Apr 29, 2024  
2022 - 2023 Catalog 
    
2022 - 2023 Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

CST 152 - CyberOps Associate

Credits: 3
Instructional Contact Hours: 3

Provides an introduction to the knowledge and skills needed for a Security Analyst working with a Security Operations Center team. Provides core security skills needed for monitoring, detecting, investigating, analyzing, and responding to security events, thus protecting systems and organizations from cybersecurity risks, threats, and vulnerabilities. Includes an optional skills challenge to practice cybersecurity operations knowledge in a fun and engaging environment. 

Prerequisite(s): CST 150W  
Corequisite(s): None
Lecture Hours: 15 Lab Hours: 30
Meets MTA Requirement: None
Pass/NoCredit: Yes

Outcomes and Objectives
  1. Discuss system and network defense fundamentals.
    1. Discuss TCP/IP networking.
    2. Discuss the threats to network security.
    3. Discuss goals of network security.
    4. Discuss using network defense technologies in layers.
    5. Discuss Access Control models.
  2. Discuss risk analysis.
    1. Discuss the fundamental concepts of risk analysis.
    2. Discuss risk analysis as an ongoing process.
    3. Discuss deciding how to minimize risk.
  3. Discuss network traffic signatures.
    1. Discuss understanding signature analysis.
    2. Discuss detecting and identifying suspicious events and traffic signatures.
    3. Discuss using the Common Vulnerabilities and Exposures (CVE) Standard.
  4. Discuss Security Services.
    1. Discuss Access Control Lists.
    2. Discuss SNMP and Netflow.
    3. Discuss Port Mirroring and Syslog Servers.
    4. Discuss NTP and AAA Servers.
    5. Discuss Firewalls and IDS/IPS.
  5. Discuss the Security Operations Center Fundamentals.
    1. Describe the Windows Operating System.
    2. Provide a Linux Overview.
    3. Discuss SOC processes and technologies.
    4. Describe working with Network Security.
    5. Discuss Digital Forensics and Incident Analysis and Response.
  6. Discuss Networking Protocols.
    1. Discuss Connectivity Verification.
    2. Discuss Address Resolution Protocol.
    3. Describe the Transport Layer.
    4. Discuss Network Services.
    5. Discuss Network Communication Devices
    6. Discuss Technologies and Protocols.
  7. Describe the tactics of network attackers.
    1. Attacking the Foundation.
    2. Attacking what we do.
  8. Discuss Cryptography.
    1. Discuss Integrity and Authenticity.
    2. Discuss Confidentiality.
    3. Discuss Public Key Cryptography.
    4. Discuss Authorities and the PKI Trust System.
    5. Discuss Applications and Impacts of Cryptography.
  9. Explain Endpoint Protection.
    1. Describe Antimalware Protection
    2. Describe Host-Based Intrusion Prevention
    3. Discuss Application Security.
    4. Explain Endpoint Vulnerability Assessment.



Add to Portfolio (opens a new window)