• Search...

categories: Technology & Innovation

Software
Technology
Cyber Security, troubleshooting
SDG 4: Quality Education
SDG 8: Decent Work and Economic Growth
SDG 9: Industry, Innovation and Infrastructure

Infrastructure Services & Infrastructure Security

Duration: 2 h 59 m / 36 lessons

Level: General

Course Language: Arabic

By the end of this course, you will be able to

  • By the end of this course, you will learn to configure, verify, and troubleshoot port security in addition to the IPv4 and IPv6 access lists to filter traffic.

  • Check ACLs using the APIC-EM Path Trace ACL Analysis Tool.

  • Configure, verify, and troubleshoot basic device hardening issues and describe device security using AAA with TACACS+ and RADIUS.

Course details

  • 2 h 59 m/36 lessons
  • Last updated: 27/10/2022
  • Course completion certificate

Course Content

Free lessons

1.

Enterprise Infrastructure Components

1 Minutes
2.

Securing Windows Servers

2 Minutes
3.

System Hardening

3 Minutes
4.

Server Security

1 Minutes
1.

Enterprise Infrastructure Components

1 Minutes
2.

Securing Windows Servers

2 Minutes
3.

System Hardening

3 Minutes
4.

Server Security

1 Minutes
5.

Securing Network Devices

2 Minutes
6.

VOIP Systems

3 Minutes
7.

Cloud Services

3 Minutes
8.

Types of Cloud Systems

5 Minutes
9.

Securing Cloud Services

3 Minutes
10.

Cloud Services Vs On-Premises Services

3 Minutes
11.

BYOD Security

5 Minutes
1.

Technological Architecture Breakdown

7 Minutes
2.

Logical Analysis of Data Flow 1

6 Minutes
3.

Logical Analysis of Data Flow 2

6 Minutes
4.

Logical Analysis of Data Flow 3

3 Minutes
5.

Network Topology Analysis 1

7 Minutes
6.

Network Topology Analysis 2

2 Minutes
7.

Application Layer Analysis 1

7 Minutes
8.

Application Layer Analysis 2

4 Minutes
9.

Infrastructure Layer Analysis 1

6 Minutes
10.

Infrastructure Layer Analysis 2

5 Minutes
11.

Physical layer analysis

5 Minutes
12.

Exercise 1: Sample Identification Methods 1

4 Minutes
13.

Exercise 1: Sample Identification Methods 2

5 Minutes
14.

Exercise 1: Sample Identification Methods 3

3 Minutes
15.

Exercise 2: Physical Security Controls 1

6 Minutes
16.

Exercise 2: Physical Security Controls 2

5 Minutes
17.

Full-Stack Architecture Security

7 Minutes
18.

Exercise 3: Integrated Architecture Security

7 Minutes
19.

Introduction to Configuration Hardening

4 Minutes
20.

Reference Lines for Increasing Configuration Hardening

4 Minutes
21.

Increasing Configuration Hardening

4 Minutes
22.

Increasing Configuration Hardening (Password Policy)

6 Minutes
23.

Increasing Configuration Hardening (Secure Access)

5 Minutes
24.

Increasing Configuration Hardening (Registration)

7 Minutes
25.

Exercise 4: Increasing Hardness of Sample Device

6 Minutes

About this course

In this track, you will learn the cybersecurity fundamentals, the basics of networking, the fields of cybersecurity, basic concepts of cybersecurity, how to create security objects, implement security services, and identify and assess different types of risks. You will also learn about cybersecurity controls, the concept of ethical hacking, infrastructure services, and secure infrastructure engineering. Also, through this track, you will learn about hacking techniques, how to handle and respond to various incidents, and malware reverse engineering techniques.

Course requirements and prerequisites

Graduate from Engineering or Computer Science

Strong problem solving skills

Detail-oriented

Mentor

Looking for help?