Questions - Section 6.5 (15 questions)
      • 6.6 Network Address Translation (NAT)
        • 6.6.1 Network Address Translation (15:57)
        • 6.6.2 Configuring NAT (5:11)
        • 6.6.3 NAT Facts
        • 6.6.4 Exam Questions - Section 6.6 (6 questions)
      • 6.7 Virtual Private Networks (VPN)
        • 6.7.1 Virtual Private Networks (VPNs) (10:16)
        • 6.7.2 Configuring a VPN (4:25)
        • 6.7.3 Configure a Remote Access VPN
        • 6.7.4 Configure a VPN Connection iPad
        • 6.7.5 VPN Facts
        • 6.7.6 VPN Protocol Facts
        • 6.7.7 Exam Questions - Section 6.7 (11 questions)
      • 6.8 Web Threat Protection
        • 6.8.1 Web Threat Protection (9:29)
        • 6.8.2 Configuring Web Threat Protection (4:26)
        • 6.8.3 Configure Web Threat Protection
        • 6.8.4 Web Threat Protection Facts
        • 6.8.5 Exam Questions - Section 6.8 (2 questions)
      • 6.9 Network Access Control (NAC)
        • 6.9.1 Network Access Protection (19:58)
        • 6.9.2 Implementing NAP with DHCP Enforcement (15:56)
        • 6.9.3 NAP Facts
        • 6.9.4 Exam Questions - Section 6.9 (4 questions)
      • 6.10 Wireless Attacks
        • 6.10.1 Wireless Attacks (13:28)
        • 6.10.2 Wireless Attack Facts
        • 6.10.3 Using Wireless Attack Tools (9:06)
        • 6.10.4 Exam Questions - Section 6.10 (12 questions)
      • 6.11 Wireless Defenses
        • 6.11.1 Wireless Networking Overview (5:35)
        • 6.11.2 Wireless Security Considerations (12:54)
        • 6.11.3 Wireless Security Consideration Facts
        • 6.11.4 Wireless Encryption (6:45)
        • 6.11.5 Wireless Authentication (4:40)
        • 6.11.6 Wireless Authentication and Encryption Facts
        • 6.11.7 Configuring a Wireless Access Point (19:54)
        • 6.11.8 Configuring a Wireless Connection (12:22)
        • 6.11.9 Secure a Wireless Network
        • 6.11.10 Secure a Wireless Network 2
        • 6.11.11 Configure a Wireless Profile
        • 6.11.12 Exam Questions - Section 6.11 (15 questions)
    7. 7.0 Network Defenses
      • 7.1 Network Devices
        • 7.1.1 Network Devices (5:51)
        • 7.1.2 Network Device Facts
        • 7.1.3 Exam Questions - Section 7.1 (6 questions)
      • 7.2 Network Device Vulnerabilities
        • 7.2.1 Device Vulnerabilities (1:47)
        • 7.2.2 Device Vulnerability Facts
        • 7.2.3 Searching Defaultpasswords.com (1:30)
        • 7.2.4 Securing a Switch (3:21)
        • 7.2.5 Secure a Switch
        • 7.2.6 Exam Questions - Section 7.2 (2 questions)
      • 7.3 Switch Attacks
        • 7.3.1 Switch Attacks (5:04)
        • 7.3.2 Switch Attack Facts
        • 7.3.3 Exam Questions - Section 7.3 (4 questions)
      • 7.4 Router and Switch Security
        • 7.4.1 Router Security (8:56)
        • 7.4.2 Router Security Facts
        • 7.4.3 Switch Security (13:01)
        • 7.4.4 Switch Loop Protection (10:46)
        • 7.4.5 Switch Security Facts
        • 7.4.6 Configuring VLANs from the CLI (4:32)
        • 7.4.7 Explore VLANs from the CLI
        • 7.4.8 Configuring VLANs (3:32)
        • 7.4.9 Explore VLANs
        • 7.4.10 Hardening a Switch (14:10)
        • 7.4.11 Harden a Switch
        • 7.4.12 Secure Access to a Switch
        • 7.4.13 Secure Access to a Switch 2
        • 7.4.14 Exam Questions - Section 7.4 (14 questions)
      • 7.5 Intrusion Detection and Prevention
        • 7.5.1 Intrusion Detection (7:13)
        • 7.5.2 Detection vs. Prevention Controls (7:50)
        • 7.5.3 IDS Facts
        • 7.5.4 Implementing Intrusion Monitoring (3:33)
        • 7.5.5 Implementing Intrusion Prevention (7:51)
        • 7.5.6 Implement Intrusion Prevention
