National CAE Designated Institution
  • Online, Instructor-Led
  • Classroom
Course Description

This course introduces students to the concepts of layered and comprehensive Information Assurance best practices. Topics include user defensive measures, edge defensive measures, along with confidentiality, integrity and availability of enterprise data with the business continuity concepts of: redundancy, disaster recovery, incident handling, compliance and auditing. Upon completion, students should be able to plan effective information assurance strategies.

Learning Objectives

1. Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events. | 2. Explain the role of the Cybersecurity Operations Analyst in the enterprise. | 3. Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses. | 4. Explain the features and characteristics of the Linux Operating System. | 5. Analyze the operation of network protocols and services. | 6. Explain the operation of the network infrastructure. | 7. Classify the various types of network attacks. | 8. Use network monitoring tools to identify attacks against network protocols and services. | 9. Explain how to prevent malicious access to computer networks, hosts, and data. | 10. Explain the impacts of cryptography on network security monitoring. | 11. Explain how to investigate endpoint vulnerabilities and attacks. | 12. Evaluate network security alerts. | 13. Analyze network intrusion data to identify compromised hosts.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.