• Classroom
  • Online, Instructor-Led
Course Description

This course provides a comprehensive overview of cyber-security control technologies. The course starts with a discussion of security policies and perimeter security fundamentals and then moves to a discussion on how to design network borders for maximum security and how to monitor them for unauthorized activity. Then after an introduction to firewalls, packet filtering, and access lists, the course discusses how to set up routers, special-purpose firewalls, and general-purpose hosts with security in mind. Much of the class centers on security-conscious design, both for green field projects and existing networks that need expansion or improvement.

Learning Objectives

  • Discuss how to set up routers, special-purpose firewalls, and general-purpose hosts with security in mind with a discussion of security policies and perimeter security fundamentals
  • Moves to a discussion on how to design network borders for maximum security and how to monitor them for unauthorized activity.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.