• Classroom
  • Online, Instructor-Led
  • Online, Self-Paced
Course Description

Assures the professional holding this certification has the requisite knowledge and skill to perform risk management and defense using in-depth techniques. This 5-day course retails for $3,000 and is delivered via: classroom, live online or self-study. The self-study course retails for $1500.

Learning Objectives

COURSE DETAILS

Module 1 - 802.11

Module 2 - Access Control

Module 3 - Computer Forensics and Legalities

Module 4 - Cryptography Applications

Module 5 - Cryptography Algorithms and Concepts

Module 6 - Key Management

Module 7 - Cryptosystems

Module 8 - Digital Acquisition

Module 9 - DNS

Module 10 - Disaster Recovery and Business Continuity Planning

Module 11 - Endpoint Security

Module 12 - Honeypots, Honeynets, Honeytokens, Tarpits, oh my

Module 13 - IP Terms and Concepts

Module 14 - Logging

Module 15 - Malicious Software

Module 16 - Managing Security Policy

Module 17 - Methods of Attack

Module 18 - Mitnick-Shimomura

Module 19 - Physical Security

Module 20 - Risk Management & Security Frameworks

Module 21 - Security and Organizational Structure

Module 22 - Security Awareness

Module 23 - Steganography

Module 24 - The Intelligent Network - Unified Threat Management (UTM)

Module 25 - Network Infrastructure

Module 26 - Vulnerability Assessment - Outside View

Module 27 - Vulnerability Management - inside view

Module 28 - Vulnerability Management - User View

Module 29 - Web Communications

Module 30 - Wireless Advantages and Bluetooth

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cybersecurity Management
  • Knowledge Management
  • Risk Management
  • Strategic Planning and Policy
  • Training, Education, and Awareness

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@hq.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.