National CAE Designated Institution
  • Classroom
  • Online, Instructor-Led
Course Description

Introduction to the concepts, principles and practices involved in the operations of secure computing systems. Presents principles of service management and explores how the principles of system administration are derived from concepts of delivering quality services. Lab exercises performing rudimentary tasks of a system administrator using virtual machine environments. Foundation topics include: cryptography, popular operating systems for servers, network configuration, system components, networked systems, host management, user management, configuration of servers and services, incident management, change management, security, monitoring and analysis of operations.

Learning Objectives

Understand administrative role and responsibility and describe the 16 key processes in ITIL (including information security management), List major elements associated with System Administration and perform basic security related administration of a Linux OS, Understand the standard components of servers, networks, Windows and Linux operating systems, and cloud implementations of services plus the role of SSH and SFTP to maintain security as data is in transit, Understand administrative tools for visibility into network architecture, Understand user behavior and user support, Perform limited tasks and responsibilities of Host Management, understand design of services in the cloud, and understand the basic terminology, concepts, and elements of a cryptographic system, Understand IAM and history and purposes of cryptographic systems, Understand automation as a means to enforce uniformity and policy while achieving efficiency. understand the fundamental networking principles and protocols, Describe DevOps as evolutionary development and relationship to Network and System Administration, Cloud administration ideals, and the role of automation in all of these. Explain cryptographic symmetric vs asymmetry and, block vs steam ciphers. Describe basic operation of the DB service including security administration. Understanding of instillation of a web server and database, Understand diagnostic and resolution process in ITIL/ITSM context. Understand choices of PaaS, IaaS, and SaaS. Understand virtualization and containerization. Introduce location and selection strategies. Implement and administer a web-based service including IAM concepts, Understand uses of cryptography in practical security, Understand system services and tools to administer them. Understand common high-level cloud architectures. Install and administer IAM for a WordPress wiki services, Understand security definition, trust, failures, attacks, and defenses for services. Understand design patterns for resiliency (defense) for all failures including security and the principle of defense in depth to provide resiliency, Understand the need for scaling and how network and service architecture provide for availability. Understand the importance of implementing a key management life cycle and the elements of the key management service and infrastructure, Understand the elements of a security architecture implementation. Understand and describe the shift of culture in administration of services, Understand mathematical basis for describing system reliability and common characterizations of the systems expected behavior. Understand the processes associated with the 16 key ITIL/ITSM processes in the cloud, Understand and describe trends in service management. Understand cloud approaches to automation of administration, including scripting. Perform Cyber Aces Scripting exercises. Understand common contents and importance of design documentation. Review system implementation to assess security, Install and configure a monitoring tool and analyze results

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cybersecurity Management
  • Executive Cyber Leadership
  • Program/Project Management and Acquisition
  • Risk Management
  • Strategic Planning and Policy

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.