----------------------- November 18, 2024
T2.4.4 - Viruses, Worms, Spyware &s; Adware Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
U2.4.5 - Keyloggers Lesson Notes
PowerPoint Guided Notes
Answer Key
U2.4.5Lab1 - Intro to Keyloggers
U2.4.5Lab2 - Keylogger Application Quiz : Key
W2.4.6 - Logic Bombs &s; Rootkits Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Logic Bomb Quiz : Key
X2.2.1 - Common Attack Surfaces Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Wireless Security Quiz : Key
Y2.4.8 - DoS and DDoS Attacks Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Denial of Service
Case Study - Botnet Quiz : Key
Z2.4.9 - DNS Attacks Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
A2.4.10 - Wireless, On-Path, and Replay Attacks Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Session Replay
Case Study - Wireless Disassociation Quiz : Key
B4.5.1 - Endpoint - Protocol &s; Email Security Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Heartbleed Quiz : Key
C4.1.2 - Wireless Devices Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Wireless Jamming Quiz : Key
D2.3.1 - Application Vulnerabilities Lesson Notes
PowerPoint Guided Notes
EAnswer Key Case Study - Race Conditions
Case Study - iPhone Integer Overflow Quiz : Key
F2.4.11 - Application Attacks Part 1 Lesson Notes
PowerPoint Guided Notes
GAnswer Key Lab - Directory Traversal
Lab - Privilege Escalation
Lab - Pass the Hash Quiz : Key
H2.4.12 - Application Attacks Part 2 Lesson Notes
PowerPoint Guided Notes
Answer Key
HH.Lab - Buffer Overflow
II.Lab - Command Injection
JJ.Lab - Intro CSRF
KK.Lab - CSRF Application
Case Study - Chrome Crash Catastrophe Quiz : Key
L.4.1.4 - Application Security Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
2.3.2 - OS and Web-based Vulnerabilities Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - SQL Injection DVWA
Lab - SQL Injection Juice Shop
Lab - XSS DVWA
Lab - XSS Juice Shop Quiz : Key
4.5.2 - Endpoint - OS &s; Monitoring Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
2.3.3 - Hardware and Virtualization Vulnerabilities Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - VENOM Vulnerability Quiz : Key
2.3.4 - Supply Chain, Zero-day, and Cryptographic Vulnerabilities Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Zero Day Attack Quiz : Key
4.1.3 - Mobile Solutions Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Geolocation Quiz : Key
2.4.7 - Physical Attacks Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
1.2.3 - Physical Security Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
Unit 4 - Cryptographic Solutions
Unit 4 Lesson Plan
1.4.2 - Encryption Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Linux Personal File Encryption
Lab - Windows 7 Personal File Encryption Quiz : Key
1.4.4 - Obfuscation and Steganography Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Obfuscation
Lab - Steganography
Case Study - Steganography Quiz : Key
1.4.5 - Hashing, Digital Signatures, and Blockchain Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
1.4.1 - Public Key Infrastructure Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
1.4.6 - Certificates Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Certificates Quiz : Key
1.4.3 - Cryptographic Tools Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
2.4.13 - Cryptographic Attack Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Collision Quiz : Key
Unit 5 - Vulnerability Analysis &s; Remediation
Unit 5 Lesson Plan
4.3.1 - Identifying Vulnerabilities Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - ip-ifconfig
Case Study - Pen Testing Quiz : Key
5.5.2 - Pentesting Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Bug Bounty Quiz : Key
4.4.1 - Monitoring Resources Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
4.4.2 - Monitoring Tools Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Wireshark
Lab - tcpdump Quiz : Key
1.2.4 - Deception and Disruption Technology Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Honeypot Quiz : Key
4.3.2 - Vulnerability Management Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
Unit 6 - Security Controls
Unit 6 Lesson Plan
1.1.1 - Security Controls Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
3.1.2 - Architecture Considerations Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
3.2.1 - Infrastructure Considerations Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
2.5.2 - Hardening Techniques Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Backdoor Removal
Lab - RAT Removal
Lab - Backdoor Shortcut Quiz : Key
4.5.3 - Endpoint - Firewall, IDS/IPS &s; Web Filter Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
3.2.2 - Network Appliances Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
2.5.1 - Mitigation Techniques Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
3.2.3 - Secure Communication/Access and Effective Controls Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - NordVPN Hack Quiz : Key
Unit 7 - Data Management
Unit 7 Lesson Plan
3.3.1 - Data Classification and Types Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Handling Sensitive Data Quiz : Key
3.3.2 - Data Sovereignty and Protection Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - File Hashing Quiz : Key
3.4.1 - Resilience and Recovery I Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
3.4.2 - Resilience and Recovery II Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
Unit 8 - Infrastructure &s; SecOps
Unit 8 Lesson Plan
3.1.1 - Architecture and Infrastructure Concepts Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Specialized Systems Vulnerabilities Quiz : Key
4.1.1 - Hardening Targets and Secure Baselines Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Exposure Through Cloud Misconfiguration Quiz : Key
4.6.1 - Access Management Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Quantum Cryptography Quiz : Key
4.7.1 - Scripting and Automation Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
Unit 9 - Incident Response
Unit 9 Lesson Plan
2.4.15 - Indicators of Malicious Activity Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Equifax Quiz : Key
4.8.1 - Incident Response Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Cuckoo
Case Study - Incident Response Quiz : Key
4.9.1 - Logs Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Metadata Quiz : Key
Unit 10 - Processes &s; Governance
Unit 10 Lesson Plan
1.2.2 - Gap Analysis and Zero Trust Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
1.3.1 - Business Processes Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
1.3.2 - Technical Implications of Change Management Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
1.3.3 - Documentation and Version Control of Change Management Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
4.2.1 - Data Asset Management Lesson Notes
PowerPoint Guided Notes
Answer Key Lab - Data Sanitization
Case Study - Data Destruction Quiz : Key
5.1.1 - Security Governance Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - The GDPR Quiz : Key
Unit 11 - Risk, Audits &s; Compliance
Unit 11 Lesson Plan
5.2.1 - Risk Management Lesson Notes
PowerPoint Guided Notes
Answer Key Case Study - Failure to Disclose Quiz : Key
5.3.1 - Third-Party Vendors Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
5.4.1 - Security Compliance Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key
5.5.1 - Audits and Attestation Lesson Notes
PowerPoint Guided Notes
Answer Key Quiz : Key