Course Syllabus
Lesson 01 – Information Security Overview
1 Demo of Aspen and iLabs
2 Internet is Integral Part of Business and Personal Life – What Happens Online in 60 Seconds
3 Essential Terminology
4 Elements of Information Security
5 The Security, Functionality, and Usability Triangle
Lesson 02 – Information Security Threats and Attack Vectors
1 Motives, Goals, and Objectives of Information Security Attacks
2 Top Information Security Attack Vectors
3 Information Security Threat Categories
4 Types of Attacks on a System
5 Information Warfare
Lesson 06 – Penetration Testing Concepts
1 Penetration Testing
2 Why Penetration Testing
3 Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
4 Blue Teaming/Red Teaming
5 Types of Penetration Testing
6 Phases of Penetration Testing
7 Security Testing Methodology
Lesson 03 – Hacking Concepts
1 What is Hacking
2 Who is a Hacker?
3 Hacker Classes
4 Hacking Phases
Lesson 04 – Ethical Hacking Concepts
1 What is Ethical Hacking?
2 Why Ethical Hacking is Necessary
3 Scope and Limitations of Ethical Hacking
4 Skills of an Ethical Hacker
Lesson 05 – Information Security Controls
1 Information Assurance (IA)
2 Information Security Management Program
4 Enterprise Information Security Architecture (EISA)
5 Network Security Zoning
6 Defense in Depth
7 Information Security Policies
8 Physical Security
10 What is Risk?
11 Threat Modeling
12 Incident Management
13 Security Incident and Event Management (SIEM)
14 User Behavior Analytics (UBA)
15 Network Security Controls
16 Identity and Access Management (IAM)
17 Data Leakage
18 Data Backup
19 Data Recovery
20 Role of AI/ML in Cyber Security
Lesson 07 – Information Security Laws and Standards
1 Payment Card Industry Data Security Standard (PCI-DSS)
2 ISO/IEC 27001:2013
3 Health Insurance Portability and Accountability Act (HIPAA)
4 Sarbanes Oxley Act (SOX)
5 The Digital Millennium Copyright Act (DMCA)
6 Federal Information Security Management Act (FISMA)
7 Cyber Law in Different Countries
The importance of ethical hacking isn’t in the breaking, it’s in the fixing. To that end, you will need to understand remediations, like good software development practices, remediating web application vulnerabilities as well as policies and standards that should govern all information security practices within an organization.
Who this course is for:
- IT or IS professionals looking to obtain their CEH certification
- IT professionals looking to expand their careers into security
- Students who want a better understanding of information security components
What you’ll learn:
- Assess technical vulnerabilities for the potential for exploitation
- Apply a code of ethics to testing situations
-
Perform technical vulnerability assessments
-
Determine appropriate remediations for vulnerabilities
-
Operate tools and utilities used in security testing
-
Describe a basic penetration testing methodology
-
Compare differences between testing methodologies that exist
-
Assess a testing request to identify the scope and remain within that scope