Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

 

 
Syllabus

Information Security Fundamentals

Instructor Names​: Rasha Sharif, Gerianne Roberts, Dustin Perry, Ken Underhill

Course Creation Date​: 8/7/19

Description and Goals

Description:​ Information Security Fundamentals is designed to give students fundamental


security knowledge. We take a high-level overview of topics, like risk management, security
policies, basic networking, password cracking, cryptography, malware, mobile security, and
more. Students will start by learning fundamental topics in networking such as common
network devices, TCP/UDP, Firewalls, and the Network Topology. From there, the student will
be able to understand the importance of protecting data, as well as common practices and
policies used by information security practitioners. Afterwards, students will receive an
overview on various offensive security topics including malware, password cracking, sniffing,
and more! This is a great for students transitioning from an IT role or students pursuing a full
career change. The will expose the student to both offensive and defensive topics to help the
student identify areas of interest. By the end, the student should have a high level
understanding of the fundamental concepts and practices used by information security
practitioners.

Prerequisites: ​There are no specific prerequisites for this, but it is recommended that students
have a basic knowledge of computers.

Goals: ​By the end of this, students should be able to:

❏ Understand basic computer networking


❏ Understand basic cryptography
❏ Understand different methods of password cracking

 
1
Brought to you by:  

Develop your team with the fastest growing catalog in the cybersecurity industry. Enterprise-grade workforce 
development management, advanced training features and detailed skill gap and competency analytics. 
 
 
 
 

Labs Used: ​Students will use the following labs:


 
Wireshark (Cybrscore),  
Using Snort and Wireshark to Analyze Traffic (Cybrscore),  
Applying Filters to TCPDump and Wireshark (Cybrscore) 
Analyze and Classify Malware (Cybrscore),  
Advanced Techniques for Malware Recovery (Cybrscore) 
Open Source Password Cracking (Cybrscore) 
Cryptography (Cydefe) 
Sniffing: Wireshark, TCPDump (Cydefe) 
Password Attacks (Cydefe) 

Outline

Cybersecurity Fundamentals

Learning Activity Duration Format


(min.)
1 - Networking What is a computer network? 9:31 Video Content
Fundamentals

1 - Networking OSI Model 16:58 Video Content


Fundamentals

1 - Networking Network Devices 7:53 Video Content


Fundamentals

1 - Networking TCP vs UDP Protocols 10:22 Video Content


Fundamentals

1 - Networking ICMP 10:55 Video Content


Fundamentals

 
2
Brought to you by:  

Develop your team with the fastest growing catalog in the cybersecurity industry. Enterprise-grade workforce 
development management, advanced training features and detailed skill gap and competency analytics. 
 
 
 
 

1 - Networking Firewall Rules and Configurations 12:03 Video Content


Fundamentals

1 - Networking Virtual Private Network (VPN) 11:20 Video Content


Fundamentals

1 - Networking Wifi and Bluetooth 4:41 Video Content


Fundamentals

1 - Networking Network Topology 8:54 Video Content


Fundamentals

1 - Networking Binary Conversion 6:46 Video Content


Fundamentals

2 - Data Cryptography 7:21 Video Content


Protection
Fundamentals

2 - Data Symmetric Encryption 12:35 Video Content


Protection
Fundamentals

2 - Data Hashing 6:21 Video Content


Protection
Fundamentals

2 - Data States of Data 6:35 Video Content


Protection
Fundamentals

2 - Data PKI 6:48 Video Content


Protection
Fundamentals

2 - Data Steganography 4:00 Video Content


Protection
Fundamentals

2 - Data Authorization, Authentication, & 15:42 Video Content


Protection Accounting (AAA)
Fundamentals
 
3
Brought to you by:  

Develop your team with the fastest growing catalog in the cybersecurity industry. Enterprise-grade workforce 
development management, advanced training features and detailed skill gap and competency analytics. 
 
