Security

Defending Against Cyber Vulnerabilities

Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cyber security. Ensuring cyber security requires coordinated efforts throughout an information system.

Defending Against Cyber Vulnerabilities

Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cyber security. Ensuring cyber security requires coordinated efforts throughout an information system. Elements of cyber security include:

• Application security

• Information security

• Network security

• Disaster recovery / business continuity planning

• End-user education




TBD
Check back often for updates or send us an email at [email protected] so we can notify you of upcoming courses.

An Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, CompTIA A+ and Network+ certifications, or equivalent knowledge, and 6-9 months experience in networking, including experience configuring and managing TCP/IP. Although not required, students might find it helpful to obtain foundational information from introductory operating system administration courses.

Recommended experience: CompTIA Network+ certification and two years of technical networking experience, with an emphasis on security.

At the completion of this course, students will be able to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! They will scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, Virus Creation and others.

Instructor led, group-paced, classroom-delivery learning model with structured hands-on activities.

In this course, all the above security areas will be discussed. Demos and labs will supplement the lecture material in detail.

1. Defense in depth concepts

2. Physical security

3. Network attacks and penetration testing

4. Security policies and procedures

5. Security education

6. Data encryption for data in-transit and at rest

7. Securing mobile devices

8. Securing servers (Web, FTP, DNS, Application, DHCP)

9. Securing routers, switches, gateways, and network devices

10. Developing secure code

11. Security in social media

12. Steganography