Course

Course Summary
Credit Type:
Course
ACE ID:
SKIL-0222
Organization:
Location:
Online
Length:
26.5 hours and 8 lab hours
Dates Offered:
Credit Recommendation & Competencies
Level Credits (SH) Subject
Lower-Division Baccalaureate 2 cybersecurity
Description

Objective:

The course objective is to explore security programming, malware removal, and network survey and extractions. It will also cover defensive CyberOps, network and host analysis, forensic analysis, and threat intelligence and attribution best practices.

Learning Outcomes:

  • program and script for security operations
  • explore best practices for identifying, classifying, and removing malware
  • understand the basics of defensive CyberOps
  • discover Windows exploits and forensics
  • explore the differences between Defensive Cyber Operations (DCO) and Offensive Cyber Operations (OCO), as well as the tasks performed by each
  • discover the Cyber Operations Cycle and its phases, and the responsibilities of each role member of the offensive and defensive teams
  • describe the best practices for network survey and extraction
  • explore CyberOps network and host analysis, forensics analysis, windows device hardening, and threat intellence attribution best practices
  • discover Linux exploits and mitigation controls.

General Topics:

  • Introduction to cyber operations
  • Security programming: command line essentials
  • Security programming: code identification
  • Security programming: scripting essentials
  • Security programming: system essentials
  • Malware removal: identifying malware types and classification approaches
  • Malware removal: analyzing an infected system
  • Malware removal: remediating an infected system
  • Malware removal: reporting findings and preventing future infections
  • Network survey and extraction: network analysis
  • Network survey and extraction: network monitoring
  • Network and host analysis: protocol analysis
  • Network and host analysis: network protocols
  • Network and host analysis: network observations
  • Network and host analysis: network analysis formats
  • Network and host analysis: network operations
  • Forensic analysis: cybercrime investigations
  • CyberOps Windows hardening: Windows server hardening best practices
  • CyberOps Windows hardening: Windows workstation hardening best practices
  • Threat intelligence and attribution best practices: threat intelligence concepts
  • Threat intelligence and attribution best practices: attribution analysis
Instruction & Assessment

Instructional Strategies:

  • Computer Based Training
  • Laboratory
  • Practical Exercises

Methods of Assessment:

  • Examinations
  • Quizzes

Minimum Passing Score:

70%
Supplemental Materials