UMBC Training Centers logo

Network Defense


Course Description | Outline | Cybersecurity Training | IT Training

Persistent Attack and Exploitation: Offense


Day 1 - Edge Security

Day 1 starts off by identifying the methodology of the layered security model. At the outermost perimeter we focus on Edge Security. A variety of device types will be discussed, focusing on the best practices for strengthening a network perimeter. Simplicity and effectiveness will be the underlying factor as we cover designing and building a solid first line of defense.

  • Edge Routers
  • Firewalls
  • DMZ’s
  • Edge Security Daily Challenge Lab

Day 2 - Network Security

Day 2 continues with the layered security model as we look in-depth at internal network protection. In this module protecting data while it is in transit will be a topic focus. In addition, a comprehensive approach to controlling access to network traffic will be explored.

  • Infrastructure
  • Encryption
  • Access Control
  • Domain Name System
  • Security Daily Challenge Lab

Day 3 - Endpoint Security

Day 3 explores the final layer of the layered security model covered in this course. During this module the focus will be protecting devices that serve the end user such as workstations, servers, and other peripherals. We will also cover integrating Endpoint Security with the other layers in order to provide a cohesive defense.

  • Endpoint Protection
  • System Hardening
  • Windows Domain
  • Endpoint Security Daily Challenge Lab

Day 4 - Threat Monitoring & Response

Day 4 uses SIEM technology to audit the effectiveness of the layered security model and protect assets by correlating security events across a network or an entire enterprise. Proper processes for identifying and responding to security breaches will be outlined, as well as vendor solutions managing this complex data.

  • Logging & Alerting
  • Incident Response
  • Security Information & Event Management
  • Threat Monitoring & Response Challenge Lab