Security Fundamentals Academy
Buy now
Learn more
Resources
About this Course
Prerequisites
Access
Cancellation Policy
Course Materials
Notes
lesson-1.txt
lesson-2.txt
lesson-3.txt
lesson-4.txt
lesson-5.txt
lesson-6.txt
lesson-7.txt
lesson-8.txt
lesson-9.txt
lesson-10.txt
lesson-11.txt
lesson-12.txt
lesson-13.txt
lesson-14.txt
lesson-15.txt
lesson-16.txt
Introduction
Friendly Notice
Student Resources
O-Line Security's Discord Server
Study Notes
Week 1
Day 1
Extra Resources: What is the CIA Triad 01
Extra Resources: What is the CIA Triad 02
Lab: Exploring the Lab Environment
Day 2
Labs: Configuring Examples of Security Control Types
Extra Resources: What is a Vulnerability?
Extra Resources: What is Nessus?
Day 3
Lab: Using Storage Encryption
Lab: Using Hashing and Salting
Extra Resources: How to Create Keys
Extra Resources: What is a hash?
Lab: Using SET to Perform Social Engineering
Day 4
Extra Resources: Managing the Life Cycle of a Certificate
Extra Resources: Managing Certificates with OpenSSL
Week 2
Day 5
Extra Resources: File Permissions
Lab: Managing Password Security
Day 6
Lab: Managing Permissions
Lab: Using Group Policy
Extra Resources: Managing Access Controls in Windows Server
Extra Resources: Managing Centralized Authentication
Extra Resources: Managing Access Control Linux
Extra Resources: Configuring Identity and Access Management Controls
Day 7
Extra Resources: OSI Model
Extra Resources: TCP vs UDP
Extra Resources: What is 802.1x?
Day 8
Lab: Implementing a Firewall
Extra Resources: Configuring a Firewall
Extra Resources: Network Topology
Extra Resources: What is an Application Server?
Extra Resources: What is Proxy?
Week 3
Day 9
Labs: Using IPSec Tunneling
Extra Resources: Implementing a Virtual Private Network
Day 10
Labs: Using Containers
Labs: Using Virtualization
Extra Resources: What is a Container?
Extra Resources: Using Containers with Splunk
Extra Resources: Create VM using AWS
Extra Resources: Create Infrastructure (VM) with Code
Extra Resources: Securing the Network Infrastructure
Day 11
Labs: Perform System Configuration Gap Analysis
Day 12
Week 4
Day 13
Labs: Performing Vulnerability Scans
Labs: Understanding Security Baselines
Extra Resources: Configuration Management Tool (Ansible)
Extra Resources: Assisted Lab Configuring an Intrusion Detection System
Day 14
Labs: Hardening
Labs: Implementing Allow Lists and Deny Lists
Extra Resources: Implementing Endpoint Protection
Extra Resources: Identifying Application Attack Indicators
Extra Resources: What is Cross Site Scripting?
Extra Resources: ARP Spoofing 01
Extra Resources: ARP Spoofing 02
Labs: Exploiting and Detecting SQLi
Extra Resources: CSRF Attack
Extra Resources: Buffer Overflow Attack
Extra Resources: SQL Injection Attack
Extra Resources: Command Injections
Day 15
Labs: Incident Response Detection
Extra Resources: Ports & Protocols
Extra Resources: Splunk (SIEM Tool)
Extra Resources: Managing Incident Response, Mitigation, and Recovery
Extra Resources: Managing Data Sources for Incident Response
Extra Resources: Configuring Mitigation Controls
Day 16
Labs: Using Network Sniffers
Labs: Detecting and Responding to Malware
Labs: Performing Digital Forensic
Extra Resources: What is Malware?
Extra Resources: Acquiring Digital Forensics
Week 5
Day 17
Labs: Understanding On Path Attacks
Labs: Performing DNS Filtering
Labs: Working with Threat Feeds
Extra Resources: DNS Amplification
Extra Resources: Assisted Lab Installing, Using, and Blocking a Malware based Backdoor
Extra Resources: Identifying Malicious Code
Day 18
Extra Resources: Pass The Hash?
