ITT 6010 - Cybersecurity
Clock Hours: 426
Prerequisites: ITT 1060 - Computer Hardware and Software I
ITT 1070 - Computer Hardware and Software II
ITT 2040 - Computer Support and Help Desk
Industry Certifications Microsoft MTA Security Essentials Certification, CompTIA Security+ Certification, CompTIA CySA+ Certification.
Course Description: Students learn how to secure a corporate network using a layered security model, as well as gaining the basic knowledge needed to analyze, monitor, and protect cybersecurity resources in a vendor-neutral format; this includes vulnerability management, network reconnaissance and monitoring, secure policies and procedures, host and network security, identity management systems, and incident response.
Student Learning Outcomes:
- Analyze indicators of compromise and determine the type of malware.
- Compare and contrast types of attacks.
- Explain threat actor types and attributes.
- Explain penetration testing concepts.
- Explain vulnerability scanning concepts.
- Explain the impact associated with types of vulnerabilities.
- Install and configure network components, both hardware- and software-based, to support organizational security.
- Use appropriate software tools to assess the security posture of an organization..
- Given a scenario, troubleshoot common security issues.
- Given a scenario, analyze and interpret output from security technologies.
- Deploy mobile devices securely.
- Implement secure protocols..
- Explain use cases and purpose for frameworks, best practices and secure configuration guides.
- Implement secure network architecture concepts.
- Implement secure systems design.
- Explain the importance of secure staging deployment concepts.
- Explain the security implications of embedded systems.
- Summarize secure application development and deployment concepts.
- Summarize cloud and virtualization concepts.
- Explain how resiliency and automation strategies reduce risk.
- Explain the importance of physical security controls.
- Compare and contrast identity and access management concepts.
- Install and configure identity and access services.
- Implement identity and access management controls.
- Differentiate common account management practices.
- Explain the importance of policies, plans and procedures related to organizational security.
- Summarize business impact analysis concepts.
- Explain risk management processes and concepts.
- Follow incident response procedures.
- Summarize basic concepts of forensics.
- Explain disaster recovery and continuity of operations concepts.
- Compare and contrast various types of controls.
- Carry out data security and privacy practices.
- Compare and contrast basic concepts of cryptography.
- Explain cryptography algorithms and their basic characteristics.
- Install and configure wireless security settings.
- Implement public key infrastructure.
- Apply environmental reconnaissance techniques using appropriate tools and processes.
- Analyze the results of a network reconnaissance.
- Given a network-based threat, implement or recommend the appropriate response and countermeasure.
- Explain the purpose of practices used to secure a corporate environment
- Implement an information security vulnerability management process.
- Analyze the output resulting from a vulnerability scan.
- Compare and contrast common vulnerabilities found in the following targets within an organization
- Distinguish threat data or behavior to determine the impact of an incident.
- Prepare a toolkit and use appropriate forensics tools during an investigation.
- Explain the importance of communication during the incident response process.
- Analyze common symptoms to select the best course of action to support incident response.
- Summarize the incident recovery and post-incident response process
- Explain the relationship between frameworks, common policies, controls, and procedures.
- Use data to recommend remediation of security issues related to identity and access management.
- Review security architecture and make recommendations to implement compensating controls.
- Use application security best practices while participating in the Software Development Life Cycle (SDLC).
- Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies.
|