1. Cloud Security and Compliance
2. Threats and Vulnerabilities
3. Proactive Security Scanning
4. Data Security
5. Application and Infrastructure Security
6. Compliance Standards and Certifications
7. Plan for Cloud Cybersecurity
8. Security Patterns and Controls
9. Cloud Storage Security
10. Cloud Network Security
11. Cloud Compute Security
12. Cloud Security Solutions
13. Intro to Digital Certificates and the PKI
14. Symmetrical vs Asymmetrical Encryption
15. Digital Certificates Overview
16. Digital Signatures
17. Creating an HTTPS Session Key
18. Public Key Infrastructure
19. Quiz and Review
20. Intro to Secure Network Design
21. Network Segmentation
22. Network Firewalls
23. ACL Case Study
24. Load Balancing
25. Virtual private network (VPN)
26. Layer 2 Security
27. Network-based IDSIPS
28. Quiz and Review
29. Intro to Secure Protocols
30. IPsec and VPNs
31. Secure Shell (SSH)
32. Domain Name System (DNS)
33. HTTPS
34. Weak Protocols
35. IP Addressing and Routing
36. Email Protocols
37. LDAP
38. SNMP, NTP, & SRTP
39. Quiz and Review
40. Intro to Host and App Security
41. Device Hardening
42. Boot integrity
43. Local Endpoint Protection
44. Network Based Protection
45. Secure Applications
46. Quiz and Review
47. Scanning, Monitoring & Patching Scanning Overview
48. Scanning, Monitoring & Patching Network Scanning Methodology
49. Scanning, Monitoring & Patching Port Scanning and Discovery
50. Scanning, Monitoring & Patching OS Discovery and Fingerprinting
51. Scanning, Monitoring & Patching Motivators for Vulnerability Management
52. Scanning, Monitoring & Patching Vulnerability Scanning
53. Scanning, Monitoring & Patching Logging and Review
54. Scanning, Monitoring & Patching Packet and Traffic Analysis
55. Scanning, Monitoring & Patching Packet Capture and Analysis Lab
56. Scanning, Monitoring & Patching Remediation and Patch Management
57. Scanning, Monitoring & Patching Network Scanning with NMAP and Zenmap Lab
58. Scanning, Monitoring & Patching Baselines
59. Plan for Cloud Governance
60. Risk Management
61. Resource Management
62. Vendor Lock-In and Data Portability
63. Documentation
64. Policies and Procedures
65. Dealing with Prohibited Activities
66. Incident Response
67. The Chain of Custody
68. Software Licensing
69. Sensitive Data
70. Identifying an Incident
71. Containing and Mitigating an Outbreak
72. Forensic Data Collection
73. Forensics In the Cloud
74. Forensic Evidence Management