• Online, Self-Paced
Course Description

IT security analysis builds upon a solid understanding of underlying network and cloud technologies. Existing IT system implementations must be understood before security controls can be recommended.

Learning Objectives

Network Concepts

  • start the course
  • map network hardware and software to the OSI model
  • identify when to use specific network hardware
  • understand IPv4 settings
  • understand IPv6 settings
  • understand transport protocols
  • understand which Windows tools to use when configuring and troubleshooting TCP/IP
  • understand which Linux tools to use when configuring and troubleshooting TCP/IP
  • configure and scan for service ports
  • configure network services securely
  • explain common wired and wireless network concepts
  • scan for wireless networks and understand the returned results
  • determine placement of network devices

Cloud Computing

  • explain the purpose of cloud computing
  • recognize the use of cloud service models
  • recognize the role of virtualization in cloud computing
  • identify cloud security options

Reconnaissance Techniques

  • explain how to discover network devices
  • use logs to learn about the network environment
  • use packet capturing tools for network traffic analysis
  • capture and interpret FTP and HTTP traffic
  • discover network configurations
  • explain harvesting techniques
  • recognize social engineering techniques

Security Policies

  • identify details within acceptable use policies
  • identify details within data ownership and retention policies
  • identify details within data classification policies
  • identify details within a password policy

Practice: Network Reconnaissance

  • recognize various network configurations and perform network reconnaissance

Framework Connections

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.