Course

Course Summary
Credit Type:
Course
ACE ID:
NNCS-5175
Organization's ID:
CYBR3422
Location:
Classroom-based
Length:
65 days (520 hours)
Dates Offered:
Credit Recommendation & Competencies
Level Credits (SH) Subject
Graduate 3 Cyberspace and Cybersecurity Foundations
Graduate 3 Network Architectures
Graduate 3 Penetration Testing and Vulnerability Analysis
Graduate 3 Advanced Cyber Exploitation and Mitigation Methodologies
Graduate 3 Operating System Architecture
This course is recommended for a total of 15 semester hours at the graduate level.
Description

Objective:

The course objective is to provide a review of and build upon a range of technical topics in defensive and offensive cyberspace operations. Given the required high proficiency with technical competencies that students must have prior to coming into the course, it is expected that students have experience or at least some prior exposure to 50%-55% of the material they encounter in CNOQC. The course provides the in-depth and practical application needed to proficiently identify, understand, and navigate the digital environment; utilize a given set of tools to develop situational awareness within the digital environment; understand network operations methodologies; and demonstrate strategic practical application. Throughout CNOQC, students are expected to build upon their existing Networking, Windows, and Unix knowledge and to attain any of the few technical knowledge domains in these topics areas that they were not proficient with prior to entering the course. In addition, students will develop new technical competencies in the area of Security Concepts. CNOQC solidifies, and builds upon, the scholastic foundation of technical competencies needed in order for the student to successfully continue with the interactive operator training pipeline.

Learning Outcomes:

  • Analyze a Windows machine in order to gain/obtain situational awareness
  • Triage a UNIX machine to gather relevant information
  • Evaluate a network in order to troubleshoot problems/issues
  • Perform packet capture analysis to identify anomalous issues
  • Remediate identified issues using data from a previous analysis
  • Configure forward and/or reverse tunnels and other redirection techniques to facilitate remote system access
  • Triage a Windows machine to gather relevant information
  • Prosecute the gathered information on a Windows machine to collect additional information and/or take action
  • Analyze a UNIX machine in order to gain/obtain situational awareness
  • Prosecute the gathered information on a UNIX machine to collect additional information and/or take action
  • Analyze on-machine network configuration to differentiate normal and abnormal behavior
  • Triage a machine to which access has been gained using exploitation through tunnels
  • Analyze a machine for threats to operations, including endpoint security products and malware
Instruction & Assessment

Instructional Strategies:

  • Audio Visual Materials
  • Case Studies
  • Computer Based Training
  • Practical Exercises

Methods of Assessment:

  • Case Studies
  • Examinations
  • Quizzes

Minimum Passing Score:

83%
Supplemental Materials