Overview
This course prepares cybersecurity practitioners for roles related to defending information systems, incident response, and executing standardized responses to security incidents. It aligns with industry frameworks like NIST 800-61r2 and US-CERT’s NCIRP, ideal for those involved in Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operations.
Objectives
By the end of this course, leaner will be able to:
- Identify, assess, respond to, and protect against security threats.
- Operate a system and network security analysis platform.
- Assess cybersecurity risks and mitigate them.
- Analyze various threats affecting security posture.
- Respond to cybersecurity incidents using containment, mitigation, and recovery tactics.
Prerequisites
- At least two years of experience in computer network security or related field.
- Ability to recognize information security vulnerabilities and threats.
- Foundational knowledge of network and computing environments.
- Foundation-level skills with common operating systems and network protocols.
Course Outline
- Importance of risk management in cybersecurity.
- Conducting risk assessment to identify vulnerabilities and threats.
- Strategies for mitigating cybersecurity risks.
- Integration of documentation into risk management processes.
- Classifying different types of cyber threats.
- Analyzing trends influencing the organization’s security posture.
- Utilizing threat intelligence to stay ahead of emerging threats.
- Implementing threat modeling techniques.
- Assessing the impact of reconnaissance activities on network security.
- Evaluating the risks associated with social engineering attacks.
- Assessing the impact of various attack vectors including system hacking, web-based attacks, malware, and DoS incidents.
- Understanding threats to mobile and cloud security.
- Strategies for mitigating the impact of hijacking and impersonation attacks.
- Evaluating command and control techniques used by attackers.
- Identifying persistence techniques to maintain access.
- Analyzing lateral movement and pivoting techniques.
- Assessing data exfiltration and anti-forensics techniques employed by adversaries.