Authentication versus Authorization
By Joseph Wetzel
In this learning activity you'll review the differences between identification, authentication, and authorization.
Virtual Private Networks (VPN)
In this learning activity you'll explore how VPN is used to create a secure connection between two networks.
Firewalls: Relationships Among Firewall Perimeters
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
FTP - What You Need to Know
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Cross-site Scripting Awareness
In this learning activity, you'll explore the topic of cross-site scripting, (or XSS)
Intrusion Detection Systems
Explore Intrusion Detection Systems, what they are, how they're configured, and the types of protection the provide.
Cross-Site Scripting Defined
In this activity we will learn how vulnerable websites are open to cross site-scripting attacks (XSS).
Denial of Service Attacks
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Port Scanning
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Asymmetric Encryption: How It Works
By jheathma
In this learning activity you'll explore public key encryption and conclude with a short quiz.
Social Engineering Attacks
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
Port States
By mkrzyszkowski
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Malware
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.
Port Scanning - Common Network Protocols
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
Firewalls: Packet Filters
In this learning activity you'll create a packet filter.
Achieve Persistence on the Web
In this learning activity you'll discover the disconnected nature of the HTTP request-response model including some methods of persisting state and the security implications.
You'll be introduced to the disaster recovery options available to organizations.
In this game, you'll review symmetric, asymmetric, and hashing encryption algorithms.
You'll test your knowledge of some common TCP/IP protocols and numbers.
You'll test your knowledge of different categories of malicious and removal software.
You'll test your familiarity of some commonplace Linux acronyms.
You'll focus on foot-printing and social engineering.
This game will test your knowledge of acronyms related to IT security.
You'll test your knowledge of port scanning.
You'll build your knowledge of NetBIOS suffixes.
You'll build your knowledge of hacking wireless networks.
You'll build knowledge of network protection systems.
You'll become familiar with basic terms related to information security.
You'll become familiar with basic terms related to information security risks.
You'll be introduced to attackers targeting computer systems and networks.
You'll focus on information relating to vulnerability assessments and attack mitigation.
You'll focus on terms relating to host security and physical security.
You'll build your knowledge of Public Key Infrastructure terms.
You'll become familiar with the terms and concepts related to business continuity.
You'll be introduced to concepts relating to redundancy and fault tolerances when applied to hard drives.
You'll focus on terms and concepts related to risk mitigation.
You'll become familiar with some sub-policies of a comprehensive security policy.
You'll learn to navigate user and group members in the Linux OS.
You'll learn to manage file and directory permissions within the Linux operating system.
You'll learn how to quickly interpret permissions on Linux using the chmod command and simple arithmetic.
You'll become familiar with special permissions in the Linux operating system.
This game covers topics relating to mounting in the Linux OS.
You'll learn the basics of wireless security.
You'll be asked to match definitions within the STRIDE categories, which is used in risk analysis and threat modeling.
You'll be asked to match definitions within the DREAD categories, which is used in risk analysis and threat modeling.
You'll learn the five steps to the Security Control Process.
You'll learn to identify group policy object layers and the order they're applied.
You'll learn to recognize the steps in the Security Administration Process.
You'll learn to recognize the steps in the Hardening Windows Process.
You'll learn to recognize the steps in the Application Hardening Process.
You'll learn the steps necessary to create an incident response plan.
You'll be introduced to how to secure computers from future threats.