Skip To Content
Course

Cybersecurity Tools and Technology - June 18th-19th

Ended Jun 20, 2021

Sorry! The enrollment period is currently closed. Please check back soon.

Full course description

Start:

June 18, 2021

Duration:

2 Days

Location:

Online

Price:

N/A


 

What you'll learn:

Students will gain an introduction to cybersecurity concepts including basic networking, security monitoring, penetration testing, and incident response. Participants will use virtual machines and software tools to complete labs.


Learning Objectives:

Day 1: Cybersecurity Basics: Networking, Security Monitoring, and Auditing

  • Understand TCP/IP Protocol Stack
  • Examine networking stacks
  • Utilize network debugging tools
  • List Windows network services
  • Understand Windows networking services
  • Understanding virtualization and docker containers
  • Explain purpose of services, daemons, network configurations in Linux
  • Scan and identify key network services
  • Understand password complexity requirements
  • Demonstrate password policy implementation on Windows and Linux
  • Demonstrate TLS implementation on web applications
  • Understand difference between HTTP and HTTPS
  • Understand modules in Autopsy

Day 2: Penetration Testing Fundamentals and Incidence Response

  • Examine directory structure in Linux
  • Interpret results from network mapping tools
  • Utilize Metasploit framework for exploiting vulnerabilities
  • Understand Kali Linux tools for network and web hacking<
  • Identify known vulnerabilities on network services
  • Provide vulnerability remediation guidelines
  • Automate routine networking and monitoring tasks using shell scripting
  • Demonstrate use of shell scripting for assigned tasks
  • Understand NIST guidelines on incident response
  • Present an incident response plan for provided scenario
  • Identify different network and service logs for Windows and Linux
  • Establish a centralized Log Management Server
  • Examine key events based on data collected by Log Management Server
  • Establish Snort-based Intrusion Detection System (IDS)
  • Utilize Intrusion Prevention System (IPS) to block intrusion events
  • Develop Snort rules for specific intrusion events
  • Examine structure of syntax and semantics of Linux Firewall
  • Establish a Linux Firewall with provided specifications for an enterprise network
  • Validate the Linux Firewall rules

Who this course is designed for:

This course if reserved for ASU ROTC or military-affilated students in STEM majors with good academic standing.