Skip to content

CNA Syllabus

Course Information

  • Course Title: Cyber Network Analysis
  • Course Code: 1710
  • Duration: 10 days

Instructor Information

  • Instructor: SSG Parker, Cedric
  • Instructor: Mr. Tucker, Daniel
  • Instructor: Mr. Restemayer, Ryan
  • Instructor: Mr. Leone, Nicholas

Course Description

This course provides an introduction to concepts related to Cyber Security and Analysis.

Learning Objectives

Packet Analysis:

  • Understand the concept of packet analysis and its importance in network security.
  • Learn how to analyze network packets using tools like Wireshark.
  • Identify common network protocols and their headers within captured packets.
  • Analyze network traffic patterns to identify anomalies and potential security threats.

Encryption and Encoding:

  • Define encryption and encoding and their role in securing data transmission.
  • Differentiate between symmetric and asymmetric encryption algorithms.
  • Understand common encryption methods such as AES, RSA, and DES.
  • Explore encoding techniques like Base64 and hexadecimal representation.
  • Apply Different Cryptographic Functions

Network-Based Security:

  • Describe the principles of network-based security and its importance in safeguarding network resources.
  • Identify common network-based security threats, such as denial-of-service attacks and intrusion attempts.
  • Learn about network security devices like intrusion detection systems (IDS) and intrusion prevention systems (IPS).
  • Explore best practices for configuring network devices to enhance security.

Network-Based Signature:

  • Define network-based signatures and their role in detecting known network threats.
  • Understand how network-based signatures are created and updated to detect new threats.
  • Learn how signature-based intrusion detection systems (IDS) operate and their limitations.
  • Explore the concept of false positives and false negatives in signature-based detection.

Social Engineering:

  • Define social engineering and its various tactics used to manipulate individuals.
  • Recognize common social engineering techniques, such as phishing, pretexting, and tailgating.
  • Understand the psychological principles behind social engineering attacks.
  • Learn how to identify and mitigate social engineering threats through awareness and education.

PKI (Public Key Infrastructure):

  • Explain the concept of PKI and its role in providing secure communication over the internet.
  • Understand the components of a PKI, including certificate authorities (CAs), digital certificates, and public-private key pairs.
  • Explore applications of PKI, such as SSL/TLS encryption, digital signatures, and secure email.

Multifactor Authentication:

  • Define multifactor authentication (MFA) and its significance in enhancing authentication security.
  • Identify different factors used in MFA, including something you know, have, and are.
  • Explore common MFA methods such as passwords, tokens, biometrics, and one-time passwords (OTP).
  • Understand the benefits and challenges of implementing MFA in various systems.

Network Based Security Firewalls:

  • Define firewalls and their role in network security as a perimeter defense mechanism.
  • Identify different types of firewalls, including packet-filtering, stateful inspection, and application-layer firewalls.
  • Understand firewall rule sets and policies for allowing or blocking traffic.
  • Learn about firewall deployment architectures and best practices for configuring firewalls to protect networks.

Host-Based Detection:

  • Describe host-based detection and its role in identifying security threats on individual systems.
  • Learn about host-based intrusion detection systems (HIDS) and their capabilities.
  • Understand the types of events and behaviors that HIDS can monitor and detect.
  • Explore methods for analyzing and responding to security alerts generated by HIDS.

Textbooks and Resources

Facilitator Guide

CTFd

Course Schedule

Day Lesson Name LSA's Covered Duration
1-3 Packet Analysis LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 4.1 , LSA 4.2 , LSA 4.3 , LSA 5 , LSA 6 , LSA 7 , LSA 8 , LSA 9 , LSA 9.1 , LSA 9.2 , LSA 9.3 , LSA 9.4 , LSA 10 , LSA 10.1 , LSA 10.2 , LSA 10.3 , LSA 10.4 , LSA 10.5 , LSA 10.6 , LSA 10.7 , LSA 11 , LSA 12 , LSA 13 Place holder
4 Encryption and Encoding LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 5 , LSA 6 , LSA 7 Place holder
4 Network Based Security LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 5 , LSA 6 , LSA 7 Place holder
5-6 Network-Based Signature LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 5 , LSA 6 , LSA 7 Place holder
7 Social Engineering LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 5 , LSA 6 , LSA 7 , LSA 8 , LSA 9 Place holder
7 Public Key Infrastructure (PKI) and Security Protocol LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 5 , LSA 6 Place holder
8 Multifactor Authentication (MFA) LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 5 , LSA 6 , LSA 7 , LSA 8 Place holder
8 Network Based Security LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 5 Place holder
9 Host-Based Detection LSA 1 , LSA 2 , LSA 3 , LSA 4 , LSA 5 , LSA 6 , LSA 7 Place holder

Academic Integrity

All work submitted must be your own. Plagiarism or cheating will not be tolerated and will result in disciplinary action.

Note

This syllabus is subject to change at the discretion of the Course Manager or instructor