• Online, Instructor-Led
Course Description

In this course, students examine common attack methods, technologies, and countermeasures. Students also gain skills needed to recognize various stages and methods of attack on the enterprise.

Learning Objectives

By the end of this course, the student will be able to:

  1. Name and describe the steps in conducting a session in hijacking
  2. Analyze the different types of attacks used against web servers
  3. Describe the anatomy of an attack
  4. Discuss the methodology of an attacker using a password cracker
  5. Differentiate between different Web browsers in regards to security and privacy features
  6. Describe the steps for performing SQL injection

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Risk Management
  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Digital Forensics
  • Cyber Investigation

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.