Course Overview
Learning Objectives
By the end of this course, the student should know or can:
- Explain the TCP/IP protocol stack
- Identify physical security attacks and vulnerabilities
- Describe port scanning tools and types of port scans
- Explain techniques to harden Windows and Linux systems
- Identify vulnerabilities of embedded operating systems and best practices for protecting them
- Describe intrusion detection and prevention systems and Web-filtering technology
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Risk Management
- Systems Architecture
- Network Services
- Cyber Defense Analysis
- Cyber Defense Infrastructure Support