The open nature of the Internet makes it increasingly important for growing businesses to pay attention to the security of their networks. As companies move more of their business functions to the public network, they need to take precautions to ensure that their data is not compromised or does not end up in front of the wrong people.
It has become increasingly difficult to establish and maintain a secure network computing environment, and the challenge is made more difficult because of increased availability requirements and growing regulatory requirements. Risk management is a building block of effective security architectures, which protects organizational assets against constantly evolving threats. This course provides an explanation of the breadth of the challenge to establish and maintain a secure network environment. It includes a description of the fundamental concepts in Network Security, identifies common vulnerabilities and threats in borderless networks, and describes basic principles for securing networks against common threats.
Building Blocks of Information Security - identify the most important criterion when classifying data - categorize examples of security controls Need for Network Security - identify the most recent threat vector trends in information security An Overview of Threats in Borderless Networks - match types of attackers to descriptions - sequence the typical steps for compromising targets and applications Threats in Borderless Networks - categorize threats to borderless networks Principles of Secure Network Design - recognize defense-in-depth principles
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.