• Classroom
  • Online, Instructor-Led
  • Online, Self-Paced
Course Description

This course surveys the cybersecurity landscape and introduces the student to terminology needed to be successful in the industry.

Learning Objectives

Module 1: Cybersecurity Overview

  • Supply and Demand - Jobs
  • Cybersecurity Field is Growing
  • Competitive Workforce
  • Typical Salaries
  • Hacking Overview
  • Managements Perspective
  • Peeling the Onion - Layered Approach
  • CIA Triad

Module 2: Network Defense

  • Operating Systems - Linux vs. Windows
  • OSI Model
  • TCP vs. UDP
  • TCP Three Way Handshake
  • Identification and Authentication
  • Firewalls
  • Host Based and Network Based IDS

Module 3: Applied Encryption

  • Plaintext vs. Ciphertext
  • Cryptosystems
  • Steganography
  • Session Keys
  • Algorithms - DES and AES
  • LANMAN, NTLM
  • Hashes
  • Disk Encryption
  • Digital Signatures
  • PKI
  • VPN - IPSEC, IKE

Module 4: Access control

  • Methods
  • Implicit Deny
  • Least Privilege
  • Separation of Duties
  • Job Rotation
  • MAC vs. DAC
  • Role Based and Rule Based
  • Logical vs. Physical Access Control
  • Strong Authentication
  • Biometrics

Module 5: Intrusion detection systems (IDS)

  • Alerts and Alarms
  • Noise
  • NIDS vs. HIDS
  • Intruders, Masquerader
  • Passive vs. Active
  • IPS, Statistical, Signature, Heuristics, Anomalies

Module 6: Applied Systems Hardening

  • Privilege Escalation
  • Spyware, Adware, Rootkits
  • Malicious Code, Worms, Virus
  • DDOS, Smurf, Teardrop
  • Botnets, RATs, Trojans
  • OS Hardening Techniques

Module 7: Incident Response

  • Events - Normal, Escalation, Emergency
  • Incident Response - TIGER TEAM
  • Network Monitoring
  • Investigation
  • Recovery
  • Reporting

Module 8: Digital Forensics

  • Computer Crime
  • Forensics
  • Legal Cases
  • The Forensics Process
  • Tools
  • Chain of Custody
  • Reporting

Module 9: Advanced Business Continuity Planning

  • Due diligence, Due Care, Due Process
  • Threats
  • Business Continuity
  • Boy Scout Method - Be Prepared
  • MTBF, MTTR, Single Points of Failure
  • RAID
  • Power and Backups

Module 10: Applying your skills

  • Capture the Flag - Virtual Machines

Framework Connections