Marcraft Cyber Security Essentials: Concepts & Practices

Cyber Security Concepts and Practices Includes 180 hours of illustrated theory, integrated with step-by-step hands-on labs and equipment.
Marcraft Cyber Security Essentials
Marcraft Cyber Security Program
IT & Cyber Security Training Programs
Marcraft Cyber Security Essentials

In today's Global IT environment, Cyber Security goes well beyond traditional network security. Based on the National Institute of Standards and Technology (NIST) – Cyber Security Frameworks, the new ETG/Marcraft Cyber Security Essentials – Concepts and Practices course covers both theory and hands-on labs:

  • Critical Infrastructure Security System and Devices
  • Intelligent Computing and Controlling Devices and Systems Security
  • Business Information Technology (IT) Network Security Systems and Techniques
  • Industrial/Utility Industrial Control System (ICS) Networks and Devices Security
  • Ethical Hacking Roles and Tools

Concepts & Practices

Theory Text & Lab Guide

Infastracture Security

  • Access Control & Security Policies
  • Physical Security Controls
  • Authentication Systems
  • Biometric Scanners
  • Remote Access Monitoring
  • Security Controllers
  • Sensors
  • Keypads
  • Output Devices
  • Camera Specifications & Deployment Strategies
  • Video Recorders, Switchers & Monitors

Local Host Security

  • Securing Outer Perimeter Portals
  • BIOS Security Subsystems
  • Local System Hardening
  • Physical Port Access
  • BIOS Port Enabling Functions
  • Removable Media Access
  • BIOS Boot Device/Sequence Controls
  • Operating Systems
  • OS Kernel & File System Security
  • File System Attacks
  • Common Operating System Security Tools
  • Physical Authentication Devices
  • Using Local Administrative Tools
  • Event Logging and Auditing
  • Implementing Data Encryption
  • Implementing Local Protection Tools
  • Software-Based Local Firewalls
  • Using Local Intrusion Detection Tools
  • Configuring Browser Security Options
  • Malicious Software Protection
  • Hardening Operating Systems
  • Overseeing Application Software Security
  • Software Exploitation
  • Applying Software Updates and Patches

Local Network Security

  • OSI Model
  • Networking Topologies & Protocols
  • Network Control Strategies
  • Physical Server Access Control
  • Server Software Security
  • Configuring/Hardening Server OS
  • User Accounts
  • Network Authentication Options
  • Establishing Resource Controls
  • Conducting Backups
  • Distributed Intrusion Detection Architectures
  • Vulnerability Scanning
  • Remote Monitoring
  • Simple Network Management Protocol
  • Network Connectivity Devices
  • Network Connectivity Device Vulnerabilities
  • Network Transmission Media Security
  • Network Hardening

Cyber Security

  • Basic Internet Concepts
  • Internet Services
  • Standards and RFCs
  • Network Address Translation
  • Port Address Translation
  • Port Forwarding or Mapping
  • Network Segmentation
  • Software-Defined Networking
  • Network Virtualization
  • VLANs
  • Firewalls
  • Network Appliances
  • Proxy Servers
  • DMZs
  • Implementing Security
  • IP and MAC Authentication
  • Authentication Protocols
  • Encryption
  • Digital Certificates
  • Hash Tables
  • Basic Tools
  • Monitoring Tools and Software
  • Zero-Day Vulnerabilities
  • SQL Injection
  • Social Engineering Exploits
  • Network Threats and Attacks
  • Dictionary Attacks
  • Denial of Service Attacks
  • Tarpitting
  • Spam
  • Other Exploit

Environments & Testing

Theory Text & Lab Guide

Enterprise Network Security

  • Common Enterprise Network Security Structures
  • Storage Virtualization
  • VLAN Attacks
  • Network Segmentation
  • VLAN Network Segmentation
  • Controlling Intersegment Data Movement
  • Tunneling
  • ACL/Network Layer Security
  • Configuring Access Control Lists
  • Configuring Services and Protocols
  • Small Business Zoning
  • Flat Business Networks
  • Front-End & Mid-Tier Servers
  • Back-End Database Servers
  • Risk Management & Mitigation
  • Incident Response Planning
  • Business Continuity Planning
  • Disaster Recovery Planning
  • Environmental Security Activities
  • Employee Awareness and Training
  • Acceptable Use, Due Care & Privacy
  • Separation of Duties & Need-to-Know
  • Privilege Management
  • Password Management Policies

