Cybersecurity Defense and Operations
Organizations face ongoing threats to their information technology infrastructure on a daily basis. These security struggles need to be approached with modern techniques, a holistic view of security, and a diverse body of knowledge. With the proper tools and training, specialists in the Information Security and Cybersecurity fields will be much more capable of finding success within their roles. The Cybersecurity Defense and Operations course textbook brings cybersecurity core competencies to advanced levels with new concepts and traditional best practices.
Using 14 detailed chapters designed to align with academic calendars, students will be provided with the knowledge and context needed to successfully manage the security of their technical environments. Students will cover topics such as Cloud Security, Threat Intelligence Analysis, Vulnerability Management, Biometric Systems, Incident Response, Securing Systems with Cryptography, and the NICE Cybersecurity Workforce Framework. The content of this textbook is aligned for use with immersive cybersecurity labs produced by Jones & Bartlett Learning, Pearson Education, and Cengage.
Paperback: 342 Pages
Textbook Chapters and Key Knowledge Points
Click the blue arrow to the left of the chapter title to view an expanded list of key knowledge points.
- Overview of the NICE Framework
- NICE Framework: Key Terms
- NICE Framework Categories
- NICE Framework Specialty Areas and Work Roles
- Knowledge, Skills, and Abilities (KSA’s)
- Implementing the NICE Framework
- Password Complexity and Policy
- Tokens, HOTP, and TOTP Controls
- Biometric and Geolocation Methods
- Kerberos, NTLM, LDAPS, and Active Directory
- SSO, SAML, OAuth, and OpenID Connect
- Access Control Models
- Biometric Implementation
- Fingerprint Recognition Systems
- Facial Recognition Systems
- Iris and Retinal Imaging Systems
- Keystroke Dynamics
- Voice Recognition Systems
- Providing Integrity with Hashing
- Symmetric Encryption Characteristics
- Asymmetric Encryption Characteristics
- Email: Using Cryptographic Protocols
- Public Key Infrastructure: Certificates
- Cryptography Security Threats
- Security Architecture Frameworks
- Reference Security Architecture
- The Software Development Life Cycle
- Architectural Design Documentation
- Architectural Domains: The Four Pillars
- Zero Trust Networks
- Baseline Measuring Objectives
- Network Sensor Deployment
- Statistical Monitoring
- Potential Signs of Compromise
- Indicator of Compromise Verification
- Event-Based Alert Monitoring
- 7 Stages of the Attack Life Cycle
- Effective Remediation
- Assigning a Remediation Owner
- Remediation Posturing Actions
- Eradication Plan Development
- Plan Timing and Execution
- Response Playbook Components
- Building a Response Playbook
- Common Playbook Response Scenarios
- Planning Table-Top Exercises
- Planning Simulated Attacks
- Sample Playbook: Unauthorized Access
- Network Forensics vs. Digital Forensics
- General Process for Performing Analysis
- Locating Endpoint Data
- Investigative Interview Strategies
- Investigative Report Writing
- Evidence Dynamics and Chain of Custody
- Risk Management: Key Definitions
- Risk Management Program Development
- Risk Management Frameworks
- Vulnerability Program Essentials
- Prioritizing and Rating Vulnerability Levels
- Establishing an Efficient Workflow
- BCP and DRP Key Definitions
- The Benefits of a Business Impact Analysis
- Business Impact Analysis Data Collection
- Selecting a BIA Project Manager
- Writing a BCP / DRP Testing Strategy
- The 5 Progressions of BCP / DRP Testing
- Cloud Computing Service Models
- Public, Private, and Hybrid Cloud
- Cloud Data Security
- Data Loss Prevention: Egress Monitoring
- Cloud Platform Risks
- Lack of Physical Access and Auditing Ability
- Seeking Best Options Over Fairness
- General Contract Structures
- The SLA and Contract Review Process
- General Contract Review Checklist
- Provisions of an Enforceable Contract
- Contract Negotiation Strategies
- Cyber Adversaries vs. Cyber Defenders
- Components of the Modern Threat Landscape
- Understanding the Maneuver Warfare Mindset
- The Threat Intelligence Cycle
- Challenges to Cyber Crime Investigations
- Threat Intelligence Sources
Training institutions that adopt the Cybersecurity Defense and Operations textbook for use in their course curricula may request corresponding instructor resources at no additional cost. These resources include lecture presentation slides, question text banks for each of the 14 chapters, and lab resource guides. For more information please contact Phase2 Advantage.
All Phase2 Advantage digital course materials – including textbooks, lab guides, and lecture slides in PDF and PPT formats – are ADA accessible and score 100% on major Learning Management Systems such as Moodle, Blackboard, Canvas, and LearnUpon. For more information please contact Phase2 Advantage or visit our Higher Education page in this website.
Course Learning Objectives
- CLO #01: Identify security technologies, risk management models, network and system defense methodologies, identity and access management practices, cryptographic protocols, and intrusion detection techniques.
- CLO #02: Describe vulnerabilities and risks, threat intelligence collection techniques, digital evidence and investigations, network and host data collection methods, malware triage protocols, and incident response and remediation strategies.
- CLO #03: Demonstrate network security techniques using labs and industry tools such as Wireshark network protocol analyzer, Linux Command Line Interface, Microsoft Administrative Command Prompt, and Microsoft PowerShell / PowerShell ISE (Integrated Scripting Environment).
- CLO #04: Examine the principles and purpose of secure network architecture, architecture security frameworks, implementation of supporting security controls, zero trust network foundations and assertions, and identifying network baselines and anomalies.
- CLO #05: Develop a business continuity strategy utilizing business impact analysis, disaster response and recovery planning, asset identification and valuation techniques, quantitative / qualitative analysis methods, and testing and evaluation goals which align to organizational objectives.
- CLO #06: Evaluate cloud computing service models, architecture and security considerations, risks and threats posed to cloud services, regulatory and compliance requirements, cloud provider and customer responsibilities, and the structure of contracts and service level agreements.
Phase2 Advantage has partnered with VitalSource’s digital content publishing platform to offer cybersecurity training and credentialing capabilities to students around the globe. VitalSource, a subsidiary of the Ingram Content Group (Ingram Publishing), provides digital academic resources to over 7,000 academic institutions around the globe in support of their academic degree and professional development programs. Sampling has been enabled for all eligible faculty and staff.
Contact Us for Bookstore Orders
To find out more about bookstore orders or our full range of instructor resources, contact us today via the phone number or email address listed below.