Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Pitt Community College
  4. Information Assurance Principals

Information Assurance Principals

This course introduces students to the concepts of layered and comprehensive Information Assurance best practices. Topics include user defensive measures, edge defensive measures, along with confidentiality, integrity and availability of enterprise data with the business continuity concepts of: redundancy, disaster recovery, incident handling, compliance and auditing. Upon completion, students should be able to plan effective information assurance strategies.

Course Overview

Overall Proficiency Level
1 - Basic
Course Prerequisites

SEC-110

Training Purpose
Functional Development
Skill Development
Specific Audience
All
Delivery Method
Classroom
Online, Instructor-Led
Course Location

1986 Pitt Tech Road
Humber Building
Winterville, NC 28590

Course Location Map
  • Your Location
  • Providers
  • Courses
  • Course and Provider Quantity
National CAE Designated Institution
  • Classroom
  • Online, Instructor-Led

Learning Objectives

1. Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events. | 2. Explain the role of the Cybersecurity Operations Analyst in the enterprise. | 3. Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses. | 4. Explain the features and characteristics of the Linux Operating System. | 5. Analyze the operation of network protocols and services. | 6. Explain the operation of the network infrastructure. | 7. Classify the various types of network attacks. | 8. Use network monitoring tools to identify attacks against network protocols and services. | 9. Explain how to prevent malicious access to computer networks, hosts, and data. | 10. Explain the impacts of cryptography on network security monitoring. | 11. Explain how to investigate endpoint vulnerabilities and attacks. | 12. Evaluate network security alerts. | 13. Analyze network intrusion data to identify compromised hosts.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: