About USTTI Course Catalog Gallery Applicant Information Apply Online
Dec 11 2018 USTTI.org Home

Browse Courses
List All Courses
Apply Online


Course Information


"Hands-On" Introduction to Protecting Networks from Cyber Attacks

Course Description
The course is designed to provide participants a "hands-on" introduction to the technologies and processes used for identifying and protecting networks from cyber attacks.

The course will be given in the Security Operations Center of the ITP Security program in the engineering school of the University of Colorado Boulder. This state-of-the-art facility is equipped with some of the best tools available for identifying cyber threats occurring over Internet Protocol networks used by governments and enterprises. Participants will be introduced to the tools, learn best practices of how they can be used, and what can be done once a network has been determined to be compromised.

Learning Objectives
Obtain an introduction to best practices for providing network security to government agencies or enterprises.
- Understand how to detect cyber threats using Intusion Detection Systems such as SNORT and Suricata.
- Learn techniques for large scale network analysis using NetFlow.
- Learn basic approaches to mitigate, repair, and return compromised networks to normal operations.
- Practice forensics for IoT and enterprise devices using open source tools



Course Vitals

The Interdisciplinary Telecom Program and the University of Colorado Boulder

Boulder, CO

Training Dates
June 25-29, 2018

Suggested Course Sequence




spacer spacer
Copyright © 2018 USTTI
1150 Connecticut Avenue, NW, Suite 702
Washington, DC 20036-4131 USA
Phone: +1-202-785-7373
Fax: +1-202-785-1930
train@ustti.org sa