National CAE Designated Institution
  • Classroom
Course Description

This course provides a comprehensive, integrated and up-to-date overview of computing security. The topics included will provide students with broad and new perspectives on contemporary issues in cybersecurity. We will examine theoretical concepts that form a foundation for information systems security. We will adopt a practical, hands-on approach to examining several fundamental security technologies. This course provides students an opportunity to advance their thinking and troubleshooting ability in solving cyber threat issues.

Learning Objectives

  1. Demonstrate knowledge of concepts and terminology of information security, and critical issues related to threat and risk,
  2. Communicate effectively about the importance of information security methodologies, and the challenges they are meant to address,
  3. Define and explain the basic types of information attacks, malicious software and associated information security principles,
  4. Employ user-centered design strategies on the utilization of cryptographic tools, user authentication, access control mechanisms,
  5. Demonstrate the ability to discuss and create security baselines to detect and prevent intrusion,
  6. Explain the technical, managerial and ethical value of cyber defense teamwork in a collaborative setting,
  7. Acquire troubleshooting and critical thinking skills and techniques of the tools needed to secure organizations as socio-technical systems,
  8. Define career opportunities in the information security industry.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operational Planning
  • Systems Analysis
  • Threat Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@hq.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.