This course will provide students with the essential skills and experience required to identify and document security vulnerabilities. This is the second course in the sequence. The student will learn penetration testing using ethical principles to secure a computer data environment. A variety of security technologies and concepts are used to provide in-depth understanding of secure communications channels, devices and media. Upon successful course completion, students will be able to identify and mitigate weaknesses in a data infrastructure.
Learning Objectives
Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements. Analyze different phases of hacking and recommend the strategy to use ethical hacking for assessing security of various components of information system. Compare and contrast different hacking techniques and analyze the legal implications of hacking. Examine different vulnerabilities, threats and attacks to information systems and recommend the countermeasures. Analyze cryptography algorithms and encryption techniques, and design implementation strategies for securing information. Compare and contrast various network security assessment and hacking tools. Assess various network security techniques and tools and implement appropriate level of information security controls based on evidence, information, and research.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Risk Management
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.