National CAE Designated Institution
  • Classroom
Course Description

This course provides a comprehensive, integrated and up-to-date overview of computing security. The topics included will provide students with broad and new perspectives on contemporary issues in cybersecurity. We will examine theoretical concepts that form a foundation for information systems security. We will adopt a practical, hands-on approach to examining several fundamental security technologies. This course provides students an opportunity to advance their thinking and troubleshooting ability in solving cyber threat issues.

Learning Objectives

  1. Demonstrate knowledge of concepts and terminology of information security, and critical issues related to threat and risk,
  2. Communicate effectively about the importance of information security methodologies, and the challenges they are meant to address,
  3. Define and explain the basic types of information attacks, malicious software and associated information security principles,
  4. Employ user-centered design strategies on the utilization of cryptographic tools, user authentication, access control mechanisms,
  5. Demonstrate the ability to discuss and create security baselines to detect and prevent intrusion,
  6. Explain the technical, managerial and ethical value of cyber defense teamwork in a collaborative setting,
  7. Acquire troubleshooting and critical thinking skills and techniques of the tools needed to secure organizations as socio-technical systems,
  8. Define career opportunities in the information security industry.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operational Planning
  • Systems Analysis
  • Threat Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.