Security Fundamentals Academy
Buy now
Learn more
Resources
About this Course
Prerequisites
Access
Cancellation Policy
Course Materials
Notes
lesson-1.txt
lesson-2.txt
lesson-3.txt
lesson-4.txt
lesson-5.txt
lesson-6.txt
lesson-7.txt
lesson-8.txt
lesson-9.txt
lesson-10.txt
lesson-11.txt
lesson-12.txt
lesson-13.txt
lesson-14.txt
lesson-15.txt
lesson-16.txt
Introduction
Friendly Notice
Student Resources
O-Line Security's Discord Server
Study Notes
Week 1
Day 1
Extra Resources: What is the CIA Triad 01
Extra Resources: What is the CIA Triad 02
Lab: Exploring the Lab Environment
Day 2
Labs: Configuring Examples of Security Control Types
Extra Resources: What is a Vulnerability?
Extra Resources: What is Nessus?
Day 3
Lab: Using Storage Encryption
Lab: Using Hashing and Salting
Extra Resources: How to Create Keys
Extra Resources: What is a hash?
Lab: Using SET to Perform Social Engineering
Day 4
Extra Resources: Managing the Life Cycle of a Certificate
Extra Resources: Managing Certificates with OpenSSL
Week 2
Day 5
Extra Resources: File Permissions
Lab: Managing Password Security
Day 6
Lab: Managing Permissions
Lab: Using Group Policy
Extra Resources: Managing Access Controls in Windows Server
Extra Resources: Managing Centralized Authentication
Extra Resources: Managing Access Control Linux
Extra Resources: Configuring Identity and Access Management Controls
Day 7
Extra Resources: OSI Model
Extra Resources: TCP vs UDP
Extra Resources: What is 802.1x?
Day 8
Lab: Implementing a Firewall
Extra Resources: Configuring a Firewall
Extra Resources: Network Topology
Extra Resources: What is an Application Server?
Extra Resources: What is Proxy?
Week 3
Day 9
Labs: Using IPSec Tunneling
Extra Resources: Implementing a Virtual Private Network
Day 10
Labs: Using Containers
Labs: Using Virtualization
Extra Resources: What is a Container?
Extra Resources: Using Containers with Splunk
Extra Resources: Create VM using AWS
Extra Resources: Create Infrastructure (VM) with Code
Extra Resources: Securing the Network Infrastructure
Day 11
Labs: Perform System Configuration Gap Analysis
Day 12
Week 4
Day 13
Labs: Performing Vulnerability Scans
Labs: Understanding Security Baselines
Extra Resources: Configuration Management Tool (Ansible)
Extra Resources: Assisted Lab Configuring an Intrusion Detection System
Day 14
Labs: Hardening
Labs: Implementing Allow Lists and Deny Lists
Extra Resources: Implementing Endpoint Protection
Extra Resources: Identifying Application Attack Indicators
Extra Resources: What is Cross Site Scripting?
Extra Resources: ARP Spoofing 01
Extra Resources: ARP Spoofing 02
Labs: Exploiting and Detecting SQLi
Extra Resources: CSRF Attack
Extra Resources: Buffer Overflow Attack
Extra Resources: SQL Injection Attack
Extra Resources: Command Injections
Day 15
Labs: Incident Response Detection
Extra Resources: Ports & Protocols
Extra Resources: Splunk (SIEM Tool)
Extra Resources: Managing Incident Response, Mitigation, and Recovery
Extra Resources: Managing Data Sources for Incident Response
Extra Resources: Configuring Mitigation Controls
Day 16
Labs: Using Network Sniffers
Labs: Detecting and Responding to Malware
Labs: Performing Digital Forensic
Extra Resources: What is Malware?
Extra Resources: Acquiring Digital Forensics
Week 5
Day 17
Labs: Understanding On Path Attacks
Labs: Performing DNS Filtering
Labs: Working with Threat Feeds
Extra Resources: DNS Amplification
Extra Resources: Assisted Lab Installing, Using, and Blocking a Malware based Backdoor
Extra Resources: Identifying Malicious Code
Day 18
Extra Resources: Pass The Hash?
