Cyber Seecurity
Cyber Seecurity
Congratulations! You have completed this module. At this point in the course, you know:
Network mapping is the process of understanding and visualizing a network’s physical and
logical connections. It serves as a valuable tool for IT and cybersecurity professionals to manage
networks effectively, but attackers also exploit this method to their advantage.
Packet sniffing is a technique involving the use of software to capture and analyze data packets
as they traverse a network. IT professionals employ it for network troubleshooting, performance
monitoring, and activity oversight, whereas attackers use it to steal sensitive information.
IP spoofing involves manipulating packet headers to alter the source address, effectively
concealing the true origin of the sender or pretending to be another host.
A denial of service (DoS) attack is a malicious attempt to disrupt the normal functioning of a
targeted server, service, or network by overwhelming it with a flood of illegitimate traffic or
requests.
Injection attacks are cyberattacks where an attacker injects malicious code into a query, web
application, or system, triggering remote commands that manipulate website data. It has two
variants - SQL injection and XSS.
Security controls are essential for safeguarding the confidentiality, integrity, and availability of
critical information and other crucial assets from potential threats. Some of these include
administrative, physical, and technical controls.
IT professionals actively implement a variety of methods and tools to maintain system security.
These include access controls, encryption, patching, regular backups, system-level firewalls, and
antivirus software.
Network security protects networking infrastructure from unauthorized access, exploitation, or
theft. Its primary objectives include preventing unauthorized access, detecting and stopping
cyber threats, and facilitating secure access for legitimate users.
Application security involves incorporating a series of secure practices and processes into every
phase of the software creation process.
Organizations must incorporate vulnerability management into their cybersecurity strategy as it
identifies, assesses, and mitigates weak points. These programs spot security gaps and triage the
most critical issues by performing routine vulnerability scans.
The National Institute of Standards and Technology, or NIST, is renowned for establishing
industry standards. The NIST plan outlines four key phases of the incident response (IR)
lifecycle. These are:
Preparation and planning
Detection and analysis
Containment, eradication, and recovery
Post-incident activities
Mark as completed
Like
Dislike
Report an issue
Enable Two-Factor
Authentication
Introduction
Two-factor authentication is an identity confirmation method that necessitates users to
provide two forms of authentication, like a password and a one-time passcode (OTP), to
verify their identity and access an online account or other vulnerable resources.
You can use one of your personal devices or accounts to enable two-factor
authentication. This activity can be accomplished using a Windows machine, a Google
account, or a Mac.
Learning objectives
After completing this activity, you will be able to:
Instructions
Complete one or more of the following exercises based on your devices and accounts.
You can use one of your personal devices or accounts to enable two-factor
authentication. This activity can be accomplished using a Windows machine, a Google
account, or a Mac.
Learning objectives
After completing this activity, you will be able to:
Instructions
Complete one or more of the following exercises based on your devices and accounts.
.
Question 1
Authentication
Authorization
Audit
Administration
Status: [object Object]
1 point
2.
Question 2
You are a cybersecurity specialist implementing multifactor authentication (MFA) for your
employees. What solution will you deploy for users to verify login attempts by approving notifications
sent to their devices through an application?
Smart cards
Biometric authentication
Security tokens
1 point
3.
Question 3
File access controls allow administrators to delegate authority to users, enabling them to dictate
access permissions to various resources. Which file access control enables users to view file
contents?
Write permission
Execute permission
System permission
Read permission
Status: [object Object]
1 point
4.
Question 4
An IT company wants to improve its security system. How can it establish digital identities and
implement secure authentication using innovative access control methods?
Certificates
Tokens
1 point
5.
Question 5
What is the main advantage of Fast IDentity Online (FIDO) over traditional passwords?
1 point
Grading Criteria
**Task 1 questions:** [1] List three potential security concerns within the
existing security framework, mainly focusing on areas that could have
contributed to the compromise of credentials. ***– 3 points*** [2] Provide a
high-level solution (less than 25 words) for each of the three identified security
concerns. ***– 3 points***
Task 2 questions: [3] Select the authentication factor you consider the most
secure and practical for TechSolutions Inc. – 1 point [4] Explain how the two
authentication factors will work together to create an MFA plan for
TechSolutions Inc. – 2 points
1. List three potential security concerns within the existing security framework, particularly
focusing on areas that could have contributed to the compromise of credentials.
2. Question 3
|MULTIPLE SELECT
1 points
Select the authentication factor you consider the most secure and
practical for TechSolutions Inc.
A: PIN + Hardware security key
B: Password + Security questions
C: PIN + Pattern-based authentication
D: Facial recognition + Voice recognition
3. Question 4
Provide a high-level solution (less than 25 words) for each of the three
identified security concerns.
4. Question 5
Provide one recommendation for each of the three identified physical
security vulnerabilities. These recommendations must be practical, address
the concern effectively, and suggest a clear path for remediation or
improvement.
5. Question 6
Explain how the two authentication factors will work together to create an
MFA plan for TechSolutions Inc.
2. WINDOWS SECURITY
In this module, you will learn about Microsoft Windows security settings to protect your
system against various threats. You will also be able to create a firewall rule in Microsoft
Windows Defender through a hands-on lab. Next, you will recognize the importance of
patches and updates in protecting against cyberattacks. You will also explore Microsoft
Update and some critical practices to ensure a smooth and successful update
experience. The module will also explore Kerberos and its benefits in domain-based
authentication systems. Finally, you’ll learn to uncover system vulnerabilities and
weaknesses through security auditing techniques.
In this module, you will learn about Linux systems and shell commands to efficiently
perform various system administration tasks. You will have access to a Linux and Bash
commands cheat sheet, which will serve as a ready reckoner for commonly used
commands and their syntax in the Linux terminal. This module will also cover Linux file
systems, directory structures, and run levels. You will also have the opportunity to get
started with the Linux terminal, explore common Linux and Unix commands, and
navigate Linux user management tasks through hands-on labs.
Windows Security
Module 2•3 hours to complete
Module details
Linux Operating Systems
Module 3•4 hours to complete
Module details
macOS and Virtualization
Module 4•3 hours to complete
Module details
Final Project
Module 5•1 hour to complete
Module details