This course explores the protections available to the practitioner through host operating systems and third party equipment and software, to protect the inner network from the attacker who has successfully circumvented the perimeter or from the disgruntled insider. Use of methodologies including host-based intrusion detection methods, audit settings and review PC Firewalls, host operating hardening for Linux and Windows 2000, and Virtual LANs will be reviewed.
- Understand Managing Security, Administrative Safeguards- Policy, Standard, Guidelines, and Procedures
- Understand Identification and Authentication Protections
- Understand Access Control Mechanisms
- Understand Basic Windows and Linux Security architecture and mechanisms
- Understand Basic Database Security
- Understand Software Security Program Management overview
- Understand Security Evaluation Schemes and basics of Risk/Threat Assessment
- Understand Uses of Cryptography in Security
- Understand General Network, Web, and Mobile Device security
- Understand Operating system hardening for Windows and Linux
- Understand Tools for evaluation of network security
- Understand Security Incident Response Overview
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.