Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Cybersecurity for IT Professionals

Description

Protect your networks from cyberattacks. Learn how to implement antivirus protection and firewalls and scan for suspicious activity.

Tags

Syllabus

Introduction
  • Learn the basics and common tools of cybersecurity
  • What you should know
  • Disclaimer
1. Why Cybersecurity?
  • A history of hackers
  • The cyber kill chain
  • Stuxnet and the kill chain
  • Common forms of cyber attack
2. Antivirus
  • Viruses, spyware, and adware
  • Introducing Microsoft Windows Defender
  • Detecting malware with Defender
  • Defender advanced settings
  • Automating scans with task scheduler
  • Other antivirus solutions
3. Firewalls
  • Why firewalls?
  • Windows firewall basics
  • Advanced Windows firewall
  • ZedLan firewall log analyzer
  • Introducing Linux iptables
  • Setting up a simple iptables firewall
4. Network Scanning
  • Getting started with Nmap
  • Advanced Nmap options
  • GUI scanning with Zenmap
5. Network Connections
  • Getting started with netcat
  • Transferring files using netcat
  • Connecting to services
  • Setting up a netcat honeypot
6. Vulnerability Scanning
  • Preparing Nessus to do scanning
  • Setting up a Nessus policy
  • Running a Nessus scan
  • Scheduling scans
7. Web Applications
  • Combating application level threats
  • Running an SQL injection attack
  • Cross-site scripting
  • Installing a web scanner
  • Scanning a website
  • Using a web proxy to inspect traffic
8. Monitoring Packets
  • Explaining networks
  • Capturing packets with Wireshark
  • Making sense of the protocols
  • Using Wireshark filters
  • Capturing intruders with packets
Conclusion
  • Next steps

Online Course


Cybersecurity for IT Professionals

Affiliate notice

Protect your networks from cyberattacks. Learn how to implement antivirus protection and firewalls and scan for suspicious activity.

Introduction
  • Learn the basics and common tools of cybersecurity
  • What you should know
  • Disclaimer
1. Why Cybersecurity?
  • A history of hackers
  • The cyber kill chain
  • Stuxnet and the kill chain
  • Common forms of cyber attack
2. Antivirus
  • Viruses, spyware, and adware
  • Introducing Microsoft Windows Defender
  • Detecting malware with Defender
  • Defender advanced settings
  • Automating scans with task scheduler
  • Other antivirus solutions
3. Firewalls
  • Why firewalls?
  • Windows firewall basics
  • Advanced Windows firewall
  • ZedLan firewall log analyzer
  • Introducing Linux iptables
  • Setting up a simple iptables firewall
4. Network Scanning
  • Getting started with Nmap
  • Advanced Nmap options
  • GUI scanning with Zenmap
5. Network Connections
  • Getting started with netcat
  • Transferring files using netcat
  • Connecting to services
  • Setting up a netcat honeypot
6. Vulnerability Scanning
  • Preparing Nessus to do scanning
  • Setting up a Nessus policy
  • Running a Nessus scan
  • Scheduling scans
7. Web Applications
  • Combating application level threats
  • Running an SQL injection attack
  • Cross-site scripting
  • Installing a web scanner
  • Scanning a website
  • Using a web proxy to inspect traffic
8. Monitoring Packets
  • Explaining networks
  • Capturing packets with Wireshark
  • Making sense of the protocols
  • Using Wireshark filters
  • Capturing intruders with packets
Conclusion
  • Next steps