categories: Technology & Innovation
Level: General
Course Language: Arabic
By the end of this course, you will learn to configure, verify, and troubleshoot port security in addition to the IPv4 and IPv6 access lists to filter traffic.
Check ACLs using the APIC-EM Path Trace ACL Analysis Tool.
Configure, verify, and troubleshoot basic device hardening issues and describe device security using AAA with TACACS+ and RADIUS.
Free lessons
Enterprise Infrastructure Components
Securing Windows Servers
System Hardening
Server Security
1. Ch1. Infrastructure Service
Enterprise Infrastructure Components
Securing Windows Servers
System Hardening
Server Security
Securing Network Devices
VOIP Systems
Cloud Services
Types of Cloud Systems
Securing Cloud Services
Cloud Services Vs On-Premises Services
BYOD Security
2. Ch2 . Infrastructure Security
Technological Architecture Breakdown
Logical Analysis of Data Flow 1
Logical Analysis of Data Flow 2
Logical Analysis of Data Flow 3
Network Topology Analysis 1
Network Topology Analysis 2
Application Layer Analysis 1
Application Layer Analysis 2
Infrastructure Layer Analysis 1
Infrastructure Layer Analysis 2
Physical layer analysis
Exercise 1: Sample Identification Methods 1
Exercise 1: Sample Identification Methods 2
Exercise 1: Sample Identification Methods 3
Exercise 2: Physical Security Controls 1
Exercise 2: Physical Security Controls 2
Full-Stack Architecture Security
Exercise 3: Integrated Architecture Security
Introduction to Configuration Hardening
Reference Lines for Increasing Configuration Hardening
Increasing Configuration Hardening
Increasing Configuration Hardening (Password Policy)
Increasing Configuration Hardening (Secure Access)
Increasing Configuration Hardening (Registration)
Exercise 4: Increasing Hardness of Sample Device
In this track, you will learn the cybersecurity fundamentals, the basics of networking, the fields of cybersecurity, basic concepts of cybersecurity, how to create security objects, implement security services, and identify and assess different types of risks. You will also learn about cybersecurity controls, the concept of ethical hacking, infrastructure services, and secure infrastructure engineering. Also, through this track, you will learn about hacking techniques, how to handle and respond to various incidents, and malware reverse engineering techniques.
Graduate from Engineering or Computer Science
Strong problem solving skills
Detail-oriented
Cyber security program manager
973 Learners
3 Courses
Cyber Security Consultant
3,090 Learners
3 Courses