Course Desc: An overview of effective cybersecurity strategies to defend against a wide range of cyber threats, vulnerabilities, and attack vectors. Activities include hands-on exercises and review of case studies by subject matter experts. The development of policies for cybersecurity defense is introduced. Discussion covers theoretical concepts for cybersecurity defense and the skills needed to safeguard data, systems, privacy, and networks in today's dynamic digital landscape. Students may receive credit for only one of the following courses: CMAP 615 or CMP 610.
Learning Objectives
Learners will master the following Cybersecurity Skills upon completion of the course.
Explain different cybersecurity mechanisms to help ensure the protection of information technology assets and networks.
Prepare students with the cybersecurity principles, technical knowledge, and skills needed to protect data, computer systems, and networks.
Explain different cybersecurity mechanisms to help ensure the protection of information technology assets and networks.
Analyze and evaluate systems with respect to maintaining operations in the presence of risks and threats.
Identify and use appropriate resources to stay abreast of the latest industry development tools, cryptographic systems elements, cyberspace activities, and techniques to reduce the cybersecurity risk by exhibit best practices or research findings.
Determine appropriate data models to design database applications to enforce information integrity, security, and confidentiality by using SQL and Design principles.
Describe the fundamental problem-solving techniques and overview of a scripting language to automate the administrative task and create an appropriate solution within the context of cybersecurity.
Evaluate network security solutions/Internet crimes/ or cloud computing methodology to prevent and detect intrusions.
Discuss and evaluate network security solutions, Internet crimes, and cloud computing methodology to ensure security for their employees, customers, and asset.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.