UOP-CYB530: Cybersecurity Practitioner

(UOP-CYB530.AB3)
Lessons
Lab
Lab (Add-on)
TestPrep
Get A Free Trial

Skills You’ll Get

1

Network Concepts

  • TCP/IP and OSI Model
  • Layer 2 Fundamentals and Technologies
  • Internet Protocol and Layer 3 Technologies
  • Internet Control Message Protocol (ICMP)
  • Domain Name System (DNS)
  • IPv6 Fundamentals
  • Transport Layer Technologies and Protocols
  • Network Security Systems
  • Security Cloud-based Solutions
  • Cisco NetFlow
  • Data Loss Prevention
2

Security Concepts I

  • The Principles of the Defense-in-Depth Strategy
  • What Are Threats, Vulnerabilities, and Exploits?
  • Confidentiality, Integrity, and Availability: The CIA Triad
  • Risk and Risk Analysis
  • Personally Identifiable Information and Protected Health Information
  • Principle of Least Privilege and Separation of Duties
  • Security Operation Centers
  • Forensics
  • Information Security Principles
  • Subject and Object Definition
  • Access Control Fundamentals
  • Access Control Process
  • Information Security Roles and Responsibilities
  • Access Control Types
  • Access Control Models
  • Access Control Mechanisms
  • Identity and Access Control Implementation
3

Security Concepts II

  • Introduction to Identity and Access Management
  • Security Events and Logs Management
  • Assets Management
  • Introduction to Enterprise Mobility Management
  • Configuration and Change Management
  • Vulnerability Management
  • Patch Management
4

Cryptography

  • Cryptography
  • Fundamentals of PKI
  • What Are VPNs?
  • Site-to-site vs. Remote-Access VPNs
  • An Overview of IPsec
  • SSL VPNs
5

Host-Based Analysis

  • Process and Threads
  • Memory Allocation
  • Windows Registration
  • Windows Management Instrumentation
  • Handles
  • Services
  • Windows Event Logs
  • Processes
  • Forks
  • Permissions
  • Symlinks
  • Daemons
  • UNIX-Based Syslog
  • Apache Access Logs
  • Antimalware and Antivirus Software
  • Host-Based Firewalls and Host-Based Intrusion Prevention
  • Application-Level Whitelisting and Blacklisting
  • System-Based Sandboxing
6

Security Monitoring and Attack Methods

  • Network Telemetry
  • Host Telemetry
  • Security Monitoring and Encryption
  • Security Monitoring and Network Address Translation
  • Security Monitoring and Event Correlation Time Synchronization
  • DNS Tunneling and Other Exfiltration Methods
  • Security Monitoring and Tor
  • Security Monitoring and Peer-to-Peer Communication
  • Types of Attacks
  • Types of Vulnerabilities
  • Encryption and Tunneling
  • Resource Exhaustion
  • Traffic Fragmentation
  • Protocol-Level Misinterpretation
  • Traffic Timing, Substitution, and Insertion
  • Pivoting
7

About

1

Network Concepts

  • Configuring a Static TCP/IP Address
  • Preventing Zone Transfers
  • Enabling Intrusion Prevention and Detection
  • Configuring a Perimeter Firewall
2

Security Concepts I

  • Running a Security Scan to Identify Vulnerabilities
  • Remediating Vulnerabilities on the Local Workstation
  • Remediating Vulnerabilities on the Network 
3

Security Concepts II

  • Consulting a Vulnerability Database
  • Scanning the Rootkit
  • Performing Reconnaissance on a Network
  • Identifying Search Options in Metasploit
  • Performing the Initial Scan
  • Conducting Vulnerability Scans
4

Cryptography

  • Observing MD5 Hash
  • Using OpenSSL to Create a Public/Private Key Pair
  • Adding a Certificate to MMC
  • Configuring Remote Access VPN
  • Installing Remote Access Services
  • Installing the Web Server IIS Server Role
  • Configuring the SSL Port Setting
5

Host-Based Analysis

  • Assigning Permissions to Folders
  • Verifying Network Services
  • Working with Task Manager
  • Using Network Monitoring
  • Exporting your Windows logs
  • Viewing Running Processes on a Linux-based Machine
  • Retrieving a Real-Time List of Running Processes
  • Initiating an SSH Session from your Windows 10 Client to your Windows Server
  • Enabling Debug Logging on the DNS Server
  • Making Syslog Entries Readable
  • Installing Splunk on the Server
6

Security Monitoring and Attack Methods

  • Analyzing the Capture File to Find the Attack(s)
  • Generating Network Traffic and Using Filters
  • Examining the traffic between client and server
  • Assessing the impact of malware
  • Downloading and Installing Wireshark and WinPcap
  • Analyzing Protocols with Wireshark
  • Starting a Live Packet Capture
  • Confirming the Spoofing Attack in Wireshark
  • Observing Traffic Patterns Using Wireshark
  • Collecting network-based security intelligence
  • Spoofing MAC Address with SMAC
  • Simulating a DoS Attack

1

Network Concepts

  • Using the Process Explorer to View Specific Details About Running Processes on the System
2

Security Monitoring and Attack Methods

  • Working with Wireshark's Interface
  • Performing for ARP Spoofing
  • Responding to social engineering

UOP-CYB530: Cybersecurity Practitioner

$279.99

Buy Now

Related Courses

All Course
scroll to top