National CAE Designated Institution
  • Online, Instructor-Led
Course Description

This course explores the protections available to the practitioner through host operating systems and third party equipment and software, to protect the inner network from the attacker who has successfully circumvented the perimeter or from the disgruntled insider. Use of methodologies including host-based intrusion detection methods, audit settings and review PC Firewalls, host operating hardening for Linux and Windows 2000, and Virtual LANs will be reviewed.

Learning Objectives

  • Understand Managing Security, Administrative Safeguards- Policy, Standard, Guidelines, and Procedures
  • Understand Identification and Authentication Protections
  • Understand Access Control Mechanisms
  • Understand Basic Windows and  Linux Security architecture and mechanisms
  • Understand Basic Database Security
  • Understand Software Security Program Management overview
  • Understand Security Evaluation Schemes and basics of Risk/Threat Assessment
  • Understand Uses of Cryptography in Security
  • Understand General Network, Web, and Mobile Device security
  • Understand Operating system hardening for Windows and Linux
  • Understand Tools for evaluation of network security
  • Understand Security Incident Response Overview

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.