CNA Syllabus¶
Course Information¶
- Course Title: Cyber Network Analysis
- Course Code: 1710
- Duration: 10 days
Instructor Information¶
- Instructor: SSG Parker, Cedric
- Instructor: Mr. Tucker, Daniel
- Instructor: Mr. Restemayer, Ryan
- Instructor: Mr. Leone, Nicholas
Course Description¶
This course provides an introduction to concepts related to Cyber Security and Analysis.
Learning Objectives¶
Packet Analysis:¶
- Understand the concept of packet analysis and its importance in network security.
- Learn how to analyze network packets using tools like Wireshark.
- Identify common network protocols and their headers within captured packets.
- Analyze network traffic patterns to identify anomalies and potential security threats.
Encryption and Encoding:¶
- Define encryption and encoding and their role in securing data transmission.
- Differentiate between symmetric and asymmetric encryption algorithms.
- Understand common encryption methods such as AES, RSA, and DES.
- Explore encoding techniques like Base64 and hexadecimal representation.
- Apply Different Cryptographic Functions
Network-Based Security:¶
- Describe the principles of network-based security and its importance in safeguarding network resources.
- Identify common network-based security threats, such as denial-of-service attacks and intrusion attempts.
- Learn about network security devices like intrusion detection systems (IDS) and intrusion prevention systems (IPS).
- Explore best practices for configuring network devices to enhance security.
Network-Based Signature:¶
- Define network-based signatures and their role in detecting known network threats.
- Understand how network-based signatures are created and updated to detect new threats.
- Learn how signature-based intrusion detection systems (IDS) operate and their limitations.
- Explore the concept of false positives and false negatives in signature-based detection.
Social Engineering:¶
- Define social engineering and its various tactics used to manipulate individuals.
- Recognize common social engineering techniques, such as phishing, pretexting, and tailgating.
- Understand the psychological principles behind social engineering attacks.
- Learn how to identify and mitigate social engineering threats through awareness and education.
PKI (Public Key Infrastructure):¶
- Explain the concept of PKI and its role in providing secure communication over the internet.
- Understand the components of a PKI, including certificate authorities (CAs), digital certificates, and public-private key pairs.
- Explore applications of PKI, such as SSL/TLS encryption, digital signatures, and secure email.
Multifactor Authentication:¶
- Define multifactor authentication (MFA) and its significance in enhancing authentication security.
- Identify different factors used in MFA, including something you know, have, and are.
- Explore common MFA methods such as passwords, tokens, biometrics, and one-time passwords (OTP).
- Understand the benefits and challenges of implementing MFA in various systems.
Network Based Security Firewalls:¶
- Define firewalls and their role in network security as a perimeter defense mechanism.
- Identify different types of firewalls, including packet-filtering, stateful inspection, and application-layer firewalls.
- Understand firewall rule sets and policies for allowing or blocking traffic.
- Learn about firewall deployment architectures and best practices for configuring firewalls to protect networks.
Host-Based Detection:¶
- Describe host-based detection and its role in identifying security threats on individual systems.
- Learn about host-based intrusion detection systems (HIDS) and their capabilities.
- Understand the types of events and behaviors that HIDS can monitor and detect.
- Explore methods for analyzing and responding to security alerts generated by HIDS.
Textbooks and Resources¶
Course Schedule¶
Day | Lesson Name | LSA's Covered | Duration |
---|---|---|---|
1-3 | Packet Analysis | LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 4.1 , LSA 4.2 , LSA 4.3 , LSA 5 , LSA 6 , LSA 7 , LSA 8 , LSA 9 , LSA 9.1 , LSA 9.2 , LSA 9.3 , LSA 9.4 , LSA 10 , LSA 10.1 , LSA 10.2 , LSA 10.3 , LSA 10.4 , LSA 10.5 , LSA 10.6 , LSA 10.7 , LSA 11 , LSA 12 , LSA 13 | Place holder |
4 | Encryption and Encoding | LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 5 , LSA 6 , LSA 7 | Place holder |
4 | Network Based Security | LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 5 , LSA 6 , LSA 7 | Place holder |
5-6 | Network-Based Signature | LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 5 , LSA 6 , LSA 7 | Place holder |
7 | Social Engineering | LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 5 , LSA 6 , LSA 7 , LSA 8 , LSA 9 | Place holder |
7 | Public Key Infrastructure (PKI) and Security Protocol | LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 5 , LSA 6 | Place holder |
8 | Multifactor Authentication (MFA) | LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 5 , LSA 6 , LSA 7 , LSA 8 | Place holder |
8 | Network Based Security | LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 5 | Place holder |
9 | Host-Based Detection | LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 5 , LSA 6 , LSA 7 | Place holder |
Academic Integrity¶
All work submitted must be your own. Plagiarism or cheating will not be tolerated and will result in disciplinary action.
Note¶
This syllabus is subject to change at the discretion of the Course Manager or instructor