Course curriculum

    1. Segment 01 - Introduction to instructor

    2. Segment 02 - Critical analysis of patch management and cybersecurity challenges - part 1

    3. Segment 03 - Critical analysis of patch management and cybersecurity challenges - part 2

    4. Segment 04 - XCCDF and OVAL standards for configuration management and vulnerability assessment

    5. Segment 05 - Continuous monitoring and prioritization of vulnerabilities

    6. Segment 06 - Decoding cybersecurity expenditure: Critical examination of strategies and failures

    7. Segment 07 - Perimeter configuration and filtering: safeguarding the digital fortress

    8. Segment 08 - Flipping the model: Taking control of your network

    1. Segment 09 - Perimeter configuration and filtering: Safeguarding the digital fortress

    2. Segment 10 - Deception as a defense: Rethinking security paradigms part 1

    3. Segment 11 - Deception as a defense: Rethinking security paradigms part 2

    4. Segment 12 - Flipping the model: Taking control of your network

    5. Segment 13 - Weaknesses or flaws in products

    6. Segment 14 - A case study on a critical flaw

    7. Segment 15 - Discuss XCCDF and OVA

    8. Segment 16 - Methodology for vulnerability tracking and monitoring part 1

    9. Segment 17 - Methodology for vulnerability tracking and monitoring part 2

    1. Segment 18 - Proactive vulnerability tracking and patch management

    2. Segment 19 - Reducing attack surface and best practices in network security

    3. Segment 20 - Network mines and deception in cybersecurity

    4. Segment 21 - Vulnerability management and router security

    5. Segment 22 - Enhancing cybersecurity through perimeter configuration and filtering part 1

    6. Segment 23 - Enhancing cybersecurity through perimeter configuration and filtering part 2

    7. Segment 24 - Enhancing cybersecurity through perimeter configuration and filtering part 3

    1. Segment 25 - Implementing defense measures in cybersecurity events

    2. Segment 26 - Fundamentals of network filtering and segmentation

    3. Segment 27 - Benefits and challenges of network segmentation

    4. Segment 28 - Internal honeypots, sinkholes, and blackholes in network security

    5. Segment 29 - Best practices for implementing network security measures

    6. Segment 30 - Deception techniques in network security

    1. Segment 31 - Understanding deception techniques in cybersecurity

    2. Segment 32 - Labyrinth tool: Creating ghost IP addresses for deception

    3. Segment 33 - Leveraging ghost IP addresses for threat identification

    4. Segment 34 - Blackholes and decoys: Countermeasures

    5. Segment 35 - Layer 3 and Layer 4 decoys: Diversion and intelligence gathering

    6. Segment 36 - Decoy segments and deception strategies

    7. Segment 37 - Conclusion

About this course

  • Free
  • 37 lessons
  • 4 hours of video content

Discover your potential, starting today