This course will teach you the fundamental principles of
assessing and protecting networked systems against
commonly-exploited vulnerabilities. This course provides students
with a detailed understanding of the various risks that need to be
addressed in a networked environment. It covers choosing,
installing and configuration options for both network and host
Intruder Detection Systems (IDS). It also covers a variety of
manual and automated vulnerability assessment tools - such as
Nessus and OpenVAS. Study of the course can also help to build the
prerequisites to study more advanced IT security courses, including
the Cyber Toa Defensive Network Security Advanced course and the
Cyber Toa Cyber Reconnaissance and Recovery course.
On course completion, you will be able to:
- Explain the most common vulnerabilities exploited in networks
- Perform brute force attacks on remote authentication
- Observe and track network traffic and use a simple Intruder
Detection System (IDS).
- Perform internal and external vulnerability assessments on
- Understand how to generate and detect a malicious payload.
- Understand the comparative risk to business that network
vulnerabilities pose as compared to other cybersecurity risks.
The Cyber Toa Defensive Network Security Fundamentals course is
aimed at IT, network or cybersecurity professionals with (or
seeking) job roles such as IT Security Analysts or Security
- Know basic network terminology and functions (such as OSI
Model, Network Topology, ports etc).
- Understand server-client interactions, VPNs and basic
- Preferably have some experience with Linux and/or command line
Run in partnership with Cyber Toa - Cyber Security