Cryptography and Network Security

  1. System and Infrastructure Security
    1. Intruders and Malicious Software
      1. Intrusion Detection Systems (IDS)
        1. IDS Functions
          1. Monitoring
            1. Analysis
              1. Response
              2. Detection Methods
                1. Signature-based Detection
                  1. Pattern Matching
                    1. Rule-based Systems
                    2. Anomaly-based Detection
                      1. Statistical Analysis
                        1. Machine Learning
                        2. Hybrid Detection
                        3. IDS Types
                          1. Host-based IDS (HIDS)
                            1. System Call Monitoring
                              1. File Integrity Monitoring
                              2. Network-based IDS (NIDS)
                                1. Packet Analysis
                                  1. Traffic Monitoring
                                2. IDS Deployment
                                  1. Sensor Placement
                                    1. Management Architecture
                                  2. Intrusion Prevention Systems (IPS)
                                    1. IPS vs. IDS
                                      1. Active vs. Passive Response
                                        1. Inline vs. Out-of-band
                                        2. IPS Functions
                                          1. Real-time Blocking
                                            1. Automated Response
                                            2. Deployment Strategies
                                              1. Network-based IPS
                                                1. Host-based IPS
                                                  1. Hybrid Deployments
                                                2. Honeypots and Honeynets
                                                  1. Honeypot Concepts
                                                    1. Deception Technology
                                                      1. Attack Detection
                                                      2. Types of Honeypots
                                                        1. Low-interaction Honeypots
                                                          1. High-interaction Honeypots
                                                            1. Production Honeypots
                                                              1. Research Honeypots
                                                              2. Honeynets
                                                                1. Network of Honeypots
                                                                  1. Data Collection
                                                                  2. Use Cases
                                                                    1. Threat Intelligence
                                                                      1. Attack Analysis
                                                                        1. Early Warning Systems
                                                                      2. Types of Malicious Software (Malware)
                                                                        1. Viruses
                                                                          1. Virus Structure
                                                                            1. Infection Mechanism
                                                                              1. Payload
                                                                                1. Trigger Condition
                                                                                2. Virus Types
                                                                                  1. Boot Sector Viruses
                                                                                    1. File Infector Viruses
                                                                                      1. Macro Viruses
                                                                                        1. Polymorphic Viruses
                                                                                        2. Infection Mechanisms
                                                                                          1. File Infection
                                                                                            1. Memory Infection
                                                                                              1. Network Propagation
                                                                                              2. Payload Types
                                                                                                1. Destructive Payloads
                                                                                                  1. Data Theft
                                                                                                    1. System Modification
                                                                                                  2. Worms
                                                                                                    1. Worm Characteristics
                                                                                                      1. Self-replication
                                                                                                        1. Network Propagation
                                                                                                        2. Propagation Methods
                                                                                                          1. Email Worms
                                                                                                            1. Network Worms
                                                                                                              1. USB Worms
                                                                                                              2. Famous Worms
                                                                                                                1. Morris Worm
                                                                                                                  1. Code Red
                                                                                                                    1. Conficker
                                                                                                                  2. Trojans
                                                                                                                    1. Trojan Characteristics
                                                                                                                      1. Disguised Functionality
                                                                                                                        1. Unauthorized Access
                                                                                                                        2. Trojan Types
                                                                                                                          1. Remote Access Trojans (RATs)
                                                                                                                            1. Banking Trojans
                                                                                                                              1. Rootkits
                                                                                                                              2. Delivery Methods
                                                                                                                                1. Email Attachments
                                                                                                                                  1. Software Downloads
                                                                                                                                    1. Drive-by Downloads
                                                                                                                                  2. Ransomware
                                                                                                                                    1. Ransomware Operation
                                                                                                                                      1. File Encryption
                                                                                                                                        1. Payment Demands
                                                                                                                                        2. Ransomware Types
                                                                                                                                          1. Crypto-ransomware
                                                                                                                                            1. Locker Ransomware
                                                                                                                                            2. Encryption Mechanisms
                                                                                                                                              1. Symmetric Encryption
                                                                                                                                                1. Asymmetric Encryption
                                                                                                                                                2. Payment Systems
                                                                                                                                                  1. Cryptocurrency
                                                                                                                                                    1. Anonymous Payment Methods
                                                                                                                                                  2. Spyware
                                                                                                                                                    1. Spyware Functions
                                                                                                                                                      1. Data Collection
                                                                                                                                                        1. System Monitoring
                                                                                                                                                        2. Data Collection Methods
                                                                                                                                                          1. Keystroke Logging
                                                                                                                                                            1. Screen Capture
                                                                                                                                                              1. Network Traffic Monitoring
                                                                                                                                                              2. Spyware Types
                                                                                                                                                                1. Keyloggers
                                                                                                                                                                  1. Screen Scrapers
                                                                                                                                                                    1. Network Sniffers
                                                                                                                                                              3. Firewalls
                                                                                                                                                                1. Firewall Concepts
                                                                                                                                                                  1. Network Perimeter Security
                                                                                                                                                                    1. Traffic Filtering
                                                                                                                                                                      1. Access Control
                                                                                                                                                                      2. Firewall Design Principles
                                                                                                                                                                        1. Default Deny Policy
                                                                                                                                                                          1. Whitelist Approach
                                                                                                                                                                            1. Explicit Allow Rules
