
Description:
Explores network defense, firewalls, intrusion detection, malware analysis, and real-world cyber-attack case studies.
Learning Outcomes:
-
Explain CIA triad and common attack vectors.
-
Use tools like Nmap, Wireshark, and Metasploit in lab environments.
-
Configure basic firewall and IDS rules.
-
Create a simple incident response plan.
- Teacher: Admin User