Industrial Cyber Security Systems

  • Open & Closed Loop Control Systems
  • Dedicated & Distributed Control Systems
  • Industrial Sensors
  • Final Control Elements/Actuators
  • Industrial Process Controllers
  • Field Devices
  • Industrial Networks
  • SCADA for Process Control
  • Common Industrial Network Structures
  • Industrial Network Communication Media
  • Asynchronous Serial Standards
  • Ethernet Networking
  • Remote Access Communication Media
  • Industrial Network Protocols
  • Utility Generation Control Networks
  • Utility Distribution Control Networks
  • Utility Data Collection Networks
  • Smart Meters
  • Customer Data Management Systems
  • Industrial and Utility Network Security
  • Global Security Standards, Practices, & Regulations
  • Boundary Protection
  • Wide Area Network Security
  • SCADA Security
  • ICS Risk Assessments

Medical Network Security

  • VoIP Phone Systems
  • Medical Records Security
  • Electronic Health Records
  • Government Regulations
  • Clinical Document Architecture
  • Data Segmentation for Privacy
  • Access Control
  • Audit Controls
  • Data Storage and Retention
  • Data Purging and Destruction
  • Backup and Recovery
  • PACS
  • Vendor Neutral Archives
  • Radiology Information Systems
  • DICOM
  • Digital Signatures
  • Metadata
  • Transmission Security
  • e-Prescribing Systems
  • Medical Diagnostic Instrumentation
  • Wireless Technologies
  • Telemetry Applications
  • Wireless Sensor Networks
  • The Internet of Things
  • Exploiting Mobile Devices

Introductio to Ethical Hacking

    Ethical and Legal Hacking
  • Black, White & Gray Hats
  • Security Breach Examples
  • The Lockheed Martin Cyber Kill Chain
  • Network Enumeration/Port Scanning
  • Social Engineering
  • The Pentest Process
  • IP Header Manipulation
  • Defending Against IP Spoofing
  • Session Hijacking
  • MAC Spoofing & Flooding
  • ARP Spoofing/Poisoning
  • Man-in-the-Middle Attacks
  • DNS Spoofing & SQL Injection
  • DoS vs. DDoS Attacks
  • Ping Flood & Smurf Attacks
  • UDP & SYN Flood Attacks
  • Password Attacks
  • Wireless Attacks
  • Wardriving
  • Rogue Access Points
  • WEP Key Cracking
  • Beacon & Deauthenticate Flood
  • Documentation & Reporting

Certifications

  • CompTIA A+ Certification
  • CompTIA Net++ Certification
  • ISACA Cybersecurity Fundamentals Certification
  • Microsoft Security Fundamentals Certification

Endorsements

In addition to the 180 hour RESI BASIC certification program, students can also specialize and earn endorsements in any of four, 45-hour specialty areas:

Enterprise Network Security

Business Networking & Server Management

Industrial Security Systems

Automated Processes, Programmable Logic Controllers, Smart Grids, Structural Security, Grid Networks, WANs and HANs, Smart Meters, SCADA Systems & Security Issues and Solutions

Medical Network Security

Medical System Structure & HIPPA Requirements

Ethical Hacking

Black Hat, White Hat & Gray Hat

More Information

Marcraft

For over 35 years, ETG/Marcraft has been producing Electronics, Computer, IT and Mobile Electronics and Green Technology training programs that excel in the classroom environment. We engineer and design the lab hardware, software and courseware materials for use in career and technical education schools around the globe. Tech-Labs is proud to bring Marcraft products to schools, colleges and universities.

Visit Marcraft's Website

Information Technology

Marcraft IT, Networking, Cyber SecurityInformation Technology (IT) has transformed the way the world does business, has boosted work production, and has even changed forms of art and culture. Computers are vitally important to America’s prosperity and the key to our continued leadership in this field is the talented IT specialists who make technology function. To be successful students will need strong math skills, a mind for details, and the creativity to devise solutions to any problem.

Through the IT pathway, students learn critical skills and knowledge in:

  • Computer Hardware
  • Local Area Networking (LAN)
  • Installation and configuration
  • Servers and infrastructure
  • Electrical and electronic theory
  • Diagnostics and preventative maintenance

Industry Certifications

  • CompTIA A+
  • CompTIA Net+
  • CompTIA Security +