Extra Resources: What is Malware?
Extra Resources: What is Cross Site Scripting?
Extra Resources: SQL Injection Attack
Extra Resources: Buffer Overflow Attack
Extra Resources: Command Injections
Extra Resources: CSRF Attack
Extra Resources: ARP Spoofing 01
Extra Resources: ARP Spoofing 02
Day 19
Day 20
Labs: Performing Penetration Testing
Labs: Finding Open Service
Week 6
Day 21 (Resume Workshop)
Labs: Training and Awareness through Simulation
Day 22 (Command Line Workshop)
Extra Resources: What is MSFCONSOLE?
Extra Resources: What is Nslookup?
Extra Resources: Ping vs Traceroute
Extra Resources: What is NMAP?
Extra Resources: IPCONFIG vs IFCONFIG
Day 23 (Recap)
Security+ Study Notes
Day 24 (Recap)
Week 7
Day 25 (PBQ)
Labs: Network Incident Investigation and Remediation
Labs: Use Cases of Automation and Scripting
Labs: Using a Playbook
Day 26 (PBQ)
Day 27 (Lab)
Day 28 (PBQ)
Week 8
Day 29 (PBQ)
Day 31 (Interview Workshop)
Day 32 (PBQ)
Week 9
Day 33 (Q&A)
Day 34 (Q&A)
Day 35 (Q&A)
Day 36 (Story Point Workshop)
Week 10
Day 37 (PBQ)
Day 38 (Q&A)
Day 39 (Q&A)
Day 40 (Q&A)
Security+ Flashcards
Security+ Quiz
Conclusion
CompTIA Security+ Exam
Conclusion
O-Line Certificate of Completion
Post Graduation
Products
Course
Section
Lesson
Prerequisites
Prerequisites
Security Fundamentals Academy
Buy now
Learn more
Resources
About this Course
Prerequisites
Access
Cancellation Policy
Course Materials
Notes
lesson-1.txt
lesson-2.txt
lesson-3.txt
lesson-4.txt
lesson-5.txt
lesson-6.txt
lesson-7.txt
lesson-8.txt
lesson-9.txt
lesson-10.txt
lesson-11.txt
lesson-12.txt
lesson-13.txt
lesson-14.txt
lesson-15.txt
lesson-16.txt
Introduction
Friendly Notice
Student Resources
O-Line Security's Discord Server
Study Notes
Week 1
Day 1
Extra Resources: What is the CIA Triad 01
Extra Resources: What is the CIA Triad 02
Lab: Exploring the Lab Environment
Day 2
Labs: Configuring Examples of Security Control Types
Extra Resources: What is a Vulnerability?
Extra Resources: What is Nessus?
Day 3
Lab: Using Storage Encryption
Lab: Using Hashing and Salting
Extra Resources: How to Create Keys
Extra Resources: What is a hash?
Lab: Using SET to Perform Social Engineering
Day 4
Extra Resources: Managing the Life Cycle of a Certificate
Extra Resources: Managing Certificates with OpenSSL
Week 2
Day 5
Extra Resources: File Permissions
Lab: Managing Password Security
Day 6
Lab: Managing Permissions
Lab: Using Group Policy
Extra Resources: Managing Access Controls in Windows Server
Extra Resources: Managing Centralized Authentication
Extra Resources: Managing Access Control Linux
Extra Resources: Configuring Identity and Access Management Controls
Day 7
Extra Resources: OSI Model
Extra Resources: TCP vs UDP
Extra Resources: What is 802.1x?
Day 8
Lab: Implementing a Firewall
Extra Resources: Configuring a Firewall
Extra Resources: Network Topology
Extra Resources: What is an Application Server?
Extra Resources: What is Proxy?
