Cybersecurity Foundations
Program Description
This cybersecurity course prepares the student for the challenges of designing a secure system, while considering all the cyber roles needed to provide an integrated security solution. There will be lectures and hands-on labs as the students learns about current trends in Internet treats and the impact on enterprise network and related security. The student will learn standard cybersecurity terminology and compliance requirements
Requirements/Training
- Increase your awareness of security
- Interpret/analyze tool output for network mapping/foot printing
- Reduce attack surface of systems
- Review networking as it applies to security controls
- Explore different data protection principles
- Examine the role of PKI/certificates in building trusted relationships between devices in a network
- Implement login security and other identity management solutions
- Reduce attack surface of network devices
- Explore current malware threats and anti-malware solutions
- Explore social engineering threats, methods, and techniques
- Examine software vulnerabilities and security solutions for reducing the risk of exploitation
- Explain monitoring capabilities and requirements and how those may raise privacy concerns
- Identify physical security controls and the relationship between physical and IT security
- Explain incident response capabilities
- Identify legal considerations and investigative techniques when it comes to cybersecurity
- Research trends in cybersecurity
Prerequisites:
CCNA 200-301 Volume1