This course provides knowledge and skills related to activities behind hacking attacks and countermeasures. Coursework helps students build defense mechanisms to protect applications, systems and networks from hackers. Security loopholes, as well as common attack tools used by black hat hackers, are examined.
Learning Objectives
- Given the description of an established organization and its fully deployed information systems, examine how to leverage the freely available tool sets to build a test environment to evaluate the strength of its security infrastructure.
- Given the layout of an organization’s networks and its hardware and software components, evaluate where the networks are most vulnerable.
- Given the description of an established organization and its data infrastructure, perform tests to evaluate the vulnerabilities of the infrastructure and develop mitigation strategies to lower/eliminate risks to an acceptable level.
- Given the description of an established organization and its data infrastructure, assess the vulnerabilities as it relates its gateway to the Internet.
- Given the description of an established organization and its data infrastructure, investigate all risks associated with its data assets.
- Given the description of an established organization and its data infrastructure, develop continuous process improvements to counter-attack new tools and strategies that allow hackers to penetrate an organization data infrastructure.
- Given the description of an established organization and its infrastructure, explain how you would execute a pen test.
- Given the description of an established organization and its resources, evaluate the ethical and legal implications of performing white hat activities.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Training, Education, and Awareness
- Strategic Planning and Policy
- Systems Development
- Systems Analysis
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.