Trial, buy to get premium features

Previous Buy now to get complete version Next
  • Home
uCertify Logo
    • Your cart is empty
    • Continue Shopping
    • View Cart
  • login
  • Signup
    • Help & Support
    • Accessibility
    • Testimonials
  • Powered by uCertify
  • Request Demo
  • Cart 0
    • Your cart is empty
    • Continue Shopping
    • View Cart
  • Hello GuestLogin or Signup
  • Feedback & Support
    • Support
    • Keyboard Shortcuts
    • Send Feedback
Scroll to top button

Computer Security Fundamentals 5e

(COMP-SEC-FUNDA.AB1) / ISBN: 978-1-64459-416-2
This course includes
Lessons
TestPrep
LiveLab
Mentoring (Add-on)
COMP-SEC-FUNDA.AB1 : Computer Security Fundamentals 5e
$140
Buy Now
Try this course Pre-Assessment and first two Lessons free No credit card required
Are you an instructor? Teach using uCertify products
Request a free evaluation copy

Computer Security Fundamentals 5e

This course is a guide for any computer-savvy person. This means system administrators who are not security experts and anyone who has a working knowledge of computers and wishes to know more about cyber crime and cyber terrorism could find this course useful. However, the core audience will be students who wish to take a first course in security but may not have a thorough background in computer networks. This course contains assessment questions, interactive lessons with knowledge checks and quizzes, and live labs to get a detailed understanding of concepts such as computer security, networks and the Internet, DoS attacks, malware, security policies, cyber terrorism, and so on.
Here's what you will get

