TOPOLOGIES, THE OSI MODEL, AND ETHERNET
- Explain devices, applications, protocols, and services at their appropriate OSI layers
- Explain the concepts and characteristics of routing and switching
- Compare and contrast the characteristics of network topologies, types, and technologies
- Deploy the appropriate cabling solution
HUBS, BRIDGES, AND SWITCHES
- Explain the concepts and characteristics of routing and switching
- Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them
- Explain common mitigation techniques and their purposes
INFRASTRUCTURE AND DESIGN, POLICIES AND BEST PRACTICES
- Explain the concepts and characteristics of routing and switching
- Compare and contrast the characteristics of network topologies, types, and technologies
- Identify policies and best practices
INTERNET PROTOCOL AND IP ADDRESSING
- Explain the purposes and uses of ports and protocols
- Configure the appropriate IP addressing components
- Explain the concepts and characteristics of routing and switching
DHCP AND APIPA
- Explain the purposes and uses of ports and protocols
- Given a scenario, configure the appropriate IP addressing components
- Explain the functions of network services
ROUTING
- Explain the concepts and characteristics of routing and switching
- Configure the appropriate IP addressing components
- Determine the appropriate placement of networking devices on a network and install/configure them
TCP AND UDP
- Explain the purposes and uses of ports and protocols
- Explain common scanning, monitoring, and patching processes and summarize their expected outputs
NAME RESOLUTION
- Explain the purposes and uses of ports and protocols
- Explain the functions of network services
MONITORING, SCANNING, AND NETWORK TROUBLESHOOTING
- Explain the purposes and uses of ports and protocols
- Explain common scanning, monitoring, and patching processes and summarize their expected outputs
- Implement network device hardening
- Explain the network troubleshooting methodology
- Troubleshoot common wired connectivity and performance issues
- Troubleshoot common network service issues
APPLICATIONS AND SERVICES, VIRTUALIZATION, SAN, AND CLOUD SERVICES
- Explain the purposes and uses of ports and protocols
- Explain the concepts and characteristics of routing and switching
- Explain the functions of network services
- Determine the appropriate placement of networking devices on a network and install/configure them
- Explain the purposes and use cases for advanced networking devices
- Troubleshoot common wired connectivity and performance issues
- Troubleshoot common network service issues
- Summarize cloud concepts and their purposes
- Explain the purposes of virtualization and network storage technologies
NETWORK SECURITY DESIGN AND APPLIANCES
- Implement network device hardening
- Explain common mitigation techniques and their purposes
- Troubleshoot common wired connectivity and performance Issues
- Explain the purposes and use cases for advanced networking devices
- Summarize common network attacks
- Troubleshoot common network service issues
AUTHENTICATION, ENDPOINT SECURITY, AND NETWORK SITE MANAGEMENT
- Explain the purposes and uses of ports and protocols
- Explain the purposes and use cases for advanced networking devices
- Explain authentication and access controls
- Summarize common networking attacks
- Explain common mitigation techniques and their purposes
- Deploy the appropriate cabling solution
- Use appropriate documentation and diagrams to manage the network
- Compare and contrast business continuity and disaster recovery concepts
- Summarize the purposes of physical security devices
INSTALLING CABLED NETWORKS
- Given a scenario, deploy the appropriate cabling solution
- Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them
- Troubleshoot common wired connectivity and performance issues
INSTALLING WIRELESS NETWORKS
- Compare and contrast the characteristics of network topologies, types, and technologies
- Given a scenario, implement the appropriate wireless technologies and configurations
- Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them
- Explain the purposes and use cases for advanced networking devices
- Given a scenario, secure a basic wireless network
- Summarize common networking attacks
- Troubleshoot common wireless connectivity and performance issues
INSTALLING WAN LINKS
- Explain the concepts and characteristics of routing and switching
- Compare and contrast the characteristics of network topologies, types, and technologies
- Implement the appropriate wireless technologies and configurations
- Determine the appropriate placement of networking devices on a network and install/configure them
- Compare and contrast WAN technologies
CONFIGURING REMOTE ACCESS
- Explain the purposes and uses of ports and protocols
- Explain the purposes and use cases for advanced networking devices
- Compare and contrast WAN technologies
INDICATORS OF COMPROMISE
