Skip to main content
Side panel
Courses
Programs
Help
Getting Started
Discussion Forums
Help Center & FAQ
Log in or Sign up
Courses
Programs
Help
Getting Started
Discussion Forums
Help Center & FAQ
CS406: Information Security
Sections
Course Introduction
Unit 1: Introduction to Information Security
Unit 2: Threats and Attack Modes
Unit 3: Cryptographic Models
Unit 4: Access Control
Unit 5: Identification and Authentication
Unit 6: Network Security
Unit 7: Operating System (OS) Security
Unit 8: Intrusion Detection and Prevention Systems
Unit 9: Privacy Laws, Penalties, and Privacy Issues
Study Guide
Course Feedback Survey
Certificate Final Exam
Resources
Activities
Quizzes
Home
About Saylor Academy
Blog
Credit University Partners
CS406: Information Security
Home
Courses
Course Catalog
Computer Science
CS406: Information Security
Sections
Course Feedback Survey
Course Feedback Survey
Back to 'Course Feedback Survey\'
Course Feedback Survey
Click
https://www.surveymonkey.com/r/273JRHQ
link to open resource.
Previous
Jump to...
Jump to...
Course Syllabus
Information Security History
Timeline of the History of Information Security
The CIA Triad
Threats and Vulnerabilities
The Elements of Security: Vulnerability, Threat, Risk
NIST SP 800-39
Risk Management
More on Risk Management
NIST SP 800-61
Incident Response
Security Control
Security Control Types
Security Control Functions
Introduction to Defense-in-Depth
Defense-in-Depth Example
Defense-in-Depth
The Human Factor
Humans are the Weakest Link
Security Awareness, Training, and Education
Security Threats and the Human Factor
Security Frameworks
Center for Internet Security (CIS) Controls
Payment Card Industry Data Security Standard (PCI DSS)
Unit 1 Assessment
Threat Terminology
An Overview of Threats
Privacy Threats
Types of Attacks
Classifying Threats
Birthday Attacks
What is a Botnet?
More on Botnets
Man-in-the-Middle Attacks
Teardrop Attacks
What is War Dialing?
More on War Dialing
Zero-Day Exploits
Spoofing Attacks
A Comprehensive Analysis of Spoofing
Email Spoofing
Caller ID Spoofing
IP Address Spoofing
An Overview of Social Engineering
Dumpster Diving
One Man's Trash is Another Man's Treasure
Shoulder Surfing
Tailgating
How to Protect Against Tailgating
Phishing, Spear-phishing, and Whaling
Pretexting
Application Attacks
Types of Application Attacks
The Basics of Buffer Overflows
More on Buffer Overflows
Time of Check to Time of Use
Application and Escalation of Privilege
Escalation of Privilege
Types of Application Attacks
Cross-Site Scripting
Examples of Cross-Site Scripting
How Does XSS Work?
SQL Injection
Examples of SQL Injection Attacks
How Application Flaws Enable SQL Injection
Common Types of Malware
Malware Functions
Computer Viruses, Worms, Trojan Horses, Spyware, and Adware
The Security Risks of Viruses, Worms, and Trojan Horses
Types of Trojan Horses
Logic Bombs
Denial of Service (DOS)
Distributed Denial of Service (DDoS)
How DoS Attacks Work
Type of DoS and DDoS Attacks
Unit 2 Assessment
History of Cryptography
Classical Cryptosystems
Caesar Cipher
Caesar Cipher Project
One-time Pads
Cryptographic Goals
Confidentiality and Nonrepudiation
Confidentiality, Integrity, and Authenticity
Cryptographic Authentication
Symmetric Key Ciphers
What is Symmetric Key Encryption?
Asymmetric Key Ciphers
What is Asymmetric Encryption?
Cryptographic Hash
Hashing
Symmetric Key Algorithms
Data Encryption Standard (DES)
DES
3DES
3DES Key Versions
Advanced Encryption Standard (AES)
AES Complete Explanation
Rivest Cipher 4 (RC4)
More on RC4
Rivest Cipher 5 (RC5)
Rivest Cipher 6 (RC6)
The Blowfish Cipher
Twofish
Asymmetric Key Algorithms
Public Key Cryptography: RSA Encryption Algorithm
RSA
Digital Signature Algorithm
What is Pretty Good Privacy (PGP)?
