Course

Course Summary
Credit Type:
Course
ACE ID:
DDCI-0022
Organization's ID:
CF100
Location:
Online
Length:
2 weeks (80 hours)
Dates Offered:
Credit Recommendation & Competencies
Competency Framework Statement
DOD Cyber Workforce Framework K0001: Knowledge of computer networking concepts and protocols, and network security methodologies
DOD Cyber Workforce Framework K0036: Knowledge of human-computer interaction principles
DOD Cyber Workforce Framework K0044: Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
DOD Cyber Workforce Framework K0060: Knowledge of operating systems
DOD Cyber Workforce Framework K0061: Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open Systems Interconnection [OSI] Model, Information Technology Infrastructure Library [ITIL], current version)
DOD Cyber Workforce Framework K0109: Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, network interface cards, data storage)
DOD Cyber Workforce Framework K0111: Knowledge of common network tools (e.g., ping, traceroute, lookup)
DOD Cyber Workforce Framework K0113: Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN)
DOD Cyber Workforce Framework K0117: Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT])
DOD Cyber Workforce Framework K0221: Knowledge of OSI model and underlying network protocols (such as TCP/IP)
DOD Cyber Workforce Framework K0332: Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services
DOD Cyber Workforce Framework K0373: Knowledge of software applications (e.g., data storage and backup, database applications) and their vulnerabilities
DOD Cyber Workforce Framework K0392: Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.)
DOD Cyber Workforce Framework K0395: Knowledge of computer networking fundamentals (i.e., computer components of a network, types of networks, etc.)
DOD Cyber Workforce Framework K0417: Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media)
DOD Cyber Workforce Framework K0444: Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP)
DOD Cyber Workforce Framework K0471: Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering)
DOD Cyber Workforce Framework K0516: Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.
DOD Cyber Workforce Framework K0565: Knowledge of the common networking and routing protocols (e.g., TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications
DOD Cyber Workforce Framework K0609: Knowledge of virtual machine technologies
DOD Cyber Workforce Framework K0610: Knowledge of virtualization products (VMware, Virtual PC)
DOD Cyber Workforce Framework S0073: Skill in using virtual machines
DOD Cyber Workforce Framework S0074: Skill in physically disassembling PCs
DOD Cyber Workforce Framework S0208: Skill in determining the physical location of network devices
Description

Objective:

The course objective is to provide foundational cyber knowledge to Defense Criminal Investigative Organizations (DCIO) cyberspace workforce elements and DoD personnel whose duties include the protection of DoD information systems from unauthorized and/or illegal access.

Learning Outcomes:

  • With the aid of references, virtually disassemble a personal computer (PC) and assemble it to an operational status to demonstrate both conceptual and procedural knowledge of physical computer components and architectures
  • Given virtual simulations, differentiate between the basic features, functions, and requirements of common operating systems
  • Using a variety of job aids, select the type of data transmissions for the appropriate networking protocol to establish a computer network
  • Given a scenario, summarize basic internet application and potential vectors of intrusion

General Topics:

  • Foundations
  • Introduction
  • Hardware Basics
  • Operating Systems
  • Software Basics
  • Networking
  • Architecture and Design
  • Vulnerability Vectors
  • Internet Applications
Instruction & Assessment

Instructional Strategies:

  • Audio Visual Materials
  • Case Studies
  • Classroom Exercise
  • Computer Based Training
  • Lectures
  • Practical Exercises

Methods of Assessment:

  • Case Studies
  • Examinations
  • Quizzes

Minimum Passing Score:

70%
Supplemental Materials