Video description
12 Hours of Video Instruction
Start your cybersecurity career by learning security principles and practices from cybersecurity expert Omar Santos.
The Practical Cybersecurity Fundamentals LiveLessons gives you the core knowledge to start your own cybersecurity journey. This course is suitable for anyone looking to start their journey or anyone who is looking to get a security certification such as CompTIA Security+, Cisco CyberOps Associate, Certified Ethical Hacker (CEH), and GIAC Information.
Omar Santos takes you on a deep dive into Cybersecurity fundamentals with a training full of demos and real-world examples that allow you to test your skills in a practical scenario. There’s never been a better time to get started on your cybersecurity career!
Sign up for cybersecurity live training classes by Omar Santos
Topics covered include:
- Cybersecurity Fundamentals—Introduces the fundamental topics of security principles, business continuity (BC), disaster recovery (DR), and incident responses. This module will also cover network security and how to operate security and software defined networking including cryptography, AAA, and identity management.
- Incident Response, Digital Forensics, and Threat Hunting—Explores the core fundamentals of incident response, threat hunting, and digital forensics. It will teach you tactical, operational, and strategic level cyber threat intelligence skills and tradecraft required to make security teams better, threat hunting more accurate, incident response more effective, and organizations more aware of the evolving threat landscape.
- Ethical Hacking, Penetration Testing, and Bug Hunting—Starts with an overview of security penetration testing and bug hunting. It covers important ethical hacking topics of passive reconnaissance, OSINT, active reconnaissance, enumeration, and scanning. You will be able to conduct successful penetration testing (ethical hacking) assessments for a modern enterprise, including on-premises systems and cloud offers.
- Cloud, DevOps, and IoT Security—Covers cloud security concepts, DevOps, and IOT security. It provides a foundational set of standardized skills and knowledge for IoT and industrial control systems (ICS) cybersecurity professionals. You will learn foundational concepts on how to keep the ICS/SCADA/IoT operational environment safe, secure, and resilient against current and emerging cyber threats.
- AI Security, Ethics, and Privacy: Balancing Innovation with Protection—Introduces AI security, where you will explore LLMs, ChatGPT, Co-Pilot, and more. You will get a deep dive into different types of AI threats: data poison, model inversion, membership inference, model theft, and MITRE’s ATLAS. You will also learn the principle of secure AI development.
About the Instructor
Omar Santos is a recognized cybersecurity thought leader with a passion for driving industry-wide initiatives to enhance the security of critical infrastructures. Omar is the chair of the Common Security Advisory Framework (CSAF) technical committee, the chair and founder of OpenEoX, and a member of the board of directors of OASIS Open and the co-lead of the DEF CON Red Team Village. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is a renowned expert in ethical hacking, vulnerability research, and incident response. He employs his deep understanding of these disciplines to help organizations stay ahead of emerging threats. His dedication to cybersecurity has made a significant impact on businesses, academic institutions, law enforcement agencies, and other entities striving to bolster their security measures. With more than 20 books, video courses, white papers, and technical articles under his belt, Omar's expertise is widely recognized and respected. Omar is a Distinguished Engineer leading the AI Security Research at Cisco’s Security & Trust Research and Operations. Omar not only leads engineers and incident managers in investigating and resolving cybersecurity vulnerabilities, but also actively mentors the next generation of security professionals.
Skill Level:
- Beginner
Learn How To:
- Understand core cybersecurity fundamentals
- Perform ethical hacking, penetration testing and bug hunting
- Explore system and application including active and passive reconnaissance
- Understand cloud security concepts including IoT and DevSecOps
Course requirement:
- None
Who Should Take This Course:
- Anyone contemplating starting a career in cyber security
- Anyone who would like to better understand cyber security concepts
- Anyone studying for a security cert like CompTIA Security+, Cisco CyberOps Associate, Certified Ethical Hacker (CEH), GIAC Information
About Pearson Video Training:
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Table of contents
- Introduction
- Module 1: Cybersecurity Fundamentals
- Lesson 1: Security Principles
- Lesson 2: Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts
-
Lesson 3: Access Control Concepts
- Learning objectives
- 3.1 Understanding Physical Access Controls
- 3.2 Exploring the Principle of Least Privilege
- 3.3 Understanding the Concept of Segregation of Duties
