Sep 28, 2024  
Course/Program Inventory 
    
Course/Program Inventory

ITT 6010 - Cybersecurity



Clock Hours: 426

Prerequisites: ITT 1060 - Computer Hardware and Software I

ITT 1070 - Computer Hardware and Software II

ITT 2040 - Computer Support and Help Desk

Industry Certifications Microsoft MTA Security Essentials Certification, CompTIA Security+ Certification, CompTIA CySA+ Certification.

Course Description:
Students learn how to secure a corporate network using a layered security model, as well as gaining the basic knowledge needed to analyze, monitor, and protect cybersecurity resources in a vendor-neutral format; this includes vulnerability management, network reconnaissance and monitoring, secure policies and procedures, host and network security, identity management systems, and incident response.

Student Learning Outcomes:

  1. Analyze indicators of compromise and determine the type of malware.
  2. Compare and contrast types of attacks.
  3. Explain threat actor types and attributes.
  4. Explain penetration testing concepts.
  5. Explain vulnerability scanning concepts.
  6. Explain the impact associated with types of vulnerabilities. 
  7. Install and configure network components, both hardware- and software-based, to support organizational security.
  8. Use appropriate software tools  to assess the security posture of an organization..
  9. Given a scenario, troubleshoot common security issues.
  10. Given a scenario, analyze and interpret output from security technologies.
  11. Deploy mobile devices securely.   
  12. Implement secure protocols..   
  13. Explain use cases and purpose for frameworks, best practices and secure configuration guides.
  14. Implement secure network architecture concepts.
  15. Implement secure systems design.
  16. Explain the importance of secure staging deployment concepts.
  17. Explain the security implications of embedded systems.
  18. Summarize secure application development and deployment concepts.
  19. Summarize cloud and virtualization concepts.
  20. Explain how resiliency and automation strategies reduce risk.
  21. Explain the importance of physical security controls.
  22. Compare and contrast identity and access management concepts.
  23. Install and configure identity and access services.
  24. Implement identity and access management controls.
  25. Differentiate common account management practices.
  26. Explain the importance of policies, plans and procedures related to organizational security.
  27. Summarize business impact analysis concepts.
  28. Explain risk management processes and concepts.
  29. Follow incident response procedures.
  30. Summarize basic concepts of forensics.
  31. Explain disaster recovery and continuity of operations concepts.
  32. Compare and contrast various types of controls.
  33. Carry out data security and privacy practices.
  34. Compare and contrast basic concepts of cryptography.
  35. Explain cryptography algorithms and their basic characteristics.
  36. Install and configure wireless security settings.
  37. Implement public key infrastructure.
  38. Apply environmental reconnaissance techniques using appropriate tools and processes.
  39. Analyze the results of a network reconnaissance.
  40. Given a network-based threat, implement or recommend the appropriate response and countermeasure.
  41. Explain the purpose of practices used to secure a corporate environment
  42. Implement an information security vulnerability management process.
  43. Analyze the output resulting from a vulnerability scan.
  44. Compare and contrast common vulnerabilities found in the following targets within an organization
  45. Distinguish threat data or behavior to determine the impact of an incident.
  46. Prepare a toolkit and use appropriate forensics tools during an investigation.
  47. Explain the importance of communication during the incident response process.
  48. Analyze common symptoms to select the best course of action to support incident response.
  49. Summarize the incident recovery and post-incident response process
  50. Explain the relationship between frameworks, common policies, controls, and procedures.
  51. Use data to recommend remediation of security issues related to identity and access management.
  52. Review security architecture and make recommendations to implement compensating controls.
  53. Use application security best practices while participating in the Software Development Life Cycle (SDLC).
  54. Compare and contrast the general purpose and reasons  for using various cybersecurity tools and technologies.