• Online, Self-Paced
Course Description

Learn the basics of network security, such as TCP/IP protocols and applications, network threats, vulnerable points of access, and network security management concepts and techniques.

Need a refresher on the basics of network security? This three-lesson, web-based course explores TCP/IP network protocols and applications, network threats, vulnerable points of access, and different tools and techniques that strengthen network security. Throughout the course, you will have access to online resources including texts, lectures, and virtual labs that duplicate real-world scenarios. Qualified instructors are available to answer questions about the content and theory.

To start with, you will use Wireshark to capture IP packets and review them. Next, you will explore targeted attacks by following a sample attack to explore how information can be gathered and combined for real-world or cybercrimes. Then you will design a reverse social engineering attack. Finally, you will use Windows Task Manager, Windows Computer Management, and Microsoft Baseline Security Analyzer to help prevent, detect, respond, control, and document security incidents.

Learning Objectives

  • Review essential Transmission Control Protocol/Internet Protocol (TCP/IP) behavior and applications used in IP networking.
  • Recognize the impact that malicious exploits and attacks have on network security and understand the hacking process.
  • Identify and apply network security management techniques.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Infrastructure Support

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.