                                                                                                                                                                            2. Default Allow Policy
                                                                                                                                                                              1. Blacklist Approach
                                                                                                                                                                                1. Explicit Deny Rules
                                                                                                                                                                                2. Rule-Based Filtering
                                                                                                                                                                                  1. Rule Ordering
                                                                                                                                                                                    1. Rule Optimization
                                                                                                                                                                                    2. Least Privilege Principle
                                                                                                                                                                                    3. Types of Firewalls
                                                                                                                                                                                      1. Packet-Filtering Firewalls
                                                                                                                                                                                        1. Stateless Filtering
                                                                                                                                                                                          1. Header Analysis
                                                                                                                                                                                            1. Performance Characteristics
                                                                                                                                                                                            2. Stateful Inspection Firewalls
                                                                                                                                                                                              1. Connection State Tracking
                                                                                                                                                                                                1. Dynamic Rule Updates
                                                                                                                                                                                                  1. Session Management
                                                                                                                                                                                                  2. Application-Level Gateways (Proxies)
                                                                                                                                                                                                    1. Application Protocol Analysis
                                                                                                                                                                                                      1. Content Filtering
                                                                                                                                                                                                        1. User Authentication
                                                                                                                                                                                                        2. Circuit-Level Gateways
                                                                                                                                                                                                          1. Session-level Filtering
                                                                                                                                                                                                            1. TCP Handshake Monitoring
                                                                                                                                                                                                            2. Next-Generation Firewalls (NGFW)
                                                                                                                                                                                                              1. Deep Packet Inspection
                                                                                                                                                                                                                1. Application Awareness
                                                                                                                                                                                                                  1. Intrusion Prevention
                                                                                                                                                                                                                    1. User Identity Integration
                                                                                                                                                                                                                  2. Firewall Configurations
                                                                                                                                                                                                                    1. Single Firewall Configurations
                                                                                                                                                                                                                      1. Bastion Host
                                                                                                                                                                                                                        1. Hardened System
                                                                                                                                                                                                                          1. Service Minimization
                                                                                                                                                                                                                          2. Screened Host Firewall System
                                                                                                                                                                                                                            1. Router and Bastion Host
                                                                                                                                                                                                                              1. Dual Protection
                                                                                                                                                                                                                            2. Dual Firewall Configurations
                                                                                                                                                                                                                              1. Screened Subnet Firewall System (DMZ)
                                                                                                                                                                                                                                1. Demilitarized Zone
                                                                                                                                                                                                                                  1. Service Isolation
                                                                                                                                                                                                                                  2. Dual-Homed Host
                                                                                                                                                                                                                                    1. Multiple Network Interfaces
                                                                                                                                                                                                                                      1. Traffic Routing Control
                                                                                                                                                                                                                                  3. Firewall Management
                                                                                                                                                                                                                                    1. Rule Management
                                                                                                                                                                                                                                      1. Log Analysis
                                                                                                                                                                                                                                        1. Performance Monitoring
                                                                                                                                                                                                                                          1. Security Updates
                                                                                                                                                                                                                                        2. Access Control and System Hardening
                                                                                                                                                                                                                                          1. Authentication Methods
                                                                                                                                                                                                                                            1. Password-based Authentication
                                                                                                                                                                                                                                              1. Password Policies
                                                                                                                                                                                                                                                1. Length Requirements
                                                                                                                                                                                                                                                  1. Complexity Requirements
                                                                                                                                                                                                                                                    1. Expiration Policies
                                                                                                                                                                                                                                                      1. History Requirements
                                                                                                                                                                                                                                                      2. Password Storage
                                                                                                                                                                                                                                                        1. Hash Functions
                                                                                                                                                                                                                                                          1. Salt Usage
                                                                                                                                                                                                                                                            1. Secure Storage
                                                                                                                                                                                                                                                            2. Password Attacks