Pretty Good Privacy (PGP)
PGP and the Web of Trust
Gnu Privacy Guard (GPG)
Using GPG with Linux
Diffie-Hellman Cryptography
Diffie-Hellman Protocol
Elliptic Curve Cryptography (ECC)
Elliptic Curve Algorithm
Cryptographic Hash
Digital Certificates
Message Digest History
Message Digest 5 (MD5)
Secure Hash Algorithm (SHA-0, SHA-1, and SHA-2)
FIPS PUB 202: SHA-3
Hashed Message Authentication Code (HMAC)
Unit 3 Assessment
Access Control Fundamentals
Access Control
Least Privilege, Separation of Duties, and Need-to-Know
Relationship Between Least Privilege and Need-to-Know
Least Privilege and Privilege Creep
Least Privilege and Attacks
Separation of Duties
Access Control Matrix and Access Control List (ACL)
Access Control Matrix and Access Control List (ACL) Functionality
Access Control Models
Mandatory Access Control (MAC) and Discretionary Access Control (DAC)
Comparing MAC and DAC
Bell-LaPadula Model
Simple Security, Star Property, and Discretionary Security Property
Biba Model
Comparing Bell-LaPadula and Biba Models
Role-Based Access Control (RBAC)
RBAC Access Control
Rule-Based Access Control (RB-RBAC)
RB-RBAC versus the RBAC Model
Unit 4 Assessment
Identification, Authentication, and Authorization
Authentication and Authorization Basics
Password Security
Tokens and Biometrics
Biometrics
Security and Accuracy of Biometrics
Human Factors Used in Authentication
Authentication Factor Descriptions
Methods of Authentication
Authentication Forms
Multifactor Authentication
Authentication
Mutual Authentication
Authentication Protocols
Authentication Services
Terminal Access Controller Access Control System (TACAS)
Diameter
PAP, CHAP, MS-CHAP, and EAP
Kerberos
Singe Sign-On (SSO)
Kerberos Facts
Kerberos History
Kerberos Weaknesses
Kerberos and Lightweight Directory Access Protocol (LDAP)
Lightweight Directory Access Protocol (LDAP)
Directory Services Overview
Public-key Infrastructure (PKI)
More on Public-key Infrastructure (PKI)
Certificate and Registration Authorities
Certificate Authorities
Digital Certificate Defined
Digital Certificate
Unit 5 Assessment
Elements and Components of Network Design
The Importance of Network Segmentation
Segmentation Helps to Keep Your Network Secure
Network Security Zoning
Redundancy
Redundancy Methods
What is a Firewall and How Does it Work?
Firewall Basics and Firewall Placement
Packet Filtering
Inbound and Outbound Packet Processing
Stateful Packet Inspection
Deep Packet Inspection
Deep Packet Inspection and Routers
Introduction to Wireless Networks and Wireless Encryption
Wireless Network Basics
More Wireless Basics
Virtual Ethernet Tunneling
Risks Associated with BYOD
Honeypots
Honeypots and Honeynets
Privacy Issues with Honeypots and Honeynets
Network Sniffers
Wireless Sniffing
Packet Capturing Using tcpdump and Wireshark
Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS)
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
Domain Name System (DNS) and Domain Name System Security extensions (DNSSEC)
Unit 6 Assessment
System Hardening
Classic Hardening on Servers
Log Files and Unnecessary Services and Accounts
Configuring Accounts
Why Patching Does Not Happen Sometimes
Patching Can Be Hard
System Auditing
What is Antivirus Software?
Antivirus Versus Antimalware
Linux IPtables
How Scanners Work
What is a Vulnerability Assessment?
Vulnerability Assessment Using SCAP
Unit 7 Assessment
The Basics of Intrusion Detection Systems
Comparison of IDS and IPS
Intrusion Detection Systems
Signature and Anomaly-based IDS
Signature-based IDS
Anomaly-based IDS
Rule-based IDS
Rule-based IDS Example
Network Intrusion Detection
Host-based Intrusion Detection Systems (HIDS)
A Review of Intrusion Detection
Intrusion Prevention System
Security Incident and Event Management (SIEM)
Scanners
Network Scans
Web Application Scans
Splunk for Security
Unit 8 Assessment
Data and Protecting the Right to Privacy
The Right to Privacy
The Future of a Global Privacy Framework
Privacy Policies in the Digital World
The US Privacy Act of 1974
US Privacy Act and the EU Data Protection Directive
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
HIPAA Summary
European General Data Protection Regulation (GDPR)
Personal Data and Data Subjects in the GDPR
Unit 9 Assessment
CS406 Study Guide
CS406: Certificate Final Exam
Next