3238 - Session-based subject

Network Security / CISCO CyberOps

Learn to develop a comprehensive understanding of network protocol and service operations, as well as the ability to explain how network infrastructure works.

Level
Master
Location
Session-based
Points
7.5
Price
kr 22 950
Admission requirements
Form type
Full-time/Part-time
Subject code
3238
Subject description

Computer networks and communication technologies, including WiFi, are profoundly altering our daily lives by interconnecting nearly all computing devices through the Internet, serving as the primary infrastructure. As a result, there's a substantial demand for individuals possessing specialized knowledge and skills to administer devices and applications within a secure framework. These professionals must adeptly identify network vulnerabilities and counteract security threats. The domain of Cybersecurity Operations (CyberOps) encompasses the pivotal task of establishing robust cyber defense. 

CyberOps is instrumental in assisting organizations to implement and sustain solutions, along with executing security procedures to effectively manage cyber risks. This course centers on the most up-to-date operational expertise and insights required to fortify networks, as well as to excel in roles within Security Operations Centers (SOCs). Specifically, the curriculum delves into security concepts, prevalent network and application operations, various attack scenarios, and the essential data needed for investigating security incidents. 

Aligned with the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework, this course ensures consistent communication language across cybersecurity education, training, and workforce development endeavors.

Learning outcome

The student gains a comprehensive understanding of network protocol and service operations, along with the ability to explain network infrastructure functioning. They adeptly classify diverse network attack types and excel in designing, implementing, and managing security for networked devices and data. Proficiency extends to discussing essential Linux and Windows attributes for cybersecurity analyses. 

Furthermore, they articulate the role of CyberOps and its organizational elements, elaborate on the standards employed for specifying and communicating CyberOps events, and explain cryptography's impacts on network security monitoring. They skillfully evaluate network security alerts and effectively analyze intrusion data to identify compromised hosts and vulnerabilities. 

Skills include configuring and operating Security Information and Event Management (SIEM) tools such as Security Onion, utilizing Kali Linux for CyberOps tasks, creating, configuring, and troubleshooting networks in simulators like Cisco Packet Tracer, and employing network monitoring tools like Wireshark. 

General competence is evident through the acquisition of core security concepts and skills necessary for configuring and resolving computer network issues, maintaining device and data integrity. The student hones critical thinking and problem-solving abilities using hands-on tools like Cisco Packet Tracer, cultivating practical expertise for cybersecurity operations roles. Moreover, they deepen their knowledge of effectively detecting security incidents. 

Subject details

This subject is included in