68
Introduction
1.1 What is Security
1.2. Confidentiality, Integrity and Availability triad
1.3 Privacy
1.4 Non-Repudiation
1.5 Types of Attacks
1.6 Threats, Vulnerabilities and Risk
1.7 Risk Management
Quiz: Information Security
2.1 Identification
Quiz: Identification, Authentication and Authorisation
3.1 Access Control
3.2 Single Sign-On (SSO)
3.3 Access Control Lists
Quiz: Access Control
4.1 Laws and Regulations
4.2 Compliance
Quiz: Law and Compliance
5.1 The History of Encryption
5.2 Modern Encryption Methods
5.3 Windows and Linux Encryption
5.4 Hashing
5.5 Cracking Passwords
Quiz: Encryption
6.1 IP Protocols
6.2 Management Protocols
6.3 Routers and Switches
6.4 Firewalls
6.5 Firewall Implementation
6.6 Proxy Servers
6.7 Windows Firewalls
6.8 Linux Firewalls
6.9 Wireless Security
6.10 Mobile Device Security
6.11 Network Security Tools
Quiz: Network Infrastructure and Security
7.1 Active Directory Domain Services
7.2 Group Policy Objects
7.3 Configuring Windows
7.4 Windows Update
Quiz: Microsoft Windows Infrastructure
8.1 Configuring Linux
8.2 Third Party Software Updates
8.3 Core Operating System Updates
Quiz: Unix/Linux Servers
9.1 Risk Assessment
9.2 Conducting an Initial Assessment
9.3 Probing the Network
9.4 Vulnerabilities
9.5 Documenting Security
Quiz: Assessing System Security
10.1 Software Development Vulnerabilities
10.2 Buffer Overflows
10.3 Input Validation Attacks
10.4 Authentication, Authorisation and Cryptographic Attacks
10.5 Web Security
10.6 Database Security
Quiz: Application Security
11.1 What is Incident Response
11.2 The Incident Response Process Model
11.3 Why Incident Response is needed
11.4 Disaster Recovery
11.5 Business Continuity
11.6 Fault Tolerance
Quiz: Incident Response and Recovery
CSESS Mock Exam
Exam Information
CSESS Course Evaluation

instructor