Extra Resources: What is Malware?
Extra Resources: What is Cross Site Scripting?
Extra Resources: SQL Injection Attack
Extra Resources: Buffer Overflow Attack
Extra Resources: Command Injections
Extra Resources: CSRF Attack
Extra Resources: ARP Spoofing 01
Extra Resources: ARP Spoofing 02
Day 19
Day 20
Labs: Performing Penetration Testing
Labs: Finding Open Service
Week 6
Day 21 (Resume Workshop)
Labs: Training and Awareness through Simulation
Day 22 (Command Line Workshop)
Extra Resources: What is MSFCONSOLE?
Extra Resources: What is Nslookup?
Extra Resources: Ping vs Traceroute
Extra Resources: What is NMAP?
Extra Resources: IPCONFIG vs IFCONFIG
Day 23 (Recap)
Security+ Study Notes
Day 24 (Recap)
Week 7
Day 25 (PBQ)
Labs: Network Incident Investigation and Remediation
Labs: Use Cases of Automation and Scripting
Labs: Using a Playbook
Day 26 (PBQ)
Day 27 (Lab)
Day 28 (PBQ)
Week 8
Day 29 (PBQ)
Day 31 (Interview Workshop)
Day 32 (PBQ)
Week 9
Day 33 (Q&A)
Day 34 (Q&A)
Day 35 (Q&A)
Day 36 (Story Point Workshop)
Week 10
Day 37 (PBQ)
Day 38 (Q&A)
Day 39 (Q&A)
Day 40 (Q&A)
Security+ Flashcards
Security+ Quiz
Conclusion
CompTIA Security+ Exam
Conclusion
O-Line Certificate of Completion
Post Graduation
Products
Course
Section
Lesson
Extra Resources: Identifying Malicious Code
Extra Resources: Identifying Malicious Code
Security Fundamentals Academy
Buy now
Learn more
Resources
About this Course
Prerequisites
Access
Cancellation Policy
Course Materials
Notes
lesson-1.txt
lesson-2.txt
lesson-3.txt
lesson-4.txt
lesson-5.txt
lesson-6.txt
lesson-7.txt
lesson-8.txt
lesson-9.txt
lesson-10.txt
lesson-11.txt
lesson-12.txt
lesson-13.txt
lesson-14.txt
lesson-15.txt
lesson-16.txt
Introduction
Friendly Notice
Student Resources
O-Line Security's Discord Server
Study Notes
Week 1
Day 1
Extra Resources: What is the CIA Triad 01
Extra Resources: What is the CIA Triad 02
Lab: Exploring the Lab Environment
Day 2
Labs: Configuring Examples of Security Control Types
Extra Resources: What is a Vulnerability?
Extra Resources: What is Nessus?
Day 3
Lab: Using Storage Encryption
Lab: Using Hashing and Salting
Extra Resources: How to Create Keys
Extra Resources: What is a hash?
Lab: Using SET to Perform Social Engineering
Day 4
Extra Resources: Managing the Life Cycle of a Certificate
Extra Resources: Managing Certificates with OpenSSL
Week 2
Day 5
Extra Resources: File Permissions
Lab: Managing Password Security
Day 6
Lab: Managing Permissions
Lab: Using Group Policy
Extra Resources: Managing Access Controls in Windows Server
Extra Resources: Managing Centralized Authentication
Extra Resources: Managing Access Control Linux
Extra Resources: Configuring Identity and Access Management Controls
Day 7
Extra Resources: OSI Model
Extra Resources: TCP vs UDP
Extra Resources: What is 802.1x?
Day 8
Lab: Implementing a Firewall
Extra Resources: Configuring a Firewall
Extra Resources: Network Topology
Extra Resources: What is an Application Server?
Extra Resources: What is Proxy?
