A study and application of technological solutions that identify, catalog, and triage cyberattacks. Topics include host-based monitoring, auditing, network intrusion detection and prevention, and report generation tools. Focus is on using state-of-the-art tools and technologies in a lab- intensive environment that provides hands-on, real-world experience. Students may receive credit for only one of the following courses: CST 630 or CTCH 655.
Learning Objectives
Learners will master the following Cybersecurity Skills upon completion of the course.
Create best security practices to achieve stated business objectives based on risk assumptions
Assess information technology assets and infrastructure for external and internal threats
Assess systems for anomalies, proper updating, and patching
Evaluate incident responses for any breaches, intrusions, or theft
Perform planning, testing, and implementation of software and hardware deployed
Develop a vulnerability map of a system
Apply tools, techniques, and best practices to trace a vulnerability to its root cause
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.