                                                                                                                                                                                                                                                              1. Brute Force Attacks
                                                                                                                                                                                                                                                                1. Dictionary Attacks
                                                                                                                                                                                                                                                                  1. Rainbow Table Attacks
                                                                                                                                                                                                                                                                2. Biometric Authentication
                                                                                                                                                                                                                                                                  1. Types of Biometric Authentication
                                                                                                                                                                                                                                                                    1. Fingerprint Recognition
                                                                                                                                                                                                                                                                      1. Iris Recognition
                                                                                                                                                                                                                                                                        1. Face Recognition
                                                                                                                                                                                                                                                                          1. Voice Recognition
                                                                                                                                                                                                                                                                          2. Biometric System Components
                                                                                                                                                                                                                                                                            1. Enrollment
                                                                                                                                                                                                                                                                              1. Template Storage
                                                                                                                                                                                                                                                                                1. Matching
                                                                                                                                                                                                                                                                                2. Security and Privacy Concerns
                                                                                                                                                                                                                                                                                  1. False Acceptance Rate
                                                                                                                                                                                                                                                                                    1. False Rejection Rate
                                                                                                                                                                                                                                                                                      1. Template Security
                                                                                                                                                                                                                                                                                        1. Privacy Issues
                                                                                                                                                                                                                                                                                      2. Token-based Authentication
                                                                                                                                                                                                                                                                                        1. Hardware Tokens
                                                                                                                                                                                                                                                                                          1. Software Tokens
                                                                                                                                                                                                                                                                                            1. Smart Cards
                                                                                                                                                                                                                                                                                            2. Multi-Factor Authentication (MFA)
                                                                                                                                                                                                                                                                                              1. Authentication Factors
                                                                                                                                                                                                                                                                                                1. Knowledge Factors
                                                                                                                                                                                                                                                                                                  1. Possession Factors
                                                                                                                                                                                                                                                                                                    1. Inherence Factors
                                                                                                                                                                                                                                                                                                    2. Two-Factor Authentication (2FA)
                                                                                                                                                                                                                                                                                                      1. SMS-based 2FA
                                                                                                                                                                                                                                                                                                        1. App-based 2FA
                                                                                                                                                                                                                                                                                                          1. Hardware Token 2FA
                                                                                                                                                                                                                                                                                                          2. Implementation Challenges
                                                                                                                                                                                                                                                                                                            1. User Experience
                                                                                                                                                                                                                                                                                                              1. Cost Considerations
                                                                                                                                                                                                                                                                                                                1. Technical Integration
                                                                                                                                                                                                                                                                                                            2. Access Control Models
                                                                                                                                                                                                                                                                                                              1. Discretionary Access Control (DAC)
                                                                                                                                                                                                                                                                                                                1. Owner-controlled Access
                                                                                                                                                                                                                                                                                                                  1. Access Control Lists (ACLs)
                                                                                                                                                                                                                                                                                                                    1. User Permissions
                                                                                                                                                                                                                                                                                                                      1. Read Permission
                                                                                                                                                                                                                                                                                                                        1. Write Permission
                                                                                                                                                                                                                                                                                                                          1. Execute Permission
                                                                                                                                                                                                                                                                                                                        2. Mandatory Access Control (MAC)
                                                                                                                                                                                                                                                                                                                          1. System-controlled Access
                                                                                                                                                                                                                                                                                                                            1. Security Labels
