Getting Started with Security Fundamentals
- 2m 25s
—Introduction to Your Instructor and the Course
2m 25s
Introducing Security
- 25m 8s
—Introduction
0m 37s
—What is Security?
1m 48s
—Confidentiality
2m 23s
—Classifying Data
1m 28s
—Integrity
1m 43s
—Availability
1m 26s
—Defining Threats and Risk Management
1m 13s
—Risk Categories
2m 31s
—Principle of Least Privilege (PoLP)
1m 24s
—Ways of Implementing PoLP
1m 20s
—Attack Surface
3m 56s
—Social Engineering
2m 51s
—Linking Cost with Security
1m 38s
—What We Covered
0m 50s
Physical Security as the First Line of Defense
- 11m 54s
—Introduction
1m 14s
—Site Security
2m 39s
—Physical Security
7m 31s
—What We Covered
0m 30s
Starting Security with Authentication
- 29m 28s
—Introduction
0m 55s
—What is Authentication?
1m 48s
—Passwords: Authenticating with What You Are
1m 31s
—Password Pros and Cons
2m 26s
—Password Hashing
1m 29s
—Password Cracking
2m 52s
—Tokens: Authenticating with What You Possess
1m 37s
—Tokens Pros and Cons
1m 44s
—Smart Cards: Another Type of Token
1m 57s
—Biometrics: Authenticating with What You Are
0m 55s
—Biometrics Pros and Cons
1m 34s
—RADIUS and TACACS+
4m 30s
—Windows' RunAs Capability
4m 14s
—Key Terms You Should Know
0m 43s
—What We Covered
1m 13s
Authentication Basics
- 19m 6s
—Introduction
0m 43s
—Meeting Active Directory
3m 56s
—Domain Controllers
1m 8s
—Management Tools
2m 33s
—NTLM
3m 3s
—Kerberos
6m 6s
—NTLM vs. Kerberos
1m 37s
Active Directory
- 15m 52s
—Introduction
3m 43s
—Organizational Units
5m 20s
—Directory Objects and Groups
6m 49s
Using Encryption to Protect Data
- 21m 48s
—Introduction
0m 51s
—What is Encryption?
4m 59s
—Public Key Infrastructure
7m 32s
—Protecting Email, Files, and Disks
7m 54s
—What We Covered
0m 32s
Securing Files via NTFS
- 14m 18s
—Introduction
0m 47s
—Rights vs. Permissions
8m 55s
—Copying and Moving Files
2m 24s
—File and Folder Owners
1m 37s
—What We Covered
0m 35s
Sharing Drives and Folders
- 12m 36s
—Introduction
0m 31s
—Introduction to Shares
6m 9s
—Share vs. File Permissions
2m 40s
—Special and Admin Shares
2m 39s
—What We Covered
0m 37s
Introducing the Registry
- 11m 47s
—The Purpose of the Registry
6m 58s
—Registry Permissions and Inheritance
4m 49s
—Introduction
0m 30s
—What is IPSec?
4m 14s
—Triggers and Actions
4m 30s
—Virtual Private Networks (VPNs)
7m 26s
—Introduction
0m 35s
—The Purpose of Auditing
1m 22s
—Configuring Auditing
3m 23s
—The Audit Log
4m 5s
—Considerations for Windows' Native Auditing
2m 12s
Enhancing Security via Password Policies
- 19m 44s
—Introduction
0m 45s
—Strong Passwords
3m 6s
—Passphrases
1m 39s
—Account Lockout
3m 55s
—Password Aging and History
3m 26s
—GPOs and Password Policies
3m 24s
—Understanding Common Password Attacks
3m 29s
Managing Security via Role-Based Access Control
- 10m 48s
—Introduction
0m 38s
—Roles vs. Groups
1m 38s
—The Benefits of RBAC
1m 6s
—The Challenges of RBAC
7m 26s
Using Dedicated Firewalls to Protect a Network
- 16m 54s
—Introduction
0m 34s
—Firewalls and the OSI Model
11m 17s
—Packet Filtering and Other Firewalls
2m 34s
—Stateful vs. Stateless
1m 25s
—Hardware vs. Software
1m 4s
Controlling Access with Network Access Protection
- 7m 46s
—The Purpose of NAP
2m 47s
—How NAP Works
0m 39s
—NAP Requirements
4m 20s
Using Isolation to Protect the Network
- 18m 23s
—Introduction
4m 29s
—Virtual LANs (VLANs)
3m 45s
—Routing
2m 12s
—Intrusion Detection/Prevention Systems (IDS/IPS)
1m 6s
—Honeypots
1m 7s
—Demilitarized Zones (DMZs)
1m 39s
—Network Address Translation (NAT)
2m 8s
—Virtual Private Networks (VPNs)
1m 57s
Protecting Data with Protocol Security
- 12m 16s
—Introduction
0m 31s
—Tunneling
2m 16s
—DNS Security Extensions (DNSSEC)
2m 14s
—Network Sniffing and Packet Analysis
3m 12s
—Common Network Attacks
4m 3s
Securing Wireless Networks
- 8m 14s
—Introduction
1m 22s
—SSIDs
1m 6s
—Keys
2m 59s
—MAC Filters
1m 31s
—Pros and Cons
1m 16s
Protecting Client Computers
- 19m 9s
—Introduction
0m 30s
—Protection from Malware
1m 46s
—Windows Updates
2m 17s
—User Account Control
3m 14s
—Windows Firewall
2m 43s
—Offline Files
1m 6s
—Locking Down a Client Computer
7m 33s
Protecting E-Mail Services
- 5m 51s
—Spam
2m 5s
—Relaying
3m 46s
Securing Web Browsers
- 13m 25s
—Introduction
0m 51s
—Cookies and Privacy
7m 32s
—Content Zones
2m 37s
—Phishing and Pharming
2m 25s
Protecting Servers
- 7m 38s
—Physical Placement
1m 15s
—Hardening
3m 27s
—Secure Dynamic DNS
2m 56s
Protecting Web Servers
- 8m 38s
—Introduction
0m 56s
—Web Authentication
5m 16s
—Web Authorization
2m 26s
Preparing for Your Security Fundamentals (98-367) Exam
- 4m 21s
—Preparing for the Exam
4m 21s
—Next Steps
2m 0s