Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. University of West Florida Center for CyberSecurity
  4. Fundamentals of Network Defense

Fundamentals of Network Defense

This course focuses on the fundamentals of network defense, covering topics from network protocol vulnerabilities, perimeter security, host hardening, and policies, legal and ethical aspects of network defense. The course lectures are supplemented with hands-on exercises to reinforce the learning process.

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Prerequisites

Students should have intermediate-level skills with computer networks and basic skills with programming/scripting

Training Purpose
Functional Development
Skill Development
Specific Audience
All
Delivery Method
Classroom
Online, Instructor-Led
Course Location

220 W. Garden Street,
Suite 250
Pensacola, FL 32502

Course Location Map
  • Your Location
  • Providers
  • Courses
  • Course and Provider Quantity
National CAE Designated Institution
  • Classroom
  • Online, Instructor-Led

Learning Objectives

 

  • Explain protocol functionalities and vulnerabilities in the TCP/IP stack.
  • Explain various concepts of network defense.
  • Demonstrate use of network packet capture tool.
  • Explain various concepts of host hardening.
  • Explain concepts and techniques of perimeter security.
  • Define and interpret ethical, legal, and regulatory requirements pertaining to network defense.

 

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Cyber Operations
  • Digital Forensics
  • Exploitation Analysis
  • Targets
  • Threat Analysis
  • Vulnerability Assessment and Management

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: