This course explores the protections available to the practitioner through host operating systems and third party equipment and software, to protect the inner network from the attacker who has successfully circumvented the perimeter or from the disgruntled insider. Use of methodologies including host-based intrusion detection methods, audit settings and review PC Firewalls, host operating hardening for Linux and Windows 2000, and Virtual LANs will be reviewed.
Understand Managing Security, Administrative Safeguards- Policy, Standard, Guidelines, and Procedures
Understand Identification and Authentication Protections
Understand Access Control Mechanisms
Understand Basic Windows and Linux Security architecture and mechanisms
Understand Basic Database Security
Understand Software Security Program Management overview
Understand Security Evaluation Schemes and basics of Risk/Threat Assessment
Understand Uses of Cryptography in Security
Understand General Network, Web, and Mobile Device security
Understand Operating system hardening for Windows and Linux
Understand Tools for evaluation of network security
Understand Security Incident Response Overview
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.