Lessons
  • 17+ Lessons
  • 302+ Exercises
  • 255+ Quizzes
  • 108+ Flashcards
  • 108+ Glossary of terms
TestPrep
  • 100+ Pre Assessment Questions
  • 100+ Post Assessment Questions
LiveLab
  • 29+ LiveLab
  • 29+ Video tutorials
  • 46+ Minutes
Here's what you will learn
Download Course Outline
Lesson 1: Introduction
  • About This eBook
Lesson 2: Introduction to Computer Security
  • Introduction
  • How Seriously Should You Take Threats to Network Security?
  • Identifying Types of Threats
  • Assessing the Likelihood of an Attack on Your Network
  • Basic Security Terminology
  • Concepts and Approaches
  • How Do Legal Issues Impact Network Security?
  • Online Security Resources
  • Summary
Lesson 3: Networks and the Internet
  • Introduction
  • Network Basics
  • How the Internet Works
  • History of the Internet
  • Basic Network Utilities
  • Other Network Devices
  • Advanced Network Communications Topics
  • Cloud Computing
  • Summary
Lesson 4: Cyber Stalking, Fraud, and Abuse
  • Introduction
  • How Internet Fraud Works
  • Identity Theft
  • Cyber Stalking
  • Protecting Yourself Against Cybercrime
  • Summary
Lesson 5: Denial of Service Attacks
  • Introduction
  • DoS Attacks
  • Illustrating an Attack
  • Common Tools Used for DoS Attacks
  • DoS Weaknesses
  • Specific DoS Attacks
  • Real-World Examples of DoS Attacks
  • How to Defend Against DoS Attacks
  • Summary
Lesson 6: Malware
  • Introduction
  • Viruses
  • Trojan Horses
  • The Buffer-Overflow Attack
  • Spyware
  • Other Forms of Malware
  • Detecting and Eliminating Viruses and Spyware
  • Summary
Lesson 7: Techniques Used by Hackers
  • Introduction
  • Basic Terminology
  • The Reconnaissance Phase
  • Actual Attacks
  • Malware Creation
  • Penetration Testing
  • The Dark Web
  • Summary
Lesson 8: Industrial Espionage in Cyberspace
  • Introduction
  • What Is Industrial Espionage?
  • Information as an Asset
  • Real-World Examples of Industrial Espionage
  • How Does Espionage Occur?
  • Protecting Against Industrial Espionage
  • Trade Secrets
  • The Industrial Espionage Act
  • Spear Phishing
  • Summary
Lesson 9: Encryption
  • Introduction
  • Cryptography Basics
  • History of Encryption
  • Modern Cryptography Methods
  • Public Key (Asymmetric) Encryption
  • PGP
  • Legitimate Versus Fraudulent Encryption Methods
  • Digital Signatures
  • Hashing
  • MAC and HMAC
  • Steganography
  • Cryptanalysis
  • Cryptography Used on the Internet
  • Quantum Computing Cryptography
  • Summary
Lesson 10: Computer Security Technology
  • Introduction
  • Virus Scanners
  • Firewalls
  • Antispyware
  • IDSs
  • Digital Certificates
  • SSL/TLS
  • Virtual Private Networks
  • Wi-Fi Security
  • Summary
Lesson 11: Security Policies
  • Introduction
  • What Is a Policy?
  • Important Standards
  • Defining User Policies
  • Defining System Administration Policies
  • Security Breaches
  • Defining Access Control
  • Development Policies
  • Standards, Guidelines, and Procedures
  • Disaster Recovery
  • Zero Trust
  • Important Laws
  • Summary
Lesson 12: Network Scanning and Vulnerability Scanning
  • Introduction
  • Basics of Assessing a System
  • Securing Computer Systems
  • Scanning Your Network
  • Testing and Scanning Standards
  • Getting Professional Help
  • Summary
Lesson 13: Cyber Terrorism and Information Warfare
  • Introduction
  • Actual Cases of Cyber Terrorism
  • Weapons of Cyber Warfare
  • Economic Attacks
  • Military Operations Attacks
  • General Attacks
  • Supervisory Control and Data Acquisitions (SCADA)
  • Information Warfare
  • Actual Cases of Cyber Terrorism
  • Future Trends
  • Defense Against Cyber Terrorism
  • Terrorist Recruiting and Communication
  • TOR and the Dark Web
  • Summary
Lesson 14: Cyber Detective
  • Introduction
  • General Searches
  • Company Searches
  • Court Records and Criminal Checks
  • Usenet
  • Google
  • Maltego
  • Summary
Lesson 15: Introduction to Forensics
  • Introduction
  • General Guidelines
  • Finding Evidence on a PC
  • Finding Evidence in System Logs
  • Getting Back Deleted Files
  • Operating System Utilities
  • The Windows Registry
  • Mobile Forensics: Cell Phone Concepts
  • The Need for Forensic Certification
  • Expert Witnesses
  • Additional Types of Forensics
  • Summary
Lesson 16: Cybersecurity Engineering
  • Introduction
  • Defining Cybersecurity Engineering
  • Standards
  • SecML
  • Modeling
  • Summary
Appendix A: Resources
  • General Computer Crime and Cyber Terrorism
  • General Knowledge
  • Cyber Stalking
  • Identity Theft
  • Port Scanners and Sniffers
  • Password Crackers
  • Countermeasures
  • Cyber Investigation Tools
  • General Tools
  • Virus Research

Hands on Activities (Live Labs)

Networks and the Internet

  • Using the tracert command
  • Using the ping Command
  • Using Routes
  • Using the netstat command
  • Using ARP
  • Using the ipconfig Command
  • Using the nslookup command for Passive Reconnaissance

Cyber Stalking, Fraud, and Abuse

  • Performing a Phishing Attack

Denial of Service Attacks

  • Performing DoS Attacks with an SYN Flood
  • Performing a DHCP Starvation Attack
  • Simulating the DDoS Attack with an SYN Flood
  • Protecting Yourself from the DOS Attack

Malware

  • Detecting Viruses using Windows Defender
  • Creating a RAT
  • Using eLiTeWrap

Techniques Used by Hackers

  • Using nmap for Network Enumeration
  • Cracking a Linux Password using John the Ripper

Encryption

  • Creating PGP Certification
  • Observing the SHA-Generated Hash Value
  • Using Rainbow Tables
  • Using Steganography

Computer Security Technology

  • Configuring Snort

Network Scanning and Vulnerability Scanning

  • Configuring Iptables to Block ICMP Packets
  • Disabling a Service
  • Performing an MBSA Scan

Introduction to Forensics

  • Observing the Security Event log
  • Using openfiles and net sessions
  • Using the fc command
  • Exporting the Registry Keys
×
uc logo for app downloadDownload our uCertify App [lms_setting_placeholder: This filed is used to set the LMS settings.

Share with your friends and colleagues

We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More information
Accept