AccountIcon BigDataIcon BlogIcon default_resource_icon CartIcon checkmark_icon cloud_devops_icon computer_network_admin_icon cyber_security_icon gsa_schedule_icon human_resources_icon location_icon phone_icon plus_icon programming_software_icon project_management_icon redhat_linux_icon search_icon sonography_icon sql_database_icon webinar_icon

Search UMBC Training Centers

Cybersecurity

Cybersecurity Fundamentals

+ View more dates & times
  • Overview

    The three-day cybersecurity fundamentals course will provide students with an overview of current networking, information assurance (IA), and cybersecurity theory and application.  The course will consist of lectures and hands-on labs for a multi-faceted learning experience.  This course will provide a good initial foundation for participants wanting to ultimately pursue industry certification like Security + and/or Certified Ethical Hacker (CEH).

  • Who Should Take This Course

    PREREQUISITES

    Students taking this course should have the following skills: end-user skills with Windows®-based personal computers, including the ability to: browse and search for information on the Internet; start up, shut down, and log on to a computer and network; run programs; and move, copy, delete, and rename files in Windows Explorer. Students should also have basic knowledge of computing concepts, including the difference between hardware and software; the functions of software components, such as the operating system, applications, and file systems; and the function of a computer network.

    CompTIA A+ and/or Network+ certifications or equivalent experience would be greatly beneficial.

  • Why You Should Take This Course
    Upon completing this course, students will understand:
    • Networking Fundamentals
    • Network Protocols and Services
    • Access Control Concepts
    • Account and Password Management
    • Sniffing and Protocol Analysis
    • Information Assurance Fundamentals
    • Common Vulnerabilities and Attacks
    • Incident Response
    • Host Hardening Techniques
    • Cryptography
    • Firewalls
    • Network-based IDS/IPS
    • Remote Access Technologies (optional)
    • Wireless Technologies (optional)
    • Virtual Machines (optional)
  • Schedule
  • Course Outline

    Day 1 Objectives

    1. Hacking Demo
    2. Networking Fundamentals
      1. Network Types (LANs, MANs, WANs)
      2. Network Topologies
      3. LAN Protocols
      4. WAN Protocols
      5. Networking Devices
      6. Network System Management
      7. Network Management Lab Demo
    3. Network Protocols and Services
      1. IPv4 & IPv6 Addressing
      2. OSI Reference Model
      3. Networking Services
      4. Networking Protocols
      5. Application Layer Protocols
    4. Access Controls Concepts
      1. Data & System Classification
      2. Identification, Authentication, Authorization, Auditing (IAAA)
      3. Discretionary, Role Based, Mandatory Access Controls
    5. Account and Password Management
      1. User Account Management
      2. User Account Policies
      3. Service Accounts and Privilege Levels
      4. Multifactor Authentication
      5. System and Account Auditing
      6. Account Management Lab Demo
      7. Password Cracking Lab

    Day 2 Objectives

    1. Sniffing & Protocol Analysis
      1. TCPDump Basics
      2. Wireshark Basics
      3. Traffic Analysis
      4. Wireless Basics
      5. Wireshark Lab
    2. Information Assurance (IA) Fundamentals
      1. Defense In-Depth
      2. Fundamental Tenants of Security (CIA)
      3. Risk Management (RMF)
      4. Common Security Vulnerabilities and Remediation
    3. Common Vulnerabilities & Attacks
      1. Common Vulnerabilities
      2. Attack Vectors
      3. Metasploit Fundamentals
      4. Social Engineering
      5. Attack Mitigation Techniques
      6. Web & Database Attacks
      7. Hex Editor / Strings Lab
    4. Incident Response (IR)
      1. Incident Response Preparedness
      2. IR Policies and Procedures
      3. IR Legal Concerns
    5. Host Hardening Techniques
      1. System Hardening (ports, services, patches)
      2. Host Based IDS/IPS
      3. Host Configurations
      4. Anti-Virus & System Integrity Verification
      5. Windows Group Policy Lab Demo

    Day 3 Objectives

    1. Cryptography
      1. Cryptography Background
      2. Cryptographic Services
      3. Symmetric/Asymmetric Cryptography
      4. Hashing Algorithms
      5. Hybrid Cryptography
      6. Public Key Infrastructure (PKI)
      7. Cryptography Lab Demo
    2. Firewalls
      1. Firewall Types
      2. Firewall Placement
      3. Firewall Rule Configuration
      4. Firewall Configuration Lab Demo
    3. Network Based IDS/IPS Systems
      1. Network Based IDS/IPS Basics
      2. NIDS/NIPS Configuration & Placement
      3. NIDS/NIPS Types & Limitations
    4. Remote Access Technologies (Optional – Time Permitting)
      1. VPN Technologies
      2. RADIUS, TACACS+, DIAMETER
      3. RDP
      4. Remote Access Security Concerns
    5. Wireless Technologies (Optional – Time Permitting)
      1. Wireless Networking Fundamentals
      2. Wireless Attacks
      3. Wireless Security
    6. Virtual Machines (Optional – Time Permitting)
      1. Virtual Machine Basics
      2. Virtual Machines Use & Implementation
      3. Virtual Machine Security
  • FAQs
    Is there a discount available for current students?

    UMBC students and alumni, as well as students who have previously taken a public training course with UMBC Training Centers are eligible for a 10% discount, capped at $250. Please provide a copy of your UMBC student ID or an unofficial transcript or the name of the UMBC Training Centers course you have completed. Online courses are excluded from this offer.

    What is the cancellation and refund policy?

    Student will receive a refund of paid registration fees only if UMBC Training Centers receives a notice of cancellation at least 10 business days prior to the class start date for classes or the exam date for exams.

Contact Us