Week 3
Day 9
Labs: Using IPSec Tunneling
Extra Resources: Implementing a Virtual Private Network
Day 10
Labs: Using Containers
Labs: Using Virtualization
Extra Resources: What is a Container?
Extra Resources: Using Containers with Splunk
Extra Resources: Create VM using AWS
Extra Resources: Create Infrastructure (VM) with Code
Extra Resources: Securing the Network Infrastructure
Day 11
Labs: Perform System Configuration Gap Analysis
Day 12
Week 4
Day 13
Labs: Performing Vulnerability Scans
Labs: Understanding Security Baselines
Extra Resources: Configuration Management Tool (Ansible)
Extra Resources: Assisted Lab Configuring an Intrusion Detection System
Day 14
Labs: Hardening
Labs: Implementing Allow Lists and Deny Lists
Extra Resources: Implementing Endpoint Protection
Extra Resources: Identifying Application Attack Indicators
Extra Resources: What is Cross Site Scripting?
Extra Resources: ARP Spoofing 01
Extra Resources: ARP Spoofing 02
Labs: Exploiting and Detecting SQLi
Extra Resources: CSRF Attack
Extra Resources: Buffer Overflow Attack
Extra Resources: SQL Injection Attack
Extra Resources: Command Injections
Day 15
Labs: Incident Response Detection
Extra Resources: Ports & Protocols
Extra Resources: Splunk (SIEM Tool)
Extra Resources: Managing Incident Response, Mitigation, and Recovery
Extra Resources: Managing Data Sources for Incident Response
Extra Resources: Configuring Mitigation Controls
Day 16
Labs: Using Network Sniffers
Labs: Detecting and Responding to Malware
Labs: Performing Digital Forensic
Extra Resources: What is Malware?
Extra Resources: Acquiring Digital Forensics
Week 5
Day 17
Labs: Understanding On Path Attacks
Labs: Performing DNS Filtering
Labs: Working with Threat Feeds
Extra Resources: DNS Amplification
Extra Resources: Assisted Lab Installing, Using, and Blocking a Malware based Backdoor
Extra Resources: Identifying Malicious Code
Day 18
Extra Resources: Pass The Hash?
Extra Resources: What is Malware?
Extra Resources: What is Cross Site Scripting?
Extra Resources: SQL Injection Attack
Extra Resources: Buffer Overflow Attack
Extra Resources: Command Injections
Extra Resources: CSRF Attack
Extra Resources: ARP Spoofing 01
Extra Resources: ARP Spoofing 02
Day 19
Day 20
Labs: Performing Penetration Testing
Labs: Finding Open Service
Week 6
Day 21 (Resume Workshop)
Labs: Training and Awareness through Simulation
Day 22 (Command Line Workshop)
Extra Resources: What is MSFCONSOLE?
Extra Resources: What is Nslookup?
Extra Resources: Ping vs Traceroute
Extra Resources: What is NMAP?
Extra Resources: IPCONFIG vs IFCONFIG
Day 23 (Recap)
Security+ Study Notes
Day 24 (Recap)
Week 7
Day 25 (PBQ)
Labs: Network Incident Investigation and Remediation
Labs: Use Cases of Automation and Scripting
Labs: Using a Playbook
Day 26 (PBQ)
Day 27 (Lab)
Day 28 (PBQ)
Week 8
Day 29 (PBQ)
Day 31 (Interview Workshop)
Day 32 (PBQ)
Week 9
Day 33 (Q&A)
Day 34 (Q&A)
Day 35 (Q&A)
Day 36 (Story Point Workshop)
Week 10
Day 37 (PBQ)
Day 38 (Q&A)
Day 39 (Q&A)
Day 40 (Q&A)
Security+ Flashcards
Security+ Quiz
Conclusion
CompTIA Security+ Exam
Conclusion
O-Line Certificate of Completion
Post Graduation
Lesson unavailable
Please
login to your account
or
buy the course
.