- Analyze indicators of compromise and determine the type of malware
- Compare and contrast types of attacks
- Explain threat actor types and attributes
- Troubleshoot common security issues
CRITICAL SECURITY CONTROLS AND SECURITY POSTURE ASSESSMENT TOOLS
- Explain penetration testing concepts
- Explain vulnerability scanning concepts
- use appropriate software tools to assess the security posture of an organization
- Explain use cases and purpose for frameworks, best practices, and secure configuration guides
- Explain risk management processes and concepts
- Compare and contrast various types of controls
- Use appropriate software tools to assess the security posture of an organization
INCIDENT RESPONSE
- Follow incident response procedure
CRYPTOGRAPHY
- Compare and contrast types of attacks
- Explain the impact associated with types of vulnerabilities
- Compare and contrast basic concepts of cryptography
- Explain cryptography algorithms and their basic characteristics
PUBLIC KEY INFRASTRUCTURE
- Explain the impact associated with types of vulnerabilities
- Install and configure network components, both hardware- and software-based, to support organizational security
- Explain cryptography algorithms and their basic characteristics
- Implement public key infrastructure
IDENTIFICATION AND AUTHENTICATION
- Compare and contrast types of attacks
- Given a scenario, use appropriate software tools to assess the security posture of an organization
- Troubleshoot common security issues
- Compare and contrast identity and access management concepts
- Install and configure identity and access services
- Implement identity and access management controls
- Compare and contrast basic concepts of cryptography
- Explain cryptography algorithms and their basic characteristics
IDENTITY AND ACCESS SERVICES AND ACCOUNT MANAGEMENT
- Implement secure protocols
- Compare and contrast identity and access management concepts
- Install and configure identity and access services
- Explain the impact associated with types of vulnerabilities
- Differentiate common account management practices
SECURE NETWORK DESIGN
- Compare and contrast types of attacks
- Explain the impact associated with types of vulnerabilities
- Install and configure network components, both hardware- and software-based, to support organizational security
- Implement secure network architecture concepts
FIREWALLS, LOAD BALANCERS, IDS, AND SIEM
- Analyze and interpret output from security technologies
SECURE WIRELESS ACCESS AND PHYSICAL SECURITY CONTROLS
- Install and configure network components, both hardware- and software-based, to support organizational security
- Troubleshoot common security issues
- Analyze and interpret output from security technologies
- Implement secure network architecture concepts
- Compare and contrast types of attacks
- Install and configure wireless security settings
- Explain the importance of physical security controls
SECURE PROTOCOLS, SERVICES, AND REMOTE ACCESS
- Compare and contrast types of attacks
- Explain the impact associated with types of vulnerabilities
- Install and configure network components, both hardware- and software-based, to support organizational security
- Implement secure protocols
- Implement secure network architecture concepts
SECURE SYSTEMS DESIGN
- Explain the impact associated with types of vulnerabilities
- Troubleshoot common security issues
- Analyze and interpret output from security technologies
- Given a scenario, implement secure systems design
- Explain the security implications of embedded systems
SECURE MOBILE DEVICE SERVICES, VIRTUALIZATION, AND CLOUD SERVICES
- Given a scenario, deploy mobile devices securely
- Explain the impact associated with types of vulnerabilities
- Summarize cloud and virtualization concepts
FORENSICS
- Summarize basic concepts of forensics
DISATER RECOVERY, RESILIENCY, AND RISK MANAGEMENT
- Explain the impact associated with types of vulnerabilities
- Use appropriate software tools to assess the security posture of an organization
- Explain how resiliency and automation strategies reduce risk
- Explain disaster recovery and continuity of operation concepts
- Troubleshoot common security issues
- Summarize business impact analysis concepts
- Explain risk management processes and concepts
SECURE APPLICATION DEVELOPMENT AND ORGANIZATIONAL SECURITY
- Compare and contrast types of attacks
- Explain the impact associated with types of vulnerabilities
- Explain the importance of secure staging deployment concepts
- Summarize secure application development and deployment concepts
- Given a scenario, use appropriate software tools to assess the security posture of an organization
- Explain the importance of policies, plans, and procedures related to organizational security
- Carry out data security and privacy practices
Note: This program can be completed in 6 months. However, students will have online access to this program for a 24-month period.