About the Book
Prepare yourself for a career in cybersecurity with this self-paced online training course. In 26 hours of targeted lessons, expert trainer Omar Santos will help you learn cybersecurity fundamentals. You’ll also enhance your resume with hands-on experience completing pen testing and ethical hacking guided labs. Each lesson builds on the next, and flashcards and quizzes are provided to help you master key topics.
Who should take this course Skill level | Beginner
Anyone interested in a career in cybersecurity
Anyone interested in learning the fundamentals of security and networking
Anyone looking for hands-on training with pen testing and ethical hacking
Course participants should have a basic knowledge of IT and be comfortable working with a computer.
For an optimal course experience, we recommend using these browsers and devices.
Course includes
26 hours of expert-led training videos to watch and learn at your own pace
Hands-on labs that demonstrate completing tasks in real time to simulate real-world experience with essential cybersecurity tasks
Self-study tools, such as flashcards to master key terms, and quizzes to self-assess your progress
1 year of access*
What you'll learn This Pearson IT Training Course provides a complete learning path to build your skills as a cybersecurity professional. Topics covered include the following:
Networking and Security Basics
Cybersecurity Management, Monitoring, and Analysis
Network Security Telemetry
Digital Forensics and Incident Response (DFIR)
Fundamentals of Ethical Hacking and Penetration Testing
Advanced Wireless Hacking and Penetration Testing
Mobile Device Security
Internet of Things (IoT) Security
*Retake guarantee Didn't pass your certification exam on your first try? We'll give you six months of additional access at no cost.
About Pearson IT Training Courses Pearson IT Training Courses are complete and affordable packages of expert-led, self-paced courses designed to help you stand out with in-demand skills that take your career to the next level.
From learning to hands-on practice and application, our comprehensive certification prep courses ensure you are ready for exam success.
Table of Contents:
Cybersecurity Foundations Introduction
Introduction
Module 1: Networking and Security Basics
Lesson 1: Networking Fundamentals
Learning objectives
Reviewing the OSI Model
Reviewing the TCP/IP Network Models
Surveying Common Networking Protocols: DHCP
Surveying Common Networking Protocols: Routing Protocols
Surveying Common Networking Protocols: ICMP
Surveying Common Networking Protocols: DNS
Identifying Networking Device Types
Understanding IP SubnetsExamining VLANs and Data Visibility
Examining VLANs and Data Visibility
Lesson 2: Security Principles
Learning objectives
Understanding Defense-in-Depth
Identifying Threats, Vulnerabilities, and Exploits and Their Associated Risk
Identifying Threat Actors
Understanding Reverse Engineering
Understanding Chain of Custody
Examining Run Books
Introducing PII and PHI
Understanding Principle of Least Privilege
Performing Risk Assessment
Lesson 2: Flashcards
Lesson 2: Quiz
Lesson 3: Access Control Models
Learning objectives
Understanding Confidentiality, Integrity, and Availability
Understanding Authentication, Authorization, and Accounting
Examining the Access Control Process: Terminology and Data Classification
Examining the Access Control Process: Data States and Policy Roles
Lab: Viewing the Windows File Registry
Examining the Access Control Process: Security and Access Control Classification
Understanding Discretionary Access Control
Understanding Mandatory Access Control
Understanding Role Based Access Control
Understanding Attribute Based Access Control
Lesson 3: Flashcards
Lesson 3: Quiz
Lesson 4: Fundamentals of Cryptography and PKI
Learning objectives
Understanding the Basic Components of Cryptography
