
Modules
1 -
Introduction
#
Lesson
Duration
Type
1.
Introduction
FREE
11h:41m
FREE
2.
Download your free study guide
PDF
3.
Exam Tips
FREE
3h:24m
FREE
4.
100% Pass Guarantee
PDF
5.
Checkpoint: Introduction
Quiz
2 -
Overview of Security
#
Lesson
Duration
Type
1.
Overview of Security
FREE
10h:36m
FREE
2.
CIA Triad
FREE
9h:36m
FREE
3.
AAA of Security
FREE
4h:6m
FREE
4.
Security Threats
7h:26m
Video
5.
Mitigating Threats
7h:13m
Video
6.
Threat Actors
14h:57m
Video
7.
Common Security Roles
12h:28m
Video
8.
MITRE ATT&CK Framework
6h:3m
Video
9.
Checkpoint: Overview of Security
Quiz
3 -
Risk Management
#
Lesson
Duration
Type
1.
Risk Management
3h:27m
Video
2.
Risk Assessment
8h:26m
Video
3.
Methodologies
2h:49m
Video
4.
Security Controls
6h:47m
Video
5.
Vulnerability Assessments
3h:32m
Video
6.
Penetration Testing
4h:12m
Video
7.
Common Vulnerability Identifiers
6h:11m
Video
8.
Vulnerability Reports
10h:34m
Video
9.
Zero-day Vulnerabilities
5h:3m
Video
10.
Execution and Escalation Attacks
3h:59m
Video
11.
Incident Response Process
9h:50m
Video
12.
Checkpoint: Risk Management
Quiz
4 -
Ethical Behavior
#
Lesson
Duration
Type
1.
Ethical Behavior
3h:42m
Video
2.
Computer Security Laws
14h:29m
Video
3.
Legal Requirements
11h:23m
Video
4.
Bug Bounties
10h:5m
Video
5.
Copyright Laws
6h:48m
Video
6.
Confidential Information
6h:35m
Video
7.
Errors and Outages
7h:52m
Video
8.
AWS Outage Case Study
4h:1m
Video
9.
Checkpoint: Ethical Behavior
Quiz
5 -
Malware
#
Lesson
Duration
Type
1.
Malware
3h:12m
Video
2.
Viruses, Worms, and Trojans
11h:20m
Video
3.
Ransomware
2h:33m
Video
4.
Spyware
2h:38m
Video
5.
Rootkits
3h:31m
Video
6.
Botnets and Zombies
3h:30m
Video
7.
Backdoors and Logic Bombs
3h:48m
Video
8.
Symptoms of Infections
4h:10m
Video
9.
Removing Malware
5h:2m
Video
10.
Preventing Malware
4h:39m
Video
11.
Viruses and Trojans in Action
6h:16m
Video
12.
Checkpoint: Malware
Quiz
6 -
Social Engineering
#
Lesson
Duration
Type
1.
Social Engineering
3h:16m
Video
2.
Phishing
12h:11m
Video
3.
Spam
2h:56m
Video
4.
Filtering Spam
6h:20m
Video
5.
Impersonation
4h:3m
Video
6.
Pretexting
4h:14m
Video
7.
Social Engineering Attacks
4h:23m
Video
8.
Frauds, Scams, and Hoaxes
6h:59m
Video
9.
Evil Twin
4h:43m
Video
10.
User Education
4h:32m
Video
11.
Anti-phishing Training
5h:19m
Video
12.
Checkpoint: Social Engineering
Quiz
7 -
Hardware Security
#
Lesson
Duration
Type
1.
Hardware Security
3h:23m
Video
2.
Hardware Components
12h:31m
Video
3.
Smart Devices and IoT
8h:15m
Video
4.
Trusted Computing
5h:36m
Video
5.
USB Devices
7h:57m
Video
6.
Bluetooth Devices
7h:57m
Video
7.
RFID Devices
8h:37m
Video
8.
Checkpoint: Hardware Security
Quiz
8 -
Application Security
#
Lesson
Duration
Type
1.
Application Security
3h:46m
Video
2.
Types of Software
8h:51m
Video
3.
Installing Applications
11h:2m
Video
4.
Mobile Application Risks
5h:54m
Video
5.
Updating Applications
3h:52m
Video
6.
Security Applications
8h:43m
Video
7.
Buffer Overflows
7h:53m
Video
8.
Buffer Overflow Attack
6h:24m
Video
9.
SQL Injections
9h:38m
Video
10.
Checkpoint: Application Security
Quiz
9 -
Networks
#
Lesson
Duration
Type
1.
Networks
5h:55m
Video
2.
Networking Hardware
15h:20m
Video
3.
The OSI Model
5h:14m
Video
4.
The TCP/IP Model
5h:1m
Video
5.
TCP and UDP
6h:48m
Video
7.
IPv4
24h:25m
Video
6.
Switches and Routers
5h:44m
Video
8.
Assigning IPv4 Addresses
12h:23m
Video
9.
Data Transfer Over Networks
6h:2m
Video
10.
Network Routing
7h:56m
Video
11.
DNS
12h:20m
Video
12.
IPv6
10h:38m
Video
13.
Internet Service Providers
3h:4m
Video
14.
