Apr 28, 2024  
Course/Program Inventory 
    
Course/Program Inventory

CIT 5020 - Network Defense Foundations



Clock Hours: 216

Prerequisites:

Completion of the Information Technology Systems Support Specialist Diploma class competencies

Industry Certifications This class fully maps to the CompTIA Cybersecurity Analyst (CySA+ CS0-002) exam objectives.

Course Description:
This course will introduce students to the concepts and technologies in mastering intermediate-level cybersecurity skills and knowledge. It is designed to prepare student security analysts, threat intelligence analysts, and incident response handlers who will leverage intelligence and threat detection techniques, analyze and interpret data, identify and address vulnerabilities, suggest preventative measures, and effectively respond to and recover from incidents as they apply to an organization’s data, applications, and digital infrastructure.

Student Learning Outcomes:

Upon successful completion of this class, and obtaining Mastery Level of assessment with the objectives and skills, the student is expected to be able to:

 

  1. Explain the importance of threat data and intelligence (A)
  2. Given a scenario, utilize threat intelligence to support organizational security (A)
  3. Given a scenario, perform vulnerability management activities (A)
  4. Given a scenario, analyze the output from common vulnerability assessment tools (A)
  5. Explain the threats and vulnerabilities associated with specialized technology (A)
  6. Explain the threats and vulnerabilities associated with operating in the cloud (A)
  7. Given a scenario, implement controls to mitigate attacks and software vulnerabilities (A)
  8. Given a scenario, apply security solutions for infrastructure management (B)
  9. Explain software assurance best practices (B)
  10. Explain hardware assurance best practices (B)
  11. Given a scenario, analyze data as part of security monitoring activities (C)
  12. Given a scenario, implement configuration changes to existing controls to improve security (C)
  13. Explain the importance of proactive threat hunting (C)
  14. Compare and contrast automation concepts and technologies (C)
  15. Explain the importance of the incident response process (D)
  16. Given a scenario, apply the appropriate incident response procedure (D)
  17. Given an incident, analyze potential indicators of compromise (D)
  18. Given a scenario, utilize basic digital forensic techniques (D)
  19. Understand the importance of data privacy and protection (E)
  20. Given a scenario, apply security concepts in support of organizational risk mitigation (E)
  21. Explain the importance of frameworks, policies, procedures, and controls (E)