        • 7.5.7 Exam Questions - Section 7.5 (15 questions)
    8. 8.0 Host Defenses
      • 8.1 Malware
        • 8.1.1 Malware (9:28)
        • 8.1.2 Malware Facts
        • 8.1.3 Malware Protection Facts
        • 8.1.4 Implementing Malware Protections (23:43)
        • 8.1.5 Using Windows Defender (14:22)
        • 8.1.6 Configure Windows Defender
        • 8.1.7 Exam Questions - Section 8.1 (14 questions)
      • 8.2 Password Attacks
        • 8.2.1 Password Attacks (2:04)
        • 8.2.2 Password Attack Facts
        • 8.2.3 Using Rainbow Tables (4:48)
        • 8.2.4 Capturing Passwords (5:40)
        • 8.2.5 Exam Questions - Section 8.2 (3 questions)
      • 8.3 Windows System Hardening
        • 8.3.1 Operating System Hardening (5:13)
        • 8.3.2 Hardening Facts
        • 8.3.3 Hardening an Operating System (6:41)
        • 8.3.4 Managing Automatic Updates (18:31)
        • 8.3.5 Configure Automatic Updates
        • 8.3.6 Configuring Windows Firewall (10:11)
        • 8.3.7 Configure Windows Firewall
        • 8.3.8 Configuring Windows Firewall Advanced Features (16:59)
        • 8.3.9 Configuring Parental Controls (18:21)
        • 8.3.10 Configure Parental Controls
        • 8.3.11 Exam Questions - Section 8.3 (8 questions)
      • 8.4 Hardening Enforcement
        • 8.4.1 Hardening Enforcement with GPOs (1:50)
        • 8.4.2 Using Security Templates and Group Policy (6:53)
        • 8.4.3 Configuring GPOs to Enforce Security (15:24)
        • 8.4.4 Hardening Enforcement Facts
        • 8.4.5 Manage Services with Group Policy
        • 8.4.6 Exam Questions - Section 8.4 (4 questions)
      • 8.5 File Server Security
        • 8.5.1 File Server Security (7:58)
        • 8.5.2 Scanning for Open Ports (3:52)
        • 8.5.3 File System Security Facts
        • 8.5.4 File Permission Facts
        • 8.5.5 Configuring NTFS Permissions (16:41)
        • 8.5.6 Configure NTFS Permissions
        • 8.5.7 Exam Questions - Section 8.5 (8 questions)
      • 8.6 Linux Host Security
        • 8.6.1 Linux Host Security (7:10)
        • 8.6.2 Removing Unneeded Services and Scanning Ports (6:29)
        • 8.6.3 Network Security Facts
        • 8.6.4 Exam Questions - Section 8.6 (4 questions)
    9. 9.0 Application Defenses
      • 9.1 Web Application Attacks
        • 9.1.1 Web Application Attacks (2:49)
        • 9.1.2 Cross-site Request Forgery (XSRF) Attack (10:51)
        • 9.1.3 Injection Attacks (14:30)
        • 9.1.4 Header Manipulation (9:01)
        • 9.1.5 Zero Day Application Attacks (6:59)
        • 9.1.6 Client Side Attacks (6:22)
        • 9.1.7 Web Application Attack Facts
        • 9.1.8 Preventing Cross-site Scripting (4:05)
        • 9.1.9 Exam Questions - Section 9.1 (12 questions)
      • 9.2 Internet Browsers
        • 9.2.1 Managing Security Zones and Add-ons (20:26)
        • 9.2.2 Configuring IE Enhanced Security (9:11)
        • 9.2.3 Managing Cookies (12:38)
        • 9.2.4 Configure Cookie Handling
        • 9.2.5 Clearing the Browser Cache (9:28)
        • 9.2.6 Clear the Browser Cache
        • 9.2.7 Implementing Popup Blockers (7:26)
        • 9.2.8 Configure IE Popup Blocker
        • 9.2.9 Internet Explorer Security Facts
        • 9.2.10 Enforcing IE Settings through GPO (8:38)
        • 9.2.11 Enforce IE Settings through GPO
        • 9.2.12 Exam Questions - Section 9.2 (6 questions)
      • 9.3 E-mail
        • 9.3.1 E-mail Security (4:43)
        • 9.3.2 E-mail Security Facts
        • 9.3.3 Protecting a Client from Spam (10:29)
        • 9.3.4 Securing an E-mail Server (2:45)
        • 9.3.5 Configure E-mail Filters
        • 9.3.6 Securing E-mail on iPad (5:52)