 
 
 

3 - Fundamentals CIA Triad 5:25 Video Content


of Risk Policies
and Security
Controls

3 - Fundamentals Risk Management Overview 8:41 Video Content


of Risk Policies
and Security
Controls

3 - Fundamentals Security Policies 5:25 Video Content


of Risk Policies
and Security
Controls

3 - Fundamentals Security Controls 11:11 Video Content


of Risk Policies
and Security
Controls

3 - Fundamentals Business Continuity Plan (BCP) 7:25 Video Content


of Risk Policies
and Security
Controls

3 - Fundamentals Disaster Recovery Plan (DRP) 6:16 Video Content


of Risk Policies
and Security
Controls

4 - Pentest Introduction to Sniffing 5:17 Video Content


Fundamentals:
Sniffing

4 - Pentest Wireshark 09:23 Video Content


Fundamentals:
Sniffing

4 - Pentest TCP Dump 11:35 Video Content


Fundamentals:
Sniffing

 
4
Brought to you by:  

Develop your team with the fastest growing catalog in the cybersecurity industry. Enterprise-grade workforce 
development management, advanced training features and detailed skill gap and competency analytics. 
 
 
 
 

4 - Pentest Sniffing Quiz 02:38 Video Content


Fundamentals:
Sniffing

4 - Pentest Wireshark (Cybrscore) Hands On


Fundamentals: Virtual Lab
Sniffing

4 - Pentest Using Snort and Wireshark to Analyze Hands On


Fundamentals: Traffic (Cybrscore) Virtual Lab
Sniffing

4 - Pentest Applying Filters to TCPDump and Hands On


Fundamentals: Wireshark (Cybrscore) Virtual Lab
Sniffing

4 - Pentest Sniffing:Wireshark, TCPDump (Cydefe) Practice


Fundamentals: Assessment
Sniffing

5 - Malware Introduction to Malware 3:20 Video Content


Fundamentals

5 - Malware Types of Malware 8:46 Video Content


Fundamentals

5 - Malware Famous Malware 7:43 Video Content


Fundamentals

5 - Malware Protecting Yourself 6:00 Video Content


Fundamentals

5 - Malware Analyze and Classify Malware Hands-On


Fundamentals (Cybrscore) Virtual Lab

6 - Mobile Mobile Security Basic Architecture (7:52) Video Content


Security
Fundamentals

6 - Mobile Mobile Security Defense (7:03) Video Content


Security

 
5
Brought to you by:  

Develop your team with the fastest growing catalog in the cybersecurity industry. Enterprise-grade workforce 
development management, advanced training features and detailed skill gap and competency analytics. 
 
 
 
 

Fundamentals

6 - Mobile Mobile Offensive (IOS) Part 1 (11:15) Video Content


Security
Fundamentals

6 - Mobile Mobile Offensive (Android) Part 2 (4:14) Video Content


Security
Fundamentals

7 - Password Password Cracking Foundations (8:38) Video Content


Cracking Tool
Fundamentals

7 - Password John the Ripper Introduction (7:13) Video Content


Cracking Tool
Fundamentals

7 - Password John the Ripper Demonstration (5:39) Video Content


Cracking Tool
Fundamentals

7 - Password Hash Suite (4:14) Video Content


Cracking Tool
Fundamentals

7 - Password Cain and Abel (9:39) Video Content


Cracking Tool
Fundamentals

7 - Password Securing Your Password (4:54) Video Content


Cracking Tool
Fundamentals

7 - Password Open Source Password Cracking Hands On


Cracking Tool (Cybrscore) Virtual Lab
Fundamentals

7 - Password Password Attacks (Cydefe) Practice


Cracking Tool Assessment
Fundamentals

 
6
Brought to you by:  

Develop your team with the fastest growing catalog in the cybersecurity industry. Enterprise-grade workforce 
development management, advanced training features and detailed skill gap and competency analytics. 
 
 
 
 

 
7
Brought to you by:  

Develop your team with the fastest growing catalog in the cybersecurity industry. Enterprise-grade workforce 
development management, advanced training features and detailed skill gap and competency analytics. 
 
 

You might also like