This course surveys the cybersecurity landscape and introduces the student to terminology needed to be successful in the industry.
Learning Objectives
Module 1: Cybersecurity Overview
- Supply and Demand - Jobs
- Cybersecurity Field is Growing
- Competitive Workforce
- Typical Salaries
- Hacking Overview
- Managements Perspective
- Peeling the Onion - Layered Approach
- CIA Triad
Module 2: Network Defense
- Operating Systems - Linux vs. Windows
- OSI Model
- TCP vs. UDP
- TCP Three Way Handshake
- Identification and Authentication
- Firewalls
- Host Based and Network Based IDS
Module 3: Applied Encryption
- Plaintext vs. Ciphertext
- Cryptosystems
- Steganography
- Session Keys
- Algorithms - DES and AES
- LANMAN, NTLM
- Hashes
- Disk Encryption
- Digital Signatures
- PKI
- VPN - IPSEC, IKE
Module 4: Access control
- Methods
- Implicit Deny
- Least Privilege
- Separation of Duties
- Job Rotation
- MAC vs. DAC
- Role Based and Rule Based
- Logical vs. Physical Access Control
- Strong Authentication
- Biometrics
Module 5: Intrusion detection systems (IDS)
- Alerts and Alarms
- Noise
- NIDS vs. HIDS
- Intruders, Masquerader
- Passive vs. Active
- IPS, Statistical, Signature, Heuristics, Anomalies
Module 6: Applied Systems Hardening
- Privilege Escalation
- Spyware, Adware, Rootkits
- Malicious Code, Worms, Virus
- DDOS, Smurf, Teardrop
- Botnets, RATs, Trojans
- OS Hardening Techniques
Module 7: Incident Response
- Events - Normal, Escalation, Emergency
- Incident Response - TIGER TEAM
- Network Monitoring
- Investigation
- Recovery
- Reporting
Module 8: Digital Forensics
- Computer Crime
- Forensics
- Legal Cases
- The Forensics Process
- Tools
- Chain of Custody
- Reporting
Module 9: Advanced Business Continuity Planning
- Due diligence, Due Care, Due Process
- Threats
- Business Continuity
- Boy Scout Method - Be Prepared
- MTBF, MTTR, Single Points of Failure
- RAID
- Power and Backups
Module 10: Applying your skills
- Capture the Flag - Virtual Machines
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Risk Management
- Program/Project Management and Acquisition
- Vulnerability Assessment and Management