-
Course

The Complete Cybersecurity Bootcamp, 2nd Edition
Published by Pearson (May 19, 2022)
ISBN-13: 9780137949311
Product Information
The Complete Cybersecurity Bootcamp, 2nd Edition is your comprehensive guide to becoming a cybersecurity professional. The extensive course is compiled from Omar Santo's best-selling video courses, starting with the basics and leading you through the most important topics in the cybersecurity landscape. It is structured to help you start with the fundamental concepts of cybersecurity and then build your core cybersecurity knowledge and move on to real-life pen testing and ethical hacking projects. Topics include cloud security, cybersecurity management, monitoring and analysis, network security telemetry, digital forensics and incident response (DFIR), ethical hacking and pen testing, wireless hacking and pen testing, mobile device security, and IoT security.
This course can also be a resource for anyone who is preparing for security certification like CompTIA Security+, Cisco CyberOps Associate, CISSP, CompTIA PenTest+, Certified Ethical Hacker (CEH), GIAC certifications, or others.
Module 1: Security Concepts
Lesson 1: Cybersecurity Fundamentals
Lesson 2: Additional Cybersecurity Principles
Lesson 3: Types of Attacks and Vulnerabilities
Lesson 4: Fundamentals of Cryptography and PKI
Module 2: Security Operations, Incident Response, and Digital Forensics
Lesson 5: Fundamentals of Incident Response
Lesson 6: Fundamentals of Security Monitoring
Lesson 7: Intrusion Event Categories
Lesson 8: Digital Forensics Fundamentals
Lesson 9: Endpoint Security Technologies and Host-based Forensics Fundamentals
Lesson 10: Network Intrusion Analysis
Module 3: AAA, Identity Management, Network Visibility, and Segmentation
Lesson 11: Introducing AAA and Identity Management
Lesson 12: Network Visibility and Segmentation
Lesson 13: Network Infrastructure Security
Lesson 14: Software-Defined Networking Security and Programmability
Module 4: Fundamentals of Ethical Hacking and Penetration Testing
Lesson 15: Overview of Ethical Hacking and Penetration Testing
Lesson 16: Information Gathering and Passive Reconnaissance
Lesson 17: Active Reconnaissance, Scanning, and Enumeration
Lesson 18: Hacking Web Servers
Lesson 19: Hacking Web Applications
Lesson 20: SQL Injection
Lesson 21: Fundamentals of Wireless Hacking
Lesson 22: Wireless Client Attacks
Lesson 23: Building Your Lab and Attack Hardware
Lesson 24: Aircrack-ng
Lesson 25: Buffer Overflows
Lesson 26: Post-Exploitation Techniques
Lesson 27: Hacking User Credentials
Lesson 28: Reporting and Communication
Module 5: Mobile Device Security
Lesson 29: Hacking Mobile Platforms
Lesson 30: Mobile Device Security
Lesson 31: Fundamentals of Android Security
Lesson 32: Hacking iOS Devices
Module 6: Internet of Things (IoT) Security
Lesson 33: Fundamentals of IoT Security
Lesson 34: Hacking IoT Devices
Lesson 35: Attacking Bluetooth
Lesson 36: Attacking NFC
Module 7: Cloud Security Fundamentals
Lesson 37: Understanding Cloud Security
Module 8: Social Engineering Fundamentals
Lesson 38: Understanding Social Engineering Countermeasures
Summary
Omar Santos is a Distinguished Engineer at Cisco focusing on artificial intelligence (AI) security, research, incident response, and vulnerability disclosure. He is a board member of the OASIS Open standards organization and the founder of OpenEoX. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is the co-chair of the FIRST PSIRT Special Interest Group (SIG). Omar is the lead of the DEF CON Red Team Village and the chair of the Common Security Advisory Framework (CSAF) technical committee. Omar is the author of over 20 books, numerous video courses, and over 50 academic research papers. Omar is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. His dedication to cybersecurity has made a significant impact on technology standards, businesses, academic institutions, government agencies, and other entities striving to improve their cybersecurity programs.