Information Security for Technical Staff
This five-day course is designed to provide participants with practical techniques for protecting the security of an organization's information assets and resources, beginning with concepts and proceeding on to technical implementations.
The course focuses on understanding and applying the concept of survivability through the effective management of risk, threats, policy, system configuration, availability, and personnel. The course also provides a technical foundation for working with TCP/IP security and cryptography. The final section of the course helps participants learn to design a secure network architecture managing host systems, securing network services and infrastructure, working with firewalls, and understanding functions of a security operations center.
The principles, strategies, and practices covered are applicable to most system platforms and network environments. To illustrate important concepts and security technologies, demonstrations and exercises will include implementations applicable to Linux and Windows systems as well as Cisco Internetworking equipment.
The course involves extensive hands-on laboratories utilizing heterogeneous network environment, scenario-based exercises, lecture/briefings, and open discussion to help participants develop their understanding of the problems and strategies for securing information systems and networks.
Hands-on labs and demonstrations include subjects such as: IPv6 Configuration and Risks, Analyzing Log Events and Alerts, Implementing Mail Security, and DNSSEC, as well as personal and enterprise firewalls, and hardening of Linux, Windows, and Cisco platforms in both wireless and cabled networks. Each student will have the use of a laptop for the duration of the course, as well as access to a wide variety of networked systems.
This CERT incident handling course, which provides a well-rounded understanding of incident handling practices and functions, can be used to prepare for the CERT-Certified Incident Handler Certification.
Technical staff members who manage or support networked information systems and have
- two years of practical experience with networked systems or equivalent training/education
- some degree of specific familiarity with the ISO/OSI 7-layered reference model as well as Ethernet, TCP/IP, and major network operating systems such as Windows and Unix
This course will help participants to
- describe the components of survivability
- identify and define the components of an information security (IS) model
- apply the components of risk and asset management to cyber environment
- explain the benefits of invoking sound security policies and methods for implementing them
- detail the components and functions in various IS methodologies
- summarize key security concerns of the TCP/IP protocol suite
- discuss the benefits of cryptography when applied to IS properties of confidentiality, integrity, and availability
- list common methods of gathering information on networked systems
- describe types of current vulnerabilities and threats to which an organization's information assets may be exposed
- protect against common attack methods perpetrated against network systems
- support best practices for hardening and actively defending host and networked systems from intrusions
- develop an approach for staying current with trends and requisite skills in information security
- The Challenge of Survivability
- Risk and Cybersecurity
- Security Management and Governance
- TCP/IP Security
- Secure Network Design
- Intrusion Detection, Prevention, and Access Controls
- Securing Host Systems
- Host and Application Security
- The Security Operations Center
Participants will receive a course notebook and a downloadable copy of course materials.
This course has no prerequisites.
Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.