This course introduces students to the concepts of layered and comprehensive Information Assurance best practices. Topics include user defensive measures, edge defensive measures, along with confidentiality, integrity and availability of enterprise data with the business continuity concepts of: redundancy, disaster recovery, incident handling, compliance and auditing. Upon completion, students should be able to plan effective information assurance strategies.
1. Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events. | 2. Explain the role of the Cybersecurity Operations Analyst in the enterprise. | 3. Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses. | 4. Explain the features and characteristics of the Linux Operating System. | 5. Analyze the operation of network protocols and services. | 6. Explain the operation of the network infrastructure. | 7. Classify the various types of network attacks. | 8. Use network monitoring tools to identify attacks against network protocols and services. | 9. Explain how to prevent malicious access to computer networks, hosts, and data. | 10. Explain the impacts of cryptography on network security monitoring. | 11. Explain how to investigate endpoint vulnerabilities and attacks. | 12. Evaluate network security alerts. | 13. Analyze network intrusion data to identify compromised hosts.