Week 3
Day 9
Labs: Using IPSec Tunneling
Extra Resources: Implementing a Virtual Private Network
Day 10
Labs: Using Containers
Labs: Using Virtualization
Extra Resources: What is a Container?
Extra Resources: Using Containers with Splunk
Extra Resources: Create VM using AWS
Extra Resources: Create Infrastructure (VM) with Code
Extra Resources: Securing the Network Infrastructure
Day 11
Labs: Perform System Configuration Gap Analysis
Day 12
Week 4
Day 13
Labs: Performing Vulnerability Scans
Labs: Understanding Security Baselines
Extra Resources: Configuration Management Tool (Ansible)
Extra Resources: Assisted Lab Configuring an Intrusion Detection System
Day 14
Labs: Hardening
Labs: Implementing Allow Lists and Deny Lists
Extra Resources: Implementing Endpoint Protection
Extra Resources: Identifying Application Attack Indicators
Extra Resources: What is Cross Site Scripting?
Extra Resources: ARP Spoofing 01
Extra Resources: ARP Spoofing 02
Labs: Exploiting and Detecting SQLi
Extra Resources: CSRF Attack
Extra Resources: Buffer Overflow Attack
Extra Resources: SQL Injection Attack
Extra Resources: Command Injections
Day 15
Labs: Incident Response Detection
Extra Resources: Ports & Protocols
Extra Resources: Splunk (SIEM Tool)
Extra Resources: Managing Incident Response, Mitigation, and Recovery
Extra Resources: Managing Data Sources for Incident Response
Extra Resources: Configuring Mitigation Controls
Day 16
Labs: Using Network Sniffers
Labs: Detecting and Responding to Malware
Labs: Performing Digital Forensic
Extra Resources: What is Malware?
Extra Resources: Acquiring Digital Forensics
Week 5
Day 17
Labs: Understanding On Path Attacks
Labs: Performing DNS Filtering
Labs: Working with Threat Feeds
Extra Resources: DNS Amplification
Extra Resources: Assisted Lab Installing, Using, and Blocking a Malware based Backdoor
Extra Resources: Identifying Malicious Code
Day 18
Extra Resources: Pass The Hash?
Extra Resources: What is Malware?
Extra Resources: What is Cross Site Scripting?
Extra Resources: SQL Injection Attack
Extra Resources: Buffer Overflow Attack
Extra Resources: Command Injections
Extra Resources: CSRF Attack
Extra Resources: ARP Spoofing 01
Extra Resources: ARP Spoofing 02
Day 19
Day 20
Labs: Performing Penetration Testing
Labs: Finding Open Service
Week 6
Day 21 (Resume Workshop)
Labs: Training and Awareness through Simulation
Day 22 (Command Line Workshop)
Extra Resources: What is MSFCONSOLE?
Extra Resources: What is Nslookup?
Extra Resources: Ping vs Traceroute
Extra Resources: What is NMAP?
Extra Resources: IPCONFIG vs IFCONFIG
Day 23 (Recap)
Security+ Study Notes
Day 24 (Recap)
Week 7
Day 25 (PBQ)
Labs: Network Incident Investigation and Remediation
Labs: Use Cases of Automation and Scripting
Labs: Using a Playbook
Day 26 (PBQ)
Day 27 (Lab)
Day 28 (PBQ)
Week 8
Day 29 (PBQ)
Day 31 (Interview Workshop)
Day 32 (PBQ)
Week 9
Day 33 (Q&A)
Day 34 (Q&A)
Day 35 (Q&A)
Day 36 (Story Point Workshop)
Week 10
Day 37 (PBQ)
Day 38 (Q&A)
Day 39 (Q&A)
Day 40 (Q&A)
Security+ Flashcards
Security+ Quiz
Conclusion
CompTIA Security+ Exam
Conclusion
O-Line Certificate of Completion
Post Graduation
Windows/Linux/Mac Operating System
Pen/paper or preferred software to take notes
The will to learn