Course Section 1 Content Section 1 Content Left Section 1 Content Right Credit Type: Course ACE ID: NNCS-5175 Version: 4 Organization's ID: CYBR3422 Organization: National Cryptologic University Location: Hybrid Length: 73 days / 584 hours Minimum Passing Score: 80 ACE Credit Recommendation Period: 8/1/2024 - 7/31/2027 5/1/2021 - 7/31/2024 5/1/2017 - 4/30/2021 5/1/2016 - 4/30/2017 Credit Recommendation & Competencies Section 2 Content Section 2 Content Left Section 2 Content Right Level Credits (SH) Subject Graduate 3 Computer Networks Graduate 3 Operating System Analysis and Management Graduate 3 Cybersecurity and Threat Analysis Graduate 3 Advanced Network Operations and Exploitation Graduate 3 Network Security Description Section 3 Content Section 3 Content Left Section 3 Content Right Objective: The course objective is to provide a comprehensive level of technical concepts in computer network operations. Students develop technical competencies through the application of investigative skills and analytical knowledge to develop situational awareness within the digital networking environment. Learning Outcomes: triage a Windows machine to gather relevant information; prosecute the gathered information on a Windows machine to collect additional information and/or take action; analyze a UNIX machine in order to gain/obtain situational awareness; triage a UNIX machine to gather relevant information; prosecute the gathered information on a UNIX machine to collect additional information and/or take action; evaluate a network in order to troubleshoot problems/issues; perform packet capture analysis to identify anomalous issues; analyze on-machine network configuration to differentiate normal and abnormal behavior; remediate identified issues using data from a previous analysis; triage a machine to which access has been gained using exploitation through tunnels; configure forward and/or reverse tunnels and other redirection techniques to facilitate remote system access; analyze a machine for threats to operations, including endpoint security products and malware. analyze a Windows machine in order to gain and/or obtain situational awareness; General Topics: Introduction to CNOQC Network architecture and design Windows architecture and design Windows enumeration and hardening Windows triage and Interrogation UNIX architecture and design UNIX enumeration and hardening UNIX triage and interrogation Network enumeration and hardening Computer network exploitation theory Computer network exploitation techniques Live tactical forensics Security concepts Instruction & Assessment Section 4 Content Section 4 Content Left Section 4 Content Right Instructional Strategies: Audio Visual Materials Case Studies Computer Based Training Practical Exercises Methods of Assessment: Case Studies Examinations Quizzes Supplemental Materials Section 5 Content Section 5 Content Left Section 5 Content Right Equivalencies Section 6 Content Section 6 Content Left Section 6 Content Right Button Content Rail Content 1 Other offerings from National Cryptologic University View All Courses College Credit Opportunities> Page Content