Section outline

  • The intent of this Knowledge Unit is to provide students with a basic awareness of the options available to mitigate threats within a system.

    • 1.3.1 Topic(s):

    • Network mapping (enumeration and identification of network components)

    • Network security techniques and components

    • Access controls, flow control, cryptography, firewalls, intrusion detection systems, etc

    • Applications of Cryptography

    • Malicious activity detection / forms of attack

    • Appropriate Countermeasures

    • Move resourceTrust Relationships

    • Defense in Depth

    • Layering of security mechanisms to achieve desired security

    • Patching

    • OS and Application Updates

    • Vulnerability Scanning

    • Vulnerability Windows (0-day to patch availability)

    • 1.3.2 Outcome(s): Students will be able to:

      ____ Describe potential system attacks and the actors that might perform them
      ____ Describe cyber defense tools, methods and components
      ____ Apply cyber defense methods to prepare a system to repel attacks
      ____ Describe appropriate measures to be taken should a system compromise occur.