                                                                                                                                                                                                                                                                                                                              1. Classification Levels
                                                                                                                                                                                                                                                                                                                                1. Categories
                                                                                                                                                                                                                                                                                                                                2. Bell-LaPadula Model
                                                                                                                                                                                                                                                                                                                                  1. Biba Model
                                                                                                                                                                                                                                                                                                                                  2. Role-Based Access Control (RBAC)
                                                                                                                                                                                                                                                                                                                                    1. Role Definition
                                                                                                                                                                                                                                                                                                                                      1. Role Assignment
                                                                                                                                                                                                                                                                                                                                        1. User-Role Assignment
                                                                                                                                                                                                                                                                                                                                          1. Permission-Role Assignment
                                                                                                                                                                                                                                                                                                                                          2. Role Hierarchies
                                                                                                                                                                                                                                                                                                                                            1. Inheritance
                                                                                                                                                                                                                                                                                                                                              1. Separation of Duties
                                                                                                                                                                                                                                                                                                                                            2. Attribute-Based Access Control (ABAC)
                                                                                                                                                                                                                                                                                                                                              1. Attribute-based Decisions
                                                                                                                                                                                                                                                                                                                                                1. Policy Languages
                                                                                                                                                                                                                                                                                                                                                  1. Dynamic Access Control
                                                                                                                                                                                                                                                                                                                                                2. Operating System Hardening
                                                                                                                                                                                                                                                                                                                                                  1. System Configuration
                                                                                                                                                                                                                                                                                                                                                    1. Secure Configuration Baselines
                                                                                                                                                                                                                                                                                                                                                      1. Default Account Management
                                                                                                                                                                                                                                                                                                                                                        1. Service Configuration
                                                                                                                                                                                                                                                                                                                                                        2. Patch Management
                                                                                                                                                                                                                                                                                                                                                          1. Vulnerability Assessment
                                                                                                                                                                                                                                                                                                                                                            1. Patch Testing
                                                                                                                                                                                                                                                                                                                                                              1. Patch Deployment
                                                                                                                                                                                                                                                                                                                                                                1. Patch Verification
                                                                                                                                                                                                                                                                                                                                                                2. Service Minimization
                                                                                                                                                                                                                                                                                                                                                                  1. Unnecessary Service Removal
                                                                                                                                                                                                                                                                                                                                                                    1. Service Configuration
                                                                                                                                                                                                                                                                                                                                                                      1. Port Management
                                                                                                                                                                                                                                                                                                                                                                      2. File System Security
                                                                                                                                                                                                                                                                                                                                                                        1. File Permissions
                                                                                                                                                                                                                                                                                                                                                                          1. Directory Permissions
                                                                                                                                                                                                                                                                                                                                                                            1. File Integrity Monitoring
                                                                                                                                                                                                                                                                                                                                                                            2. Logging and Auditing
                                                                                                                                                                                                                                                                                                                                                                              1. Event Logging
                                                                                                                                                                                                                                                                                                                                                                                1. Log Management
                                                                                                                                                                                                                                                                                                                                                                                  1. Audit Trail Analysis
                                                                                                                                                                                                                                                                                                                                                                                    1. Compliance Reporting