This subject will immerse you into an interactive environment where you will be shown how to scan, test, hack and secure your own systems. The lab intensive environment gives you in-depth knowledge and practical experience with the current essential security systems. You will begin by understanding how perimeter defenses work and then be led into scanning and attacking your own networks, no real network is harmed. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. You will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
Learning Objectives
Background of technology and technological operations; Risk and system analysis; Systems securities and vulnerabilities; Regulations and ethics
Framework Connections
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.