- 3.4 Introducing Discretionary Access Control (DAC)
- 3.5 Understanding Mandatory Access Control (MAC)
- 3.6 Understanding Role-based Access Control (RBAC)
- Lesson 4: Network Security
- Lesson 5: Security Operations
- Lesson 6: Software Defined Networking and Infrastructure as Code
-
Lesson 7: Cryptography
- Learning objectives
- 7.1 Introducing Cryptography and Cryptanalysis
- 7.2 Understanding Encryption Protocols
- 7.3 Describing Hashing Algorithms
- 7.4 Introducing Public Key Infrastructure (PKI)
- 7.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment
- 7.6 Surveying SSL and TLS Implementations
- 7.7 Surveying IPsec Implementations and Modern VPN Implementations
- Lesson 8: AAA, Identity Management, Network Visibility, and Segmentation
- Module 2: Incident Response, Digital Forensics, and Threat Hunting
-
Lesson 9: Incident Response Fundamentals
- Learning objectives
- 9.1 Exploring How to Get Started in Incident Response
- 9.2 Understanding the Incident Response Process
- 9.3 Defining Playbooks and Run Book Automation (RBA)
- 9.4 Understanding Cyber Threat Intelligence (CTI)
- 9.5 Understanding Data Normalization
- 9.6 Deconstructing Universal Data Formats and 5-tuple Correlation
- 9.7 Understanding Security Monitoring Fundamentals
- 9.8 Surveying Security Monitoring Tools
- Lesson 10: Threat Hunting Fundamentals
-
Lesson 11: Digital Forensics
- Learning objectives
- 11.1 Introducing Digital Forensics
- 11.2 Introducing Reverse Engineering
- 11.3 Understanding Evidence Preservation and Chain of Custody
- 11.4 Collecting Evidence from Endpoints and Servers
- 11.5 Collecting Evidence from Mobile and IoT Devices
- 11.6 Exploring Memory Analysis with Volatility
- Module 3: Ethical Hacking, Penetration Testing, and Bug Hunting
-
Lesson 12: Introduction to Security Penetration Testing and Bug Hunting
- Learning objectives
- 12.1 How to Start a Career in Ethical Hacking
- 12.2 Understanding the Difference Between Traditional Pen Testing, Bug Bounties, and Red Team Assessments
- 12.3 Exploring Bug Bounty Programs
- 12.4 Understanding the Ethical Hacking and Bug Hunting Methodology
- 12.5 Planning and Scoping a Penetration Testing Assessment
-
Lesson 13: Passive Reconnaissance and OSINT
- Learning objectives
- 13.1 Understanding Information Gathering and Vulnerability Identification
- 13.2 Introducing Open Source Intelligence (OSINT) Techniques
- 13.3 Performing DNS-based Passive Recon
- 13.4 Identifying Cloud vs. Self-hosted Assets
- 13.5 Introducing Shodan, Maltego, AMass, Recon-NG, and other Recon Tools
- 13.6 Surveying Password Dumps, File Metadata, and Public Source-code Repositories
- 13.7 Introduction to Google Hacking and Search Engine Reconnaissance
- Lesson 14: Active Reconnaissance, Enumeration, and Scanning
-
Lesson 15: Exploiting Systems and Applications
- Learning objectives
- 15.1 Performing On-Path Attacks
- 15.2 Exploring the OWASP Top 10 Risks in Web Applications
- 15.3 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF) Vulnerabilities
- 15.4 Understanding Server-side Request Forgery (SSRF) Vulnerabilities
- 15.5 Hacking Databases
- 15.6 Exploiting Wireless Vulnerabilities
- 15.7 Exploiting Buffer Overflows and Creating Payloads
-
Lesson 16: Post Exploitation Techniques and Reporting
- Learning objectives
- 16.1 Avoiding Detection and Evading Security Tools
- 16.2 Introduction to Lateral Movement and Exfiltration
- 16.3 Exploring Command and Control (C2) Techniques
- 16.4 Understanding Living-off-the-land and Fileless Malware
- 16.5 Best Practices when Creating Pen Testing and Bug Bounty Reports
- 16.6 Understanding Post-Engagement Cleanup
- Module 4: Cloud, DevOps, and IoT Security
- Lesson 17: Cloud Security Concepts
- Lesson 18: DevSecOps
- Lesson 19: IoT Security
- Module 5: AI Security, Ethics, and Privacy: Balancing Innovation with Protection
- Lesson 20: Introduction to AI Security
- Lesson 21: A Deep Dive into the Different Types of AI Threats
-
Lesson 22: Principles of Secure AI Development
- Learning objectives
- 22.1 Exploring the Secure AI Development Lifecycle
- 22.2 Understanding Privacy-preserving AI Techniques
- 22.3 Understanding Robustness and Resilience in AI Models
- 22.4 Surveying AI Security Best Practices
- 22.5 Exploring AI Security Tools and Frameworks
- 22.6 Understanding the Legal Landscape and Potential New Regulations
- 22.7 Investigating Ethical Implications of Artificial Intelligence
- Summary
Product information
- Title: Practical Cybersecurity Fundamentals
- Author(s):
- Release date: December 2023
- Publisher(s): Pearson
- ISBN: 0138037558
You might also like
video
CompTIA Cybersecurity Analyst (CySA+) CS0-003
10+ Hours of Video Instruction Get prepared to take on the CompTIA Cybersecurity Analyst (CySA+) exam! …
book
Computer Security Fundamentals, 5th Edition
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's …
video
Cybersecurity Architecture Fundamentals
This course provides a comprehensive overview of cybersecurity architecture, equipping students with the knowledge and skills …
video
CCNA Exam, Part 1: Network Fundamentals
The Cisco Certified Network Associate or CCNA exam validates your knowledge of fundamental networking concepts, and …