FT Cyber Security Resources - G. Porter
Section outline
-
The intent of this Knowledge Unit is to provide students with a basic awareness of the options available to mitigate threats within a system.
-
1.3.1 Topic(s):
-
Network mapping (enumeration and identification of network components)
-
Network security techniques and components
-
Access controls, flow control, cryptography, firewalls, intrusion detection systems, etc
-
Applications of Cryptography
-
Malicious activity detection / forms of attack
-
Appropriate Countermeasures
-
Trust Relationships
-
Defense in Depth
-
Layering of security mechanisms to achieve desired security
-
Patching
-
OS and Application Updates
-
Vulnerability Scanning
-
Vulnerability Windows (0-day to patch availability)
-
1.3.2 Outcome(s): Students will be able to:
____ Describe potential system attacks and the actors that might perform them
____ Describe cyber defense tools, methods and components
____ Apply cyber defense methods to prepare a system to repel attacks
____ Describe appropriate measures to be taken should a system compromise occur.
-