Description:
Explores network defense, firewalls, intrusion detection, malware analysis, and real-world cyber-attack case studies.

Learning Outcomes:

  • Explain CIA triad and common attack vectors.

  • Use tools like Nmap, Wireshark, and Metasploit in lab environments.

  • Configure basic firewall and IDS rules.

  • Create a simple incident response plan.