CourseChapTopicID | CourseChapTopicName | |
39 | Module 1: Understanding Core Security Principles |
CourseChapTopicDetailsID | CourseChapTopicID | DetailTopicName | imgUrl | imgurl1 | iimgurl |
439 | 39 | Understanding Risk |
Learn
| | |
440 | 39 | Exploring the Security Triad |
Learn
| | |
441 | 39 | Implementing a Defense-in-Depth Security Strategy |
Learn
| | |
442 | 39 | Enforcing the Principle of Least Privilege |
Learn
| | |
443 | 39 | Hardening a Server |
Learn
| | |
444 | 39 | The Essentials and Beyond |
Learn
| | |
|
40 | Module 2: Understanding Malware and Social Engineering |
CourseChapTopicDetailsID | CourseChapTopicID | DetailTopicName | imgUrl | imgurl1 | iimgurl |
445 | 40 | Comparing Malware |
Learn
| | |
446 | 40 | Protecting Against Malware |
Learn
| | |
447 | 40 | Thwarting Social-Engineering Attacks |
Learn
| | |
448 | 40 | Protecting Email |
Learn
| | |
449 | 40 | The Essentials and Beyond |
Learn
| | |
|
41 | Module 3: Understanding User Authentication |
CourseChapTopicDetailsID | CourseChapTopicID | DetailTopicName | imgUrl | imgurl1 | iimgurl |
450 | 41 | Comparing the Three Factors of Authentication |
Learn
| | |
451 | 41 | Using Passwords for Authentication |
Learn
| | |
452 | 41 | Using Smart Cards and Token Devices for Authentication |
Learn
| | |
453 | 41 | Using Biometrics for Authentication |
Learn
| | |
454 | 41 | Starting Applications with Run As Administrator |
Learn
| | |
455 | 41 | Preventing Time Skew with Kerberos |
Learn
| | |
456 | 41 | Identifying RADIUS Capabilities |
Learn
| | |
457 | 41 | Identifying Unsecure Authentication Protocols |
Learn
| | |
458 | 41 | The Essentials and Beyond |
Learn
| | |
|
42 | Module 4: Securing Access with Permissions |
CourseChapTopicDetailsID | CourseChapTopicID | DetailTopicName | imgUrl | imgurl1 | iimgurl |
459 | 42 | Comparing NTFS Permissions |
Learn
| | |
460 | 42 | Exploring Share Permissions |
Learn
| | |
461 | 42 | Identifying Active Directory Permissions |
Learn
| | |
462 | 42 | Assigning Registry Permissions |
Learn
| | |
463 | 42 | The Essentials and Beyond |
Learn
| | |
|
43 | Module 5: Using Audit Policies and Network Auditing |
CourseChapTopicDetailsID | CourseChapTopicID | DetailTopicName | imgUrl | imgurl1 | iimgurl |
464 | 43 | Exploring Audit Policies |
Learn
| | |
465 | 43 | Enabling Auditing |
Learn
| | |
466 | 43 | Viewing Audit Information |
Learn
| | |
467 | 43 | Managing Security Logs |
Learn
| | |
468 | 43 | Auditing a Network with MBSA |
Learn
| | |
469 | 43 | The Essentials and Beyond |
Learn
| | |
|
44 | Module 6: Protecting Clients and Servers |
CourseChapTopicDetailsID | CourseChapTopicID | DetailTopicName | imgUrl | imgurl1 | iimgurl |
470 | 44 | Understanding User Account Control |
Learn
| | |
471 | 44 | Keeping Systems Updated |
Learn
| | |
472 | 44 | Protecting Clients |
Learn
| | |
473 | 44 | Protecting Servers |
Learn
| | |
474 | 44 | Exploring DNS Security Issues |
Learn
| | |
475 | 44 | The Essentials and Beyond |
Learn
| | |
|
45 | Module 7: Protecting a Network |
CourseChapTopicDetailsID | CourseChapTopicID | DetailTopicName | imgUrl | imgurl1 | iimgurl |
476 | 45 | Identifying Common Attack Methods |
Learn
| | |
477 | 45 | Exploring Firewalls |
Learn
| | |
478 | 45 | Exploring Network Access Protection |
Learn
| | |
479 | 45 | Identifying Protocol Security Methods |
Learn
| | |
480 | 45 | The Essentials and Beyond |
Learn
| | |
|
46 | Module 8: Understanding Wireless Security |
CourseChapTopicDetailsID | CourseChapTopicID | DetailTopicName | imgUrl | imgurl1 | iimgurl |
481 | 46 | Comparing Wireless Devices |
Learn
| | |
482 | 46 | Comparing Wireless Security Methods |
Learn
| | |
483 | 46 | Configuring Wireless Routers |
Learn
| | |
484 | 46 | Configuring Windows 7 for Wireless |
Learn
| | |
485 | 46 | The Essentials and Beyond |
Learn
| | |
|
47 | Module 9: Understanding Physical Security |
CourseChapTopicDetailsID | CourseChapTopicID | DetailTopicName | imgUrl | imgurl1 | iimgurl |
486 | 47 | Comparing Site Security and Computer Security |
Learn
| | |
487 | 47 | Using Group Policy to Enhance Computer Security |
Learn
| | |
488 | 47 | Exploring Mobile Device Security |
Learn
| | |
489 | 47 | The Essentials and Beyond |
Learn
| | |
|
48 | Module 10: Enforcing Confidentiality with Encryption |
CourseChapTopicDetailsID | CourseChapTopicID | DetailTopicName | imgUrl | imgurl1 | iimgurl |
490 | 48 | Comparing Encryption Methods |
Learn
| | |
491 | 48 | Securing Email |
Learn
| | |
492 | 48 | Understanding EFS |
Learn
| | |
493 | 48 | Exploring BitLocker Drive Encryption |
Learn
| | |
494 | 48 | The Essentials and Beyond |
Learn
| | |
|
49 | Module 11: Understanding Certificates and a PKI |
CourseChapTopicDetailsID | CourseChapTopicID | DetailTopicName | imgUrl | imgurl1 | iimgurl |
495 | 49 | Understanding a Certificate |
Learn
| | |
496 | 49 | Exploring the Components of a PKI |
Learn
| | |
497 | 49 | The Essentials and Beyond |
Learn
| | |
|
50 | Module 12: Understanding Internet Explorer Security |
CourseChapTopicDetailsID | CourseChapTopicID | DetailTopicName | imgUrl | imgurl1 | iimgurl |
498 | 50 | Exploring Browser Settings |
Learn
| | |
499 | 50 | Comparing Security Zones |
Learn
| | |
500 | 50 | Using IE Tools to Identify Malicious Websites |
Learn
| | |
501 | 50 | The Essentials and Beyond |
Learn
| | |
|