Checkpoint: Networks
Quiz
10 -
Network Security
#
Lesson
Duration
Type
1.
Network Security
3h:4m
Video
2.
Wired Network Security
7h:21m
Video
3.
Network Access Control (NAC)
2h:53m
Video
4.
Wireless Networks
10h:42m
Video
5.
Wireless Encryption
8h:52m
Video
6.
Wireless Security
9h:43m
Video
7.
Traffic Interception
3h:59m
Video
8.
DoS and DDoS
8h:2m
Video
9.
Configuring SOHO Networks
25h:54m
Video
10.
Configuring Wireless Networks
13h:37m
Video
11.
Checkpoint: Network Security
Quiz
11 -
Cloud Computing
#
Lesson
Duration
Type
1.
Cloud Computing
5h:22m
Video
2.
Cloud Characteristics
14h:50m
Video
3.
SaaS
7h:41m
Video
4.
IaaS
8h:13m
Video
5.
PaaS
7h:31m
Video
6.
Deployment Models
9h:16m
Video
7.
Shared Responsibility Model
5h:15m
Video
8.
Cloud Threats and Vulnerabilities
8h:9m
Video
9.
Security in the Cloud
2h:24m
Video
10.
Checkpoint: Cloud Computing
Quiz
12 -
Cryptography
#
Lesson
Duration
Type
1.
Cryptography
5h:51m
Video
2.
Symmetric vs Asymmetric
6h:1m
Video
3.
Symmetric Algorithms
4h:34m
Video
4.
Asymmetric Algorithms
6h:49m
Video
5.
Public Key Infrastructure
10h:15m
Video
6.
Digital Certificates
4h:44m
Video
7.
Examining Digital Certificates
3h:29m
Video
8.
Certificate Revocation
3h:46m
Video
9.
Perfect Forward Secrecy
3h:32m
Video
10.
Hashing
8h:27m
Video
11.
Using Hashing
3h:3m
Video
12.
Hashing Security and Attacks
4h:43m
Video
13.
Checkpoint: Cryptography
Quiz
13 -
Applied Cryptography
#
Lesson
Duration
Type
1.
Applied Cryptography
5h:24m
Video
2.
Web Encryption
6h:57m
Video
3.
X.509 Certificates
5h:14m
Video
4.
Email Encryption and Signatures
7h:51m
Video
5.
OpenPGP
3h:12m
Video
6.
S/MIME
3h:45m
Video
7.
Send and Receive Encrypted Emails
8h:40m
Video
8.
Storage Encryption
4h:12m
Video
9.
BitLocker
2h:56m
Video
10.
VeraCrypt
3h:9m
Video
11.
Cryptomator
2h:42m
Video
12.
Checkpoint: Applied Cryptography
Quiz
14 -
Data Availability
#
Lesson
Duration
Type
1.
Data Availability
2h:22m
Video
2.
Backup and Recovery
4h:35m
Video
3.
Backup and Recovery Methods
13h:11m
Video
4.
Backup Schemes
15h:29m
Video
5.
Security for Backups
5h:28m
Video
6.
Retention Requirements
4h:12m
Video
7.
Cloud-based File Storage
3h:47m
Video
8.
Checkpoint: Data Availability
Quiz
15 -
Authentication and Authorization
#
Lesson
Duration
Type
1.
Authentication and Authorization
4h:42m
Video
2.
Password Best Practices
10h:32m
Video
3.
Password Cracking
8h:13m
Video
4.
Password Managers
10h:29m
Video
5.
Single Sign-On (SSO)
2h:54m
Video
6.
Multifactor Authentication (MFA)
7h:33m
Video
7.
Passwordless Authentication
5h:15m
Video
8.
Online Password Storage
5h:54m
Video
9.
Password Leaks
3h:27m
Video
10.
Checkpoint: Authentication and Authorization
Quiz
16 -
Anonymitiy
#
Lesson
Duration
Type
1.
Anonymitiy
5h:17m
Video
2.
Virtual Private Networks (VPNs)
4h:27m
Video
3.
End-to-End Encryption
2h:42m
Video
4.
Transfer Encryption
3h:10m
Video
5.
Anonymity and Recognition
3h:21m
Video
6.
Proxy Servers
3h:39m
Video
7.
TOR
4h:0m
Video
8.
The Darknet
4h:14m
Video
9.
Cryptocurrencies
3h:54m
Video
10.
Checkpoint: Anonymitiy
Quiz
17 -
Protecting Your Privacy
#
Lesson
Duration
Type
1.
Protecting Your Privacy
4h:7m
Video
2.
Personally Identifiable Information (PII)
6h:52m
Video
3.
Threats to Personal Information
3h:36m
Video
4.
User Tracking
4h:26m
Video
5.
Script Blockers and Ad Blockers
4h:17m
Video
6.
Profile Privacy Settings
2h:29m
Video
7.
Stalking and Cybermobbing
3h:20m
Video
8.
Checkpoint: Protecting Your Privacy
Quiz
18 -
Conclusion
#
Lesson
Duration
Type
1.
Conclusion
13h:18m
Video
2.
BONUS: Where do I go from here?
3h:44m
Video
3.
Practice Exam
Exam