Introducing Public Key Infrastructure
Deciphering Encryption Algorithms
Understanding Hashing Algorithms
Lab: Applying Symmetric Key Encryption
Examining Secure Socket Layer and Transport Layer Security
Lab: Configuring a Switch to Learn its IP Address with DHCP
Examining Digital Certificates
Lesson 4: Flashcards
Lesson 4: Quiz
Lesson 5: Introduction to Virtual Private Networks (VPNs)
Learning objectives
Introducing VPNs and Why We Use Them
Examining Remote Access VPNs
Lab: Generating a Symmetric Key
Examining Site-to-Site VPNs
Understanding IPsec Concepts, Components, and Operations
Lab: Using Dig for Passive Reconnaissance
Lab: Using Social Engineering Techniques to Plan an Attack
Lab: Attacking a Website Using XSS Injection
Surveying Cisco VPN Solutions: Traditional IPsec, DMVPN, FlexVPN
Surveying Cisco VPN Solutions: Clientless SSL and AnyConnect
Lab: Configuring Clientless SSL VPNs on ASDM
Lesson 5: Flashcards
Lesson 5: Quiz
Lesson 6: Endpoint Security Technologies
Learning objectives
Examining Host-Based Intrusion Detection
Exploring Antimalware and Antivirus
Understanding Host-based Firewalls
Lab: Using Uncomplicated Firewall (UFW)
Exploring Application-level Whitelisting/Blacklisting
Exploring Systems-based Sandboxing
Lesson 6: Flashcards
Lesson 6: Quiz
Lesson 7: Types of Attacks and Vulnerabilities
Learning objectives
Surveying Types of Vulnerabilities
Understanding Passive Reconnaissance and Social Engineering
Understanding Active Reconnaissance Port Scanning and Host Profiling
Understanding Privilege Escalation and Code Execution Attacks
Understanding Backdoors and Man-in-the Middle Attacks
Understanding Denial of Service Attacks
Surveying Attack Methods for Data Exfiltration
Understanding ARP Cache Poisoning and Route Manipulation Attacks
Understanding Password Attacks
Understanding Wireless Attacks
Exploring Security Evasion Techniques
Lab: Configuring a BPDU Guard and Implementing Port Security
Lesson 7: Flashcards
Lesson 7: Quiz
Lesson 8: Threat Analysis
Learning objectives
Understanding Risk Analysis
Understanding the Common Vulnerability Scoring System (CVSS)
Interpreting Malware Analysis Tool Output
Lab: Using the theHarvester Tool
Lesson 8: Flashcards
Lesson 8: Quiz
Module 2: Cybersecurity Management, Monitoring, and Analysis
Lesson 9: Introduction to Security Management
Learning objectives
Surveying Asset Management
Surveying Configuration Management
Surveying Mobile Device Management
Surveying Patch Management
Lab: Configuring Inbound Rules for a Firewall
Lab: Installing And Using Nfdump
Surveying Vulnerability Management
Understanding Network and Host Antivirus
Lab: Performing Active Reconnaissance
Understanding SEIM and Log Collection
Lesson 9: Flashcards
Lesson 9: Quiz
Lesson 10: Windows, Linux, and MAC OS X Based Analysis
Learning objectives
Understanding Windows Forensics Basics
Understanding Linux and MAC OS X Forensics Basics
Lab: Viewing and Changing File Permissions
Lab: Viewing Processes in Linux (Background+ Foreground)
Examining Web Server Logs
Lab: Enabling and Disabling VLANs on a Switch
Lesson 10: Flashcards
Lesson 10: Quiz
Lesson 11: Network and Host Telemetry
Learning objectives
Introducing NetFlow
Surveying Commercial and Open Source NetFlow Tools
Understanding Flexible NetFlow
Examining Firewall Logs
Understanding Application Visibility and Control
Examining Web and Email Content Filtering Logs
Lab: Performing Reconnaissance on a Network
Exploring Full Packet Capture
Surveying IPS Events
Surveying Host or Endpoint Events
Lesson 11: Flashcards
Lesson 11: Quiz
Module 3: Network Security Telemetry
Lesson 12: Introduction to NetFlow and IPFIX
Learning objectives
Introduction to NetFlow
Lab: Implementing IPsec VPNs through CLI
Lab: Configuring NetFlow and NetFlow Data Export
The Attack Continuum
The Network as a Sensor and as an Enforcer
What Is a Flow?
