This course addresses concepts and industry standards of computer networking, including the OSI Reference Model, TCP/IP and network routing concepts, as well as inherent risks in their use. Also addressed are digital cryptography principles and practices; major email security standards; and methods by which networks may be attacked. Students use a networking software tool to build a secure network, as well as prepare to assist in incident response and management activities in the event of a network breach.
Learning Objectives
- Given a network either isolated from other networks or with access to external networks that are not controlled by the organization, analyze the threats from both internal and external sources that the organization's network might be subject to. Describe the vulnerabilities of the network. Describe the attack methods that could be used.
- Given an analysis of the internal and external threats to an organization's network, develop a network security plan to protect the network from these internal and external vulnerabilities and attacks.
- Given a set of encryption methods, analyze and evaluate these so as to select one or more for implementation as part of the network security plan.
- Given the need to conduct e-commerce as part of the overall business plan of an organization, evaluate and select a method to secure the network equipment used for this purpose, as well as the user connections from and to their location.
- Given the need for remote access to a network, analyze, evaluate, and justify the selection of a method to secure these remote access sessions.
- Given a wireless network, develop a security plan to control access to this network.
- Given a common network, using the tools typically used for this, analyze the network's vulnerability to attack from the inside and from the outside of the network.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cyber Defense Analysis
- Systems Administration
- Systems Requirements Planning
- Systems Analysis
- Threat Analysis
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.