Course

Course Summary
Credit Type:
Course
ACE ID:
NNCS-5175
Organization's ID:
CYBR3422
Location:
Hybrid
Length:
73 days / 584 hours
Dates Offered:
Credit Recommendation & Competencies
Level Credits (SH) Subject
Graduate 3 Computer Networks
Graduate 3 Operating System Analysis and Management
Graduate 3 Cybersecurity and Threat Analysis
Graduate 3 Advanced Network Operations and Exploitation
Graduate 3 Network Security
Description

Objective:

The course objective is to provide a comprehensive level of technical concepts in computer network operations. Students develop technical competencies through the application of investigative skills and analytical knowledge to develop situational awareness within the digital networking environment.

Learning Outcomes:

  • triage a Windows machine to gather relevant information;
  • prosecute the gathered information on a Windows machine to collect additional information and/or take action;
  • analyze a UNIX machine in order to gain/obtain situational awareness;
  • triage a UNIX machine to gather relevant information;
  • prosecute the gathered information on a UNIX machine to collect additional information and/or take action;
  • evaluate a network in order to troubleshoot problems/issues;
  • perform packet capture analysis to identify anomalous issues;
  • analyze on-machine network configuration to differentiate normal and abnormal behavior;
  • remediate identified issues using data from a previous analysis;
  • triage a machine to which access has been gained using exploitation through tunnels;
  • configure forward and/or reverse tunnels and other redirection techniques to facilitate remote system access;
  • analyze a machine for threats to operations, including endpoint security products and malware.
  • analyze a Windows machine in order to gain and/or obtain situational awareness;

General Topics:

  • Introduction to CNOQC Network architecture and design Windows architecture and design Windows enumeration and hardening Windows triage and Interrogation UNIX architecture and design UNIX enumeration and hardening UNIX triage and interrogation Network enumeration and hardening Computer network exploitation theory Computer network exploitation techniques Live tactical forensics Security concepts
Instruction & Assessment

Instructional Strategies:

  • Audio Visual Materials
  • Case Studies
  • Computer Based Training
  • Practical Exercises

Methods of Assessment:

  • Case Studies
  • Examinations
  • Quizzes

Minimum Passing Score:

80%
Supplemental Materials