NetFlow Versus IP Accounting and Billing
NetFlow for Network Security
Traffic Engineering and Network Planning
Introduction to IP Flow Information Export (IPFIX)
Cisco Supported Platforms for NetFlow
NetFlow Versions and History
Lesson 13: NetFlow Deployment Scenarios
Learning objectives
Introduction to Cisco Cyber Threat Defense
Deployment Scenario: User Access Layer
Deployment Scenario: Wireless LAN
Deployment Scenario: Internet Edge
Deployment Scenario: Data Center
Deployment Scenario: NetFlow in Site-to-Site and Remote VPNs
NetFlow Collection Considerations and Best Practices
Determining the Flows per Second and Scalability
Lesson 13: Flashcards
Lesson 13: Quiz
Lesson 14: NetFlow Commercial and Open Source Monitoring and Analysis Software Packages
Learning objectives
Commercial NetFlow Monitoring and Analysis Software Packages
NFdump
NfSen
Lab: Using OpenSSL to Create a Public/Private Key Pair
Lab: Generating an Asymmetric Key
SiLK
Elasticsearch, Logstash, and Kibana Stack (ELK): Overview and Architecture
Lab: Installing Logstash and Kibana
ELK: Installation and Configuration Files
Lesson 14: Flashcards
Lesson 14: Quiz
Module 4: Digital Forensics and Incident Response (DFIR)
Lesson 15: Forensics
Learning objectives
Examining Types of Evidence
Surveying Windows Forensics: Application Processes, Threads, and Vulnerabilities
Surveying Windows Forensics: Memory
Surveying Windows Forensics: The Windows Registry
Surveying Windows Forensics: Hard Drives, FAT, and NTFS
Surveying Linux Forensics
Understanding Evidence Collection
Handling Evidence
Examining Asset and Threat Actor Attribution
Lesson 15: Flashcards
Lesson 15: Quiz
Lesson 16: Intrusion Analysis
Learning objectives
Introducing Intrusion Analysis Fundamentals
Examining Packet Captures
Examining Protocol Headers
Analyzing Security Device Data
Differentiating False Positives, False Negatives, True Positives, and True Negatives
Lesson 16: Flashcards
Lesson 16: Quiz
Lesson 17: Introduction to Incident Response
Learning objectives
Scoping the Incident Response Plan and Process
Understanding Information Sharing and Coordination
Lab: Using Burpsuite
Identifying the Incident Response Team Structure
Lesson 17: Flashcards
Lesson 17: Quiz
Lesson 18: Incident Response Teams
Learning objectives
Analyzing Computer Incident Response Teams (CSIRTs)
Analyzing Product Security Incident Response Teams (PSIRTs)
Surveying Coordination Centers
Analyzing Managed Security Service Providers Incident Response Teams
Lesson 18: Flashcards
Lesson 18: Quiz
Lesson 19: Network and Host Profiling
Learning objectives
Understanding Network Profiling
Lab: Using Kismet
Understanding Host Profiling
Lesson 19: Flashcards
Lesson 19: Quiz
Lesson 20: Data and Event Analysis
Learning objectives
Understanding Data Normalization
Deconstructing Universal Data Formats
Understanding the 5-tuple Correlation
Performing DNS Analysis
Lab: Using Maltego
Performing Web Log Analysis
Performing Deterministic and Probabilistic Analysis
Lab: Exploiting a Website Using SQL Injection
Lesson 20: Flashcards
Lesson 20: Quiz
Lesson 21: Intrusion Event Categories
Learning objectives
Identifying and Mitigating Reconnaissance
Identifying and Mitigating Weaponization
Identifying and Mitigating Delivery
Identifying and Mitigating Exploitation
Identifying and Mitigating Installation
Identifying and Mitigating Command and Control
Understanding Action on Objectives
Lesson 21: Flashcards
Lesson 21: Quiz
Lesson 22: The Incident Handling Process
Learning objectives
Introducing the Vocabulary for Event Recording and Incident Sharing (VERIS)
Applying the VERIS Schema to Incident Handling
Surveying the VERIS Incident Recording Tool and Other VERIS Resources
Lab: Grabbing a Screenshot of a Target Machine Using Metasploit
Lesson 22: Flashcards
Lesson 22: Quiz
Module 5: Fundamentals of Ethical Hacking and Penetration Testing
Lesson 23: Overview of Ethical Hacking and Penetration Testing
Learning objectives
