Cybersecurity and Information Security

  1. Network Security Architecture
    1. Network Security Fundamentals
      1. Network Protocol Security
        1. OSI Model Security
          1. Physical Layer Security
            1. Network Layer Security
              1. Transport Layer Security
                1. Session Layer Security
                  1. Presentation Layer Security
                    1. Application Layer Security
                    2. TCP/IP Security
                      1. IP Security Considerations
                        1. TCP Security Issues
                          1. UDP Security Characteristics
                        2. Common Network Protocols
                          1. HTTP and HTTPS
                            1. SSL/TLS Implementation
                              1. Certificate Management
                              2. File Transfer Protocols
                                1. FTP Security Issues
                                  1. SFTP Implementation
                                    1. FTPS Configuration
                                    2. Remote Access Protocols
                                      1. SSH Protocol
                                        1. Telnet Security Issues
                                          1. RDP Security
                                          2. Email Protocols
                                            1. SMTP Security
                                              1. POP3 and IMAP Security
                                                1. Email Encryption
                                                2. DNS Security
                                                  1. DNS Vulnerabilities
                                                    1. DNSSEC Implementation
                                                      1. DNS over HTTPS
                                                  2. Network Security Controls
                                                    1. Firewall Technologies
                                                      1. Packet Filtering Firewalls
                                                        1. Stateless Filtering
                                                          1. Rule Configuration
                                                            1. Access Control Lists
                                                            2. Stateful Inspection Firewalls
                                                              1. Connection State Tracking
                                                                1. Dynamic Rule Generation
                                                                2. Application Layer Firewalls
                                                                  1. Proxy Firewalls
                                                                    1. Application Gateways
                                                                    2. Next-Generation Firewalls
                                                                      1. Deep Packet Inspection
                                                                        1. Application Awareness
                                                                          1. Intrusion Prevention Integration
                                                                          2. Web Application Firewalls
                                                                            1. OWASP Protection
                                                                              1. Rule Customization
                                                                            2. Intrusion Detection and Prevention
                                                                              1. Intrusion Detection Systems
                                                                                1. Network-based IDS
                                                                                  1. Host-based IDS
                                                                                    1. Signature-based Detection
                                                                                      1. Anomaly-based Detection
                                                                                      2. Intrusion Prevention Systems
                                                                                        1. Inline Deployment
                                                                                          1. Active Response
                                                                                            1. False Positive Management
                                                                                            2. Security Information Management
                                                                                              1. Log Correlation
                                                                                                1. Event Analysis
                                                                                                  1. Incident Escalation
                                                                                                2. Virtual Private Networks
                                                                                                  1. VPN Technologies
                                                                                                    1. IPSec VPNs
                                                                                                      1. SSL/TLS VPNs
                                                                                                        1. PPTP and L2TP
                                                                                                        2. VPN Deployment Models
                                                                                                          1. Remote Access VPNs
                                                                                                            1. Site-to-Site VPNs
                                                                                                              1. Extranet VPNs
                                                                                                              2. VPN Security Considerations
                                                                                                                1. Authentication Methods
                                                                                                                  1. Encryption Protocols
                                                                                                                    1. Key Management
                                                                                                                2. Wireless Network Security
                                                                                                                  1. Wireless Security Protocols
                                                                                                                    1. WEP Protocol
                                                                                                                      1. WEP Vulnerabilities
                                                                                                                        1. WEP Attacks
                                                                                                                        2. WPA Protocol
                                                                                                                          1. WPA Improvements
                                                                                                                            1. TKIP Implementation
                                                                                                                            2. WPA2 Protocol
                                                                                                                              1. AES-CCMP Encryption
                                                                                                                                1. Pre-Shared Key Mode
                                                                                                                                  1. Enterprise Mode
                                                                                                                                  2. WPA3 Protocol
                                                                                                                                    1. Enhanced Security Features
                                                                                                                                      1. Simultaneous Authentication of Equals
                                                                                                                                    2. Wireless Attack Methods
                                                                                                                                      1. Passive Attacks
                                                                                                                                        1. Eavesdropping
                                                                                                                                          1. Traffic Analysis
                                                                                                                                          2. Active Attacks
                                                                                                                                            1. Rogue Access Points
                                                                                                                                              1. Evil Twin Attacks
                                                                                                                                                1. Deauthentication Attacks
                                                                                                                                                  1. WPS Attacks
                                                                                                                                                2. Wireless Security Best Practices
                                                                                                                                                  1. Access Point Configuration
                                                                                                                                                    1. Network Segmentation
                                                                                                                                                      1. Monitoring and Detection
                                                                                                                                                    2. Network Architecture Security
                                                                                                                                                      1. Network Segmentation
                                                                                                                                                        1. Demilitarized Zones
                                                                                                                                                          1. DMZ Design
                                                                                                                                                            1. Service Placement
                                                                                                                                                            2. Virtual LANs
                                                                                                                                                              1. VLAN Configuration
                                                                                                                                                                1. Inter-VLAN Routing
                                                                                                                                                                2. Network Access Control
                                                                                                                                                                  1. 802.1X Authentication
                                                                                                                                                                    1. MAC Address Filtering
                                                                                                                                                                  2. Secure Network Design
                                                                                                                                                                    1. Defense in Depth
                                                                                                                                                                      1. Zero Trust Architecture
                                                                                                                                                                        1. Microsegmentation
                                                                                                                                                                          1. Software-Defined Perimeter