• Online, Self-Paced
Course Description

IT security analysis builds upon a solid understanding of underlying network and cloud technologies. Existing IT system implementations must be understood before security controls can be recommended.

Learning Objectives

Network Concepts

  • start the course
  • map network hardware and software to the OSI model
  • identify when to use specific network hardware
  • understand IPv4 settings
  • understand IPv6 settings
  • understand transport protocols
  • understand which Windows tools to use when configuring and troubleshooting TCP/IP
  • understand which Linux tools to use when configuring and troubleshooting TCP/IP
  • configure and scan for service ports
  • configure network services securely
  • explain common wired and wireless network concepts
  • scan for wireless networks and understand the returned results
  • determine placement of network devices

Cloud Computing

  • explain the purpose of cloud computing
  • recognize the use of cloud service models
  • recognize the role of virtualization in cloud computing
  • identify cloud security options

Reconnaissance Techniques

  • explain how to discover network devices
  • use logs to learn about the network environment
  • use packet capturing tools for network traffic analysis
  • capture and interpret FTP and HTTP traffic
  • discover network configurations
  • explain harvesting techniques
  • recognize social engineering techniques

Security Policies

  • identify details within acceptable use policies
  • identify details within data ownership and retention policies
  • identify details within data classification policies
  • identify details within a password policy

Practice: Network Reconnaissance

  • recognize various network configurations and perform network reconnaissance

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • All-Source Analysis
  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Cybersecurity Management
  • Exploitation Analysis
  • Systems Analysis
  • Systems Architecture
  • Vulnerability Assessment and Management