• Classroom
  • Online, Instructor-Led
Course Description

This course examines network security testing, including testing countermeasures against malware threats; denial of service (DOS) and distributed denial of service (DDOS) attacks; email; Web; and Wireless using a layered approach requiring design, implementation, and testing of attack countermeasures.

Learning Objectives

  1. Given the description of an established organization and its fully deployed information systems, examine how to leverage the freely available tool sets to build a test environment to evaluate the strength of its security infrastructure.
  2. Given the layout of an organization’s networks and its hardware and software components, evaluate where the networks are most vulnerable.
  3. Given the description of an established organization and its data infrastructure, perform tests to evaluate the vulnerabilities of the infrastructure and develop mitigation strategies to lower/eliminate risks to an acceptable level.
  4. Given the description of an established organization and its data infrastructure, assess the vulnerabilities as it relates its gateway to the Internet.
  5. Given the description of an established organization and its data infrastructure, investigate all risks associated with its data assets.
  6. Given the description of an established organization and its data infrastructure, develop continuous process improvements to counter-attack new tools and strategies that allow hackers to penetrate an organization data infrastructure.
  7. Given the description of an established organization and its infrastructure, explain how you would execute a pen test.
  8. Given the description of an established organization and its resources, evaluate the ethical and legal implications of performing white hat activities.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Training, Education, and Awareness
  • Incident Response
  • Systems Architecture
  • Test and Evaluation
  • Threat Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@hq.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.