In this course, students develop ethical offensive and defensive strategies to protect various network configurations. They select tools and technologies to use during simulated attacks. Upon completion of the course, students will be able to analyze and secure network systems.
Identify current security tools.
Investigate security antipatterns.
Utilize Security terminology.
Analyze system configuration files and logs.
Identify abnormal activity patterns on the network.
Utilize appropriate tools to respond to abnormal activity.
Apply Defense mechanisms.
Document appropriate defense strategies.
Explain penetration testing.
Assess system integrity.
Explain the Current Cybersecurity framework.
Monitor for policy violations.