National CAE Designated Institution
  • Classroom
  • Online, Instructor-Led
Course Description

This course introduces students to the concepts of layered and comprehensive Information Assurance best practices. Topics include user defensive measures, edge defensive measures, along with confidentiality, integrity and availability of enterprise data with the business continuity concepts of: redundancy, disaster recovery, incident handling, compliance and auditing. Upon completion, students should be able to plan effective information assurance strategies.

Learning Objectives

1. Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events. | 2. Explain the role of the Cybersecurity Operations Analyst in the enterprise. | 3. Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses. | 4. Explain the features and characteristics of the Linux Operating System. | 5. Analyze the operation of network protocols and services. | 6. Explain the operation of the network infrastructure. | 7. Classify the various types of network attacks. | 8. Use network monitoring tools to identify attacks against network protocols and services. | 9. Explain how to prevent malicious access to computer networks, hosts, and data. | 10. Explain the impacts of cryptography on network security monitoring. | 11. Explain how to investigate endpoint vulnerabilities and attacks. | 12. Evaluate network security alerts. | 13. Analyze network intrusion data to identify compromised hosts.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):