Ask the uCertify AI Tutor for instant help, hints, explanations or even practice questions—right inside this course.
| Title | |
|---|---|
|
no bookmarked, confident, or note marked bookmark popover collapsed
1.2.1
Understanding the CIA Triad
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
2.2.1
Creating Passwords using LastPass
|
Beginner
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
2.2.2
Enforcing Password Policies
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
3.2.1
Understanding Privacy in the Digital Age
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
4.2.1
Conducting Vulnerability Scanning using Nessus
|
Advanced
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
5.1.1
Implementing Physical Security
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
6.3.1
Understanding the Importance of Corporate Ethics Codes and the ISC2...
|
Advanced
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
7.2.1
Understanding Security Governance
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
8.3.1
Configuring RAID
|
Beginner
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
8.3.2
Configuring Disk Mirroring
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
8.3.3
Converting a Basic Disk to a Dynamic Disk
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
9.2.1
Taking an Incremental Backup
|
Advanced
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
9.2.2
Taking a Full Backup
|
Advanced
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
9.2.3
Using Windows Server Backup to Restore a Folder
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
9.2.4
Scheduling a Server Backup
|
Advanced
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
10.4.1
Completing the Chain of Custody Form
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
10.4.2
Configuring NetFlow
|
Advanced
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
10.4.3
Implementing Intrusion Detection and Prevention
|
Advanced
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
11.3.1
Identifying Access Badge Areas
|
Beginner
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.1.1
Enabling an ACL
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.2.1
Creating a New IAM User
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.2.2
Creating a Domain User Account
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
13.3.1
Viewing the IPv4 Header
|
Beginner
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
13.3.2
Configuring an IPv6 Address
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
13.4.1
Creating a VPC
|
Beginner
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
13.5.1
Securing a Wi-Fi Hotspot
|
Advanced
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
14.1.1
Creating a RAT
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
14.1.2
Scanning and Classifying the Types of Viruses
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
14.2.1
Performing an MITM Attack
|
Advanced
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
14.3.1
Simulating a DDoS Attack
|
Advanced
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
15.1.1
Installing Baidu Antivirus Software
|
Beginner
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
15.3.1
Configuring a Network Firewall
|
Advanced
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
16.2.1
Setting Up a DMZ
|
Advanced
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
16.5.1
Configuring a VPN
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
17.6.1
Understanding Cloud Security
|
Advanced
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
18.2.1
Creating Asymmetric Key Pairs
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
18.2.2
Using Symmetric Encryption
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
18.4.1
Generating SHA
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
18.4.2
Observing an MD5-Generated Hash Value
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
19.2.1
Understanding Data Security
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
20.2.1
Logging and Log Monitoring
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
21.2.1
Understanding System Hardening
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
22.6.1
Understanding Security Policies
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
23.1.1
Using Social Engineering Techniques to Plan an Attack
|
Advanced
Unattempted
|