craigs-classroom.com
EPA
EPA REVISION SUPER GUIDE
EPA REVISION SUPER GUIDE
EPA REVISION SUPER GUIDE
EPA REVISION SUPER GUIDE
Acronyms
Cyber
Intro 2 Cyber
Modules
01 – Cyber Security Concepts
02 – A – Professional Bodies
Frameworks
NIST
ISO 27001
PCI-DSS
Wassenaar Arrangement
02 – Laws Regulations and Standards
Guide for Learners on the Public Interest Disclosure Act 1998
General Data Protection Regulation
Legal
Computer Misuse Act
Data Protection Act
RIPA
The Official Secrets Act
Freedom of Information Act
03 – Programming, Scripting and AI
04 – Networking Part 01
Networking
Number Systems
Binary
Binary and Decimal Conversion
Hexa-Decimal
Inter-Connected Devices
Hubs
Switch
MAC
Router
IPv4
IPv6
Topologies
LAN – Topology
BUS
Star Topology
Tree Topology
Ring Topology
Partial Mesh Topology
Mesh
OSI
OSI Model
OSI Model Layers
Ports
Ports and Protocols
Protocols
BGP
TCP/IP
TCP IP Model
TCP/IP Model Ports and Protocols Game
TCP/IP OSI Match
TCP/IP Model Game
05 – A – Networking Part 02
06 – Cryptography
Cryptography
Employment of Cryptography
Symmetric Cryptography
Asymmetric
Diffie-Hellman
Hashing
Generate Prime Numbers, Shared Generator, Private Keys, and Public Keys
RSA
SHA 256
Study Guide: Understanding Cryptography in Cyber Security
Section 1: Common Cryptography Techniques in Use
Part 1: Symmetric Encryption
Part 2: Asymmetric Encryption
Part 3: Hash Functions
Part 4: Digital Signatures
Part 5: Cryptography Protocols
Section 2: Terminology and Concepts of Cryptography
Part 1: Basic Terminology
Part 2: Cryptography Protocols
Part 3: Mathematical Foundations of Cryptography
Part 4: The Importance of Key Management in Cryptography
Section 3: The Importance of Effective Cryptography Key Management
Part 1: Key Lifecycle Management
Part 2: Key Storage and Protection
Part 3: Cryptography Key Distribution
07 – Attack Techniques and Cyber Security Threats
08 – Risk Assessment
09 – Security Management Systems
10 – Security Architectures
11 – Horizon Scanning and AI in Cyber Security
12 – Incident Response and Service Management
13 – Security Objectives and EPA Readiness
Intro 2 Cyber
Help and revision for your exam
Networking
Intro-2-Cyber
Cryptography
Protocols
Legal
Ports
Scripting
Binary
Hexadecimal
test01
test02
<=