        • 9.3.7 Secure E-mail on iPad
        • 9.3.8 Exam Questions - Section 9.3 (7 questions)
      • 9.4 Network Applications
        • 9.4.1 Network Application Security (2:19)
        • 9.4.2 Spim (3:43)
        • 9.4.3 Network Application Facts
        • 9.4.4 Using Peer-to-peer Software (3:04)
        • 9.4.5 Securing Windows Messenger (2:48)
        • 9.4.6 Exam Questions - Section 9.4 (3 questions)
      • 9.5 Virtualization
        • 9.5.1 Virtualization Introduction (4:01)
        • 9.5.2 Virtualization Benefits (3:08)
        • 9.5.3 Load Balancing with Virtualization (10:39)
        • 9.5.4 Virtualization Facts
        • 9.5.5 Managing Virtual Machines (20:37)
        • 9.5.6 Exam Questions - Section 9.5 (5 questions)
      • 9.6 Application Development
        • 9.6.1 Secure Coding Concepts (16:18)
        • 9.6.2 Application Hardening (11:02)
        • 9.6.3 Application Development Security Facts
        • 9.6.4 Hardening Applications on Linux (4:26)
        • 9.6.5 Implementing Application Whitelisting with AppLocker (13:03)
        • 9.6.6 Implement Application Whitelisting with AppLocker
        • 9.6.7 Implementing Data Execution Preventions (DEP) (4:01)
        • 9.6.8 Implement Data Execution Preventions (DEP)
        • 9.6.9 Hardening Applications Facts
        • 9.6.10 Exam Questions - Section 9.6 (2 questions)
    10. 10.0 Data Defenses
      • 10.1 Redundancy
        • 10.1.1 Redundancy (4:55)
        • 10.1.2 Redundancy Measurement Parameters (5:12)
        • 10.1.3 Redundancy Facts
        • 10.1.4 RAID (7:27)
        • 10.1.5 Implementing RAID (5:22)
        • 10.1.6 RAID Facts
        • 10.1.7 Configure Fault Tolerant Volumes
        • 10.1.8 Clustering (9:06)
        • 10.1.9 Clustering Facts
        • 10.1.10 Exam Questions - Section 10.1 (15 questions)
      • 10.2 Backup and Restore
        • 10.2.1 Backup and Restore (13:27)
        • 10.2.2 Backup and Restore Facts
        • 10.2.3 Backup Management Facts
        • 10.2.4 Performing System Backups (7:22)
        • 10.2.5 Schedule an Automatic Backup
        • 10.2.6 Exam Questions - Section 10.2 (15 questions)
      • 10.3 File Encryption
        • 10.3.1 Encrypting File System (EFS) (11:47)
        • 10.3.2 Securing Files using EFS (11:45)
        • 10.3.3 Encrypt Files with EFS
        • 10.3.4 PGP and GPG (4:34)
        • 10.3.5 Encrypting Files with GPG (4:58)
        • 10.3.6 BitLocker and Database Encryption (13:02)
        • 10.3.7 Configuring BitLocker (6:17)
        • 10.3.8 Configure BitLocker with a TPM
        • 10.3.9 File Encryption Facts
        • 10.3.10 Exam Questions - Section 10.3 (6 questions)
      • 10.4 Secure Protocols
        • 10.4.1 Secure Protocols (8:44)
        • 10.4.2 Secure Protocols 2 (15:26)
        • 10.4.3 Secure Protocols Facts
        • 10.4.4 Adding SSL to a Web Site (5:23)
        • 10.4.5 Allow SSL Connections
        • 10.4.6 IPSec (5:14)
        • 10.4.7 IPSec Facts
        • 10.4.8 Requiring IPSec for Communications (14:22)
        • 10.4.9 Exam Questions - Section 10.4 (15 questions)
      • 10.5 Cloud Computing
        • 10.5.1 Cloud Computing Introduction (15:59)
        • 10.5.2 Cloud Computing Security Issues (6:32)
        • 10.5.3 Cloud Computing Facts
        • 10.5.4 Exam Questions - Section 10.5 (3 questions)
    11. 11.0 Assessments and Audits
      • 11.1 Vulnerability Assessment
        • 11.1.1 Vulnerability Assessment (4:54)
        • 11.1.2 Vulnerability Assessment Facts
        • 11.1.3 Scanning a Network with Nessus (18:26)
        • 11.1.4 Scanning a Network with Retina (12:12)
        • 11.1.5 Scanning for Vulnerabilities Using MBSA (6:02)
        • 11.1.6 Review a Vulnerability Scan 1
        • 11.1.7 Review a Vulnerability Scan 2
        • 11.1.8 Review a Vulnerability Scan 3
        • 11.1.9 Performing Port and Ping Scans (2:36)
        • 11.1.10 Checking for Weak Passwords (9:21)
        • 11.1.11 Exam Questions - Section 11.1 (12 questions)
      • 11.2 Penetration Testing
        • 11.2.1 Penetration Testing (2:32)
        • 11.2.2 Penetration Testing Facts
        • 11.2.3 Exploring Penetration Testing Tools (11:22)
        • 11.2.4 Exam Questions - Section 11.2 (9 questions)
      • 11.3 Protocol Analyzers
        • 11.3.1 Protocol Analyzers (3:07)
        • 11.3.2 Protocol Analyzer Facts
        • 11.3.3 Analyzing Network Traffic (6:50)
        • 11.3.4 Exam Questions - Section 11.3 (8 questions)
      • 11.4 Logs and Audits
        • 11.4.1 Logs (3:24)
        • 11.4.2 Log Facts
        • 11.4.3 Logging Events with Event Viewer (3:52)
        • 11.4.4 Audits (3:13)
        • 11.4.5 Audit Facts
        • 11.4.6 Auditing the Windows Security Log (11:41)
        • 11.4.7 Configure Advanced Audit Policy
        • 11.4.8 Auditing Device Logs (7:01)
        • 11.4.9 Enable Device Logs
        • 11.4.10 Exam Questions - Section 11.4 (15 questions)
    12. Security Pro Practice Exams
      • Preparing for Certification
        • Security Pro Exam Objectives
        • How to take the Certification Exam
        • Certification FAQs
      • Security Pro Domain 1: Access Control and Identity Management (21 simulation questions)
      • Security Pro Domain 2: Policies, Procedures, Awareness (1 simulation question)
      • Security Pro Domain 3: Physical Security (3 simulation questions)
      • Security Pro Domain 4: Perimeter Defenses (9 simulation questions)
      • Security Pro Domain 5: Network Defenses (7 simulation questions)
      • Security Pro Domain 6: Host Defenses (7 simulation questions)
      • Security Pro Domain 7: Application Defenses (8 simulation questions)
      • Security Pro Domain 8: Data Defenses (5 simulation questions)
      • Security Pro Domain 9: Audits and Assessments (5 simulation questions)
      • Security Pro Certification Practice Exam (15 simulation questions)
    13. Security+ Practice Exams
      • Preparing for Certification
        • Exam Objectives
        • Exam FAQs
        • How to Register for an Exam
        • Exam-taking Hints and Tips
      • Security+ Domain 1: Network Security, All Questions (153 questions)
      • Security+ Domain 2: Compliance and Operational Security, All Questions (122 questions)
      • Security+ Domain 3: Threats and Vulnerabilities, All Questions (142 questions)
      • Security+ Domain 4: Application, Data and Host Security, All Questions (30 questions)
      • Security+ Domain 5: Access Control and Identity Management, All Questions (85 questions)
      • Security+ Domain 6: Cryptography, All Questions (88 questions)
      • Security+ Certification Practice Exam (100 questions)
    14. SSCP Practice Exams
      • Preparing for Certification
        • Exam Objectives
        • Exam FAQs
      • SSCP Domain 1: Access Control, All Questions (58 questions)
      • SSCP Domain 2: Security Operations & Administration, All Questions (64 questions)
      • SSCP Domain 3: Monitoring and Analysis, All Questions (22 questions)
      • SSCP Domain 4: Risk, Response, and Recovery, All Questions (42 questions)
      • SSCP Domain 5: Cryptography, All Questions (90 questions)
      • SSCP Domain 6: Networks and Communications, All Questions (87 questions)
      • SSCP Domain 7: Malicious Code and Attacks, All Questions (87 questions)
      • SSCP Certification Practice Exam (125 questions)