Course Overview
Learning Objectives
After completing this course, you should be able to:
Demonstrate how fundamental principles underlying cybersecurity can be used to achieve repeatable, reliable security solutions.
Describe network and host vulnerabilities along with their underlying causes, characteristics, how they can be exploited and potential mitigation strategies.
Edit and execute scripts on Windows and Linux systems to maintain situational awareness and functionality.
Evaluate tools and techniques for use in offensive and defensive cyber operations to make informed and appropriate decisions when defending systems.
Identify potential points of strength and vulnerability within a network or application to improve an organization’s overall security posture.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):