Introducing Ethical Hacking and Pen Testing
Getting Started with Ethical Hacking and Pen Testing
Understanding the Legal Aspects of Penetration Testing
Lab: Observing an SHA-Generated Hash Value
Exploring Penetration Testing Methodologies
Lab: Configuring DHCP Snooping
Exploring Penetration Testing and other Cyber Security Certifications
Building Your Own Lab: Overview
Building Your Own Lab: VIRL and Operating System Software
Understanding Vulnerabilities, Threats, and Exploits
Understanding the Current Threat Landscape
Lesson 23: Flashcards
Lesson 23: Quiz
Lesson 24: Passive Reconnaissance
Learning objectives
Understanding Passive Reconnaissance
Exploring Passive Reconnaissance Methodologies: Discovering Host and Port Information
Exploring Passive Reconnaissance Methodologies: Searching for Files
Exploring Passive Reconnaissance Methodologies: Searching for Names, Passwords, and Sensitive Information
Lab: Enabling a Keylogger in a Target Machine
Surveying Essential Tools for Passive Reconnaissance: SpiderFoot, theHarvester, and Discover
Lab: Managing NTFS Permissions
Surveying Essential Tools for Passive Reconnaissance: Recon-ng
Lesson 24: Flashcards
Lesson 24: Quiz
Lesson 25: Active Reconnaissance
Learning objectives
Understanding Active Reconnaissance
Exploring Active Reconnaissance Methodologies from an Ethical Hacker Perspective
Surveying Essential Tools for Active Reconnaissance: Port Scanning and Web Service Review
Lab: Simulating a DoS Attack
Surveying Essential Tools for Active Reconnaissance: Network and Web Vulnerability Scanners
Lesson 25: Flashcards
Lesson 25: Quiz
Lesson 26: Hacking Web Applications
Learning objectives
Understanding Web Applications
Understanding Web Architectures
Uncovering Web Vulnerabilities
Testing Web Applications: Methodology
Lab: Configuring Site-to-Site IPsec VPN Topology
Testing Web Applications: Reconnaissance
Testing Web Applications: Mapping
Lab: Get settings and information about ports of TCP
Testing Web Applications: Vulnerability Discovery
Understanding the Exploitation of Web Applications
Surveying Defenses to Mitigate Web Application Hacking
Lesson 26: Flashcards
Lesson 26: Quiz
Lesson 27: Hacking Networking Devices
Learning objectives
Understanding the Reasons for and the Steps to Hacking a Network
Reviewing Networking Technology Fundamentals: OSI and DoD Internet Models
Reviewing Networking Technology Fundamentals: Forwarding Device Architecture and Communication
Building an Internetwork Topology Using VIRL
Hacking Switches: Reviewing Ethernet Fundamentals
Hacking Switches: Demo
Hacking Switches: ARP Vulnerabilities and ARP Cache Poisoning
Reviewing Router Fundamentals
Examining ICMP, First Hop Redundancy and Routing Protocol Attacks
Hacking the Management Plane
Understanding Firewall Fundamentals and Levels of Inspection
Performing Firewall Reconnaissance and Tunneling
Lab: Using the traceroute Command
Surveying Essential Tools for Hacking Network Devices: Packet Capture
Surveying Essential Tools for Hacking Network Devices: Switch and Router Hacking Tools
Surveying Essential Tools for Hacking Network Devices: ARP Spoofing Tools
Surveying Essential Tools for Hacking Network Devices: MiTM Tools
Surveying Essential Tools for Hacking Network Devices: Linux Tools
Using Network Device Hacking Tools to Perform a MiTM Attack
Lesson 27: Flashcards
Lesson 27: Quiz
Lesson 28: Fundamentals of Wireless Hacking
Learning objectives
Reviewing Wireless Technology Fundamentals
Surveying Wireless Hacking Tools: Wireless Adapters
Surveying Wireless Hacking Tools: Software
Hacking WEP, WPA, and Other Protocols
Understanding Hacking Wireless Clients
Lesson 28: Flashcards
Lesson 28: Quiz
Lesson 29: Buffer Overflows
Learning objectives
Understanding Buffer Overflows
Exploiting Buffer Overflows
Overcoming Defenses for Buffer Overflow Vulnerabilities
Understanding Fuzzing
Creating a Fuzzing Strategy
Exploring Mutation-based, Generation-based, and Evolutionary Fuzzers
Surveying Tools to Find and Exploit Buffer Overflows
Lesson 29: Flashcards
Lesson 29: Quiz
Lesson 30: Hacking User Credentials
Learning objectives
Understanding Authentication and Authorization Mechanisms
Understanding Authentication and Authorization Attacks
Exploring Password Storage Mechanisms
Lab: Configuring VLANs
Understanding Password Storage Vulnerability
Lab: Simulating an Eavesdropping Attack Using Wireshark
Cracking Passwords with John the Ripper
Cracking Passwords with hashcat
Lab: Finding the Physical Address of a LAN Adapter
Lab: Using Python for Penetration Testing
Improving Password Security
Lab: Detecting Rootkits
Lesson 30: Flashcards
Lesson 30: Quiz
Lesson 31: Social Engineering
Learning objectives
Understanding Social Engineering
Exploring the Social Engineering Toolkit (SET)
Exploring Maltego
Lab: Creating a Demilitarized Zone
Surveying Social Engineering Case Studies
Lab: Using Nikto
Lesson 31: Flashcards
Lesson 31: Quiz
Lesson 32: Writing Penetration Testing Reports
Learning objectives
Understanding Pen Test Reports and How They Are Used
Planning and Organizing Your Report
Understanding the Pen Test Report Format
Lab: Using Netcraft
Lab: Capturing and Exporting Data from Network Traffic Captured Using Wireshark
Exploring Risk Ratings
Lab: Using Ettercap for ARP Spoofing
Lab: Using OWASP ZAP
Lab: Making Syslog Entries Readable
Distributing Pen Test Reports
Lesson 32: Flashcards
Lesson 32: Quiz
Module 6: Advanced Wireless Hacking and Penetration Testing
Lesson 33: Wireless Client Attacks
Learning objectives
Understanding Wireless Client Attacks and Their Motives
Learning Packet Injection Attacks
Eavesdropping and Manipulating Unencrypted Wi-Fi Communications
Attacking Publicly Secure Packet Forwarding (PSPF)
Lab: Obtaining Information about UDP Settings, Configurations, and Ports
Lab: Creating a Personal Linux Firewall Using Iptables
Attacking the Preferred Network List (PNL)
Lesson 33: Flashcards
Lesson 33: Quiz
Lesson 34: Building Your Lab and Attack Hardware
Learning objectives
Understanding Wireless Antennas
Surveying Wi-Fi Devices Like the Pinneaple
Building Your Own Lab
Lesson 34: Flashcards
Lesson 34: Quiz
Lesson 35: Aircrack-ng
Learning objectives
Introducing the Aircrack-ng Suite
Introducing Airmon-ng
Understanding Airodump-ng
Lab: Configuring an SSL Cisco AnyConnect Secure Mobility Client VPN
Introducing Aireplay-ng
Lab: Installing Antivirus Software
Introducing Airdecap-ng
Introducing Airserv-ng
Introducing Airtun-ng
Lesson 35: Flashcards
Lesson 35: Quiz
Lesson 36: Cracking WEP
Learning objectives
Understanding WEP Fundamentals
Learning How to Crack WEP
Lab: Cracking a Linux Password Using John the Ripper
Lab: Using Nmap for Network Enumeration
Lesson 36: Flashcards
Lesson 36: Quiz
Lesson 37: Hacking WPA
Learning objectives
Understanding WPA Fundamentals
Surveying Attacks Against WPA2-PSK Networks
Using coWPAtty
Using Pyrit
Lab: Configuring Static Routing
Exploring WPA Enterprise Hacking
Lesson 37: Flashcards
Lesson 37: Quiz
Lesson 38: Performing Wireless Reconnaissance
Learning objectives
Using Kismet
Using Wireshark
Lab: Getting Information about DNS
Learning How to Hack Default Configurations
Lab: Using nslookup for Passive Reconnaissance
Lesson 38: Flashcards
Lesson 38: Quiz
Lesson 39: Evil Twins and Rogue Access Points
Learning objectives
Defining Evil Twin Attacks
Performing Evil Twin Attacks
Using Karmetasploit
Lab: Using the show ip route Command
Exploring the WiFi Pineapple
Lesson 39: Flashcards
Lesson 39: Quiz
Module 7: Mobile Device Security
Lesson 40: Mobile Device Security
Learning objectives
Understanding OWASP Mobile Device Vulnerabilities
Wrestling with the BYOD Dilemma
Understanding Mobile Device Management (MDM)
Lab: Testing Connectivity Using the Ping Command
Understanding Mobile Device Security Policies
Lesson 40: Flashcards
Lesson 40: Quiz
Lesson 41: Hacking Android Devices
Learning objectives
Exploring The Android Security Model
Exploring Android Emulators and SDK
