In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands—on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.
In addition to technical cybersecurity components, you will learn and explore the non—technical aspects of cybersecurity necessary to mitigate risk and lessen exposure, including risk management, threat determination, disaster recovery, security policy management, and business continuity planning. This course provides an excellent foundation for those proceeding to CISSP, CEH, CISA, or CISM training.
Learning Objectives
Current cyber threats and cybersecurity site references
Government—mandated directives and compliance requirements
Cyber roles required to successfully design secure systems
The attack cycle perpetrated by malicious hackers
Enterprise policy requirements
Best strategies for securing the enterprise with layered defenses
How security zones and detailed logging augment information assurance
Forensic challenges and incident response planning
Risk management process
Goals achievable with auditing, scanning, and testing systems
Industry recommendations for maintaining secure access control
Standards—based cryptographic solutions for securing communications
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Customer Service and Technical Support
- Cyber Defense Infrastructure Support
- Network Services
- Systems Administration
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.