Course Outline

Lesson 1: Assessment of Information Security Risks

  • Topic A: The Importance of Risk Management for Government
  • Topic B: Assessing Risk for Government Operations
  • Topic C: Mitigating Risk for Government Systems
  • Topic D: Integrating Documentation into Risk Management for Government

Lesson 2: Analyzing the Threat Landscape

  • Topic A: Classifying Threats and Threat Profiles for Government
  • Topic B: Performing Ongoing Threat Research for Government

Lesson 3: Computing and Network Environments: Analyzing Reconnaissance Threats

  • Topic A: Implementing Threat Modeling for Government Networks
  • Topic B: Assessing the Impact of Reconnaissance on Government Systems
  • Topic C: Assessing the Impact of Social Engineering on Government Operations

Lesson 4: Analyzing Attacks on Computing and Network Environments

  • Topic A: Assessing the Impact of System Hacking Attacks for Government
  • Topic B: Assessing the Impact of Web-Based Attacks for Government
  • Topic C: Assessing the Impact of Malware for Government Systems
  • Topic D: Assessing the Impact of Hijacking and Impersonation Attacks for Government
  • Topic E: Assessing the Impact of Denial of Service (DoS) Incidents for Government
  • Topic F: Assessing the Impact of Threats to Mobile Security for Government Devices
  • Topic G: Assessing the Impact of Threats to Cloud Security for Government

Lesson 5: Examining Post-Attack Techniques

  • Topic A: Examine Command and Control Techniques in Government Environments
  • Topic B: Examine Persistence Techniques for Government Systems
  • Topic C: Examine Lateral Movement and Pivoting Techniques in Government Networks
  • Topic D: Examine Data Exfiltration Techniques for Government Information
  • Topic E: Examine Anti-Forensics Techniques for Government Investigations
  • Lesson 6: Managing Vulnerabilities in the Organization
  • Topic A: Implementing a Vulnerability Management Plan for Government
