• Online, Self-Paced
Course Description

Mitigating security threats can lessen the overall impact that an attack can have on network devices, hosts, and applications. In this course, you'll explore common mitigation techniques, as you prepare for exam N10-007.

Learning Objectives

Introducing Mitigation Techniques

  • start the course
  • describe signature management
  • describe device and host hardening
  • recognize when to change native VLANs
  • recognize switch port configuration using the Spanning Tree Protocol, BPDU guard, and root guard
  • recognize switch port protection such as ARP poisoning, DHCP snooping, and MAC filtering
  • describe network segmentation techniques such as DMZ and VLAN
  • understand when to use privileged user accounts
  • describe file integrity
  • describe role separation
  • recognize when to use access control lists
  • describe honeypots
  • recognize the benefits of penetration testing

Practice: Using Mitigation Techniques

  • implement mitigation techniques

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Network Services
  • Systems Administration
  • Technology R&D