Understanding Android Hacking Tools and Methodologies
Lab: Performing an Intense Scan in Zenmap
Lesson 41: Flashcards
Lesson 41: Quiz
Lesson 42: Hacking iOS Devices
Learning objectives
Introducing iOS Security
Exploring Jailbraking iOS
Surveying Tools for Dissasembling iOS Applications
Lesson 42: Flashcards
Lesson 42: Quiz
Module 8: Internet of Things (IoT) Security
Lesson 43: Hacking IoT Devices
Learning objectives
Surveying Tools for Dissasembling iOS Applications
Exploring ZigBee and IEEE 802.15.4
Exploring INSTEON
Exploring ZWave
Exploring LoRA
Lesson 43: Flashcards
Lesson 43: Quiz
Lesson 44: Attacking Bluetooth
Learning objectives
Understanding Bluetooth Vulnerabilities
Surveying Tools for Bluetooth Monitoring
Lesson 44: Flashcards
Lesson 44: Quiz
Lesson 45: Attacking NFC
Learning objectives
Understanding NFC Vulnerabilities
Exploring NFC Attacks and Case Studies
Lab: Using ProDiscover Basic
Lesson 45: Flashcards
Lesson 45: Quiz
About the Author :
Course expert
Omar Santos - Best-selling author, expert trainer, and Principal Engineer at Cisco (PSIRT) Omar is the author of over 20 books and video courses, as well as numerous white papers, articles, and security configuration guidelines and best practices. Omar is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities. Additional information about Omar’s current projects can be found at omarsantos.io and you can follow Omar on Twitter @santosomar.
Ron Taylor - Author, Speaker, and Cisco Security Architect Ron Taylor has been in the Information Security field for over 20 years working in various areas focusing on both offense and defensive security roles. Ten of those years were spent in consulting. In 2008, he joined the Cisco Global Certification Team as an SME in Information Assurance. In 2012, he moved into a position with the Security Research & Operations group, where his focus was mostly on penetration testing of Cisco products and services. He was also involved in developing and presenting security training to internal development and test teams globally. Additionally, he provided consulting support to many product teams as an SME on product security testing. He then spent some time as an Incident Manager for the Cisco Product Security Incident Response Team (PSIRT). His current role is a Security Architect specializing in Cisco’s security product line. He has held a number of industry certifications including GPEN, GWEB, GCIA, GCIH, GWAPT, RHCE, CCSP, CCNA, CISSP, Pentest+ and MCSE. Ron has also authored books and video courses, teaches, and is involved in organizing a number of cybersecurity conferences including the Bsides Raleigh, Texas Cyber Summit, Grayhat and the Red Team Village at DEFCON. His Twitter handle is @Gu5G0rman. You can also find him on LinkedIn.
Jon Sternstein - Award-winning cybersecurity expert, consultant, and instructor Jon Sternstein is the Founder/Principal of Stern Security, the cybersecurity company behind Velocity, the internal and vendor risk management platform velocitysec.com. He holds many security certifications, including GPEN, CISSP, and Certified Ethical Hacker. Jon has been a featured cybersecurity expert on ABC News, WRAL News, and CBS News, as well as in ISSA Journal, PenTest Magazine, and Business North Carolina Magazine. Stern Security’s website is sternsecurity.com.
Chris McCoy - CCIE certified advanced security expert and instructor Chris McCoy is a principal security research engineer in Cisco's Advanced Security Initiatives Group (ASIG). He has over 25 years of experience in the networking and security industry. He has a passion for computer security, finding flaws in mission-critical systems, and designing mitigations to thwart motivated and resourceful adversaries. He was formerly with Spirent Communications and the U.S. Air Force. Chris is CCIE certified (Emeritus #11801) in the Routing & Switching and Service Provider tracks, which he has held for over 10 years. His Twitter handle is @chris_mccoy.