• Online, Instructor-Led
  • Online, Self-Paced
Course Description

 In this course you learn about how to defend systems against unauthorized access, modification or destruction by Performing various task like vulnerability and networking scanning assessments ,Monitor network traffic for unusual activity ,Configure and support security tools such as firewalls, anti-virus software, patch management systems, Implement network security policies, application security, access control and corporate data safeguards, Analyze and establish security requirements for your networks, Train fellow employees in security awareness and procedures, Develop and update business continuity and disaster recovery protocols, Conduct security audits and make policy recommendations ,Provide technical security advice.

Learning Objectives

  • Different Vulnerabilities associated with Network.
  • How to create a defence mechanism for securing the network.
  • How to make the use of different security tools, to secure the network.
  • How to monitor networks and implement Network Incident Response Management system to save from future attacks.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cybersecurity Management
  • Network Services
  • Risk Management
  • Vulnerability Assessment and Management

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.