Examines both the practical and conceptual skills that build the foundation for understanding Firewall technologies including: most common firewall types, use of host-based software firewall technology and network hardware firewall technology. Learner will gain familiarity with firewall technologies as related to software and hardware layered approach as well as firewall rules, understanding network protocols related to firewall technology, and vendor/firewall selection.
Examines both the practical and conceptual skills that build the foundation for understanding Cryptography technologies including: use of Cryptography technology, symmetric and asymmetric cryptography, hashing, and digital signatures. Learner will gain familiarity with the Cryptography technologies as related to Authentication, Integrity, Confidentiality and Non-Repudiation.
Examines both the practical and conceptual skills that build the foundation for understanding Intrusion Detection System technologies. the What, Why and Who of IDS is explored, including the features of an IDS verses an IPS. The importance of IDS, IDS technologies, and Packet Capture and Protocols are covered. Learners will analyze and capture network traffic through the use of sniffer tools and programs. Learners capture, view, and analyze network traffic in an attempt to monitor and secure the network. By the end of this course, the learner will have analyzed, applied, and evaluated IDS terminology, technologies, and protocols to secure Network traffic.
Examines the monitoring and logging concepts for the security of IT systems and
networks. Learners examine security log management challenges, components,
guidelines, and operations. Learners examine security audit policy and critical log
Introduces learners to the proper execution of Business Continuity Planning and Disaster Recovery. It is the payoff for cost-effective buying of spare machines and servers, performing backups and bringing them off-site, assigning responsibility, performing drills, educating employees and being vigilant. Upon completion of this material, the learner will be able to: list the elements of Business Continuity (BC), identify who should be included in the BC team, describe the methodology used to construct the Business Continuity Policy and Plan.
Examines cyber security incidents and response. Learners examine how to react to
an incident by exploring its impact and using forensics to investigate the incident.
Learners explore proper communication and incident response procedures. Learners
analyze common cyber incident symptoms.
Explore Secure Design using both standard networked devices and hardware that are designed specifically for security. Learner applies a layered security approach, which can significantly improve security. If only one defense mechanism is in place, an attacker has to circumvent only a single defense. A network with layered security makes it more difficult for an attacker because the attacker must have the tools, knowledge, and skills to break through the various layers. A layered approach also can be useful in resisting a variety of types of attacks.
Examines both the practical and conceptual skills that build the foundation for understanding Virtual Private Networks technologies including: history of VPNs, use of VPN technology, types and different platforms of VPNs; VPN configuration and security. Learner will gain familiarity with the protocols used in a virtual private network; and will configure a site to branch VPN. By the end of this course, the learner will have analyzed, applied, and evaluated various VPN technologies and the protocols to secure a Virtual Private Network.
Examine a thorough grounding in information security policies used to design structure in the workplace. Develop policy that explains the will of the organization’s management in controlling the behavior of its employees with regard to the appropriate and secure use of its information and information resources. Policy is designed to create a productive and effective work environment, free from unnecessary distractions and inappropriate actions.
Examines both the practical and conceptual skills that build the foundation for understanding cyber security investigation and analysis including; vulnerability exploits, malware analysis; and hardening of systems to protect against exploitation. Learners will investigate a compromised system and learn to analysis systems to find malicious indicators. By the end of this course, the learner will be able to detect the key areas where an exploitation may reside and use various Windows built-in tools as well as 3rd party tools to detect malicious activity.
Explore how attackers infiltrate a system to gather information and data. This course will explore how Python and Python scripts can be used to detect these attacks, and gain knowledge on how to write and use Python scripts to secure systems against cyberattacks.