Segment One
Module 01 - Preserving Cybersecurity
- Maintaining cybersecurity
- Security breaches
- Industry certification
- Intrusion
- Hackers
- Cyber kill chain
- Dark web
- Cyberattacks
- CIA triad
- Defense mechanisms
- Security controls
- Countermeasures
- Cybersecurity careers
Module 02 - Vulnerabilities
- Vulnerabilities
- Default values
- Footprinting and port scanning
- DOS and DDOS
- Spoofing
- Malware
- Viruses and logic bombs
- DNS poisoning
- Hash functions
- Encryption
- Digital signatures and certificates
Module 03 - Access Control
- Types of access control
- Access control models
- Password management
- Types of firewalls
- Firewall configuration
- Intrusion prevention systems
- Honeypots
- Access control policies
- Multifactor authentication
- CIRT
- Incident response
Segment Two
Module 04 - Intrusion Detection Systems
- Intrusion detection systems
- NIDS Sensors
- Signature and behavior detection
- Security appliances
- Data loss prevention
- Spam filters
- Zero-day attacks
- Port, network, and vulnerability scanning
- Cybersecurity careers
Module 05 - Network Security
- Virtual computing environments
- Virtualization security and vulnerabilities
- Hypervisors
- Types of social engineering
- Consequences of social engineering
- Social media vulnerabilities
- Network design principles
- Careers in network administration
Module 06 - Cybersecurity and the Workplace
- Workplace safety
- Emergency procedures
- Emergency action plans
- Leadership
- Communication
- Mentoring
- Entrepreneurship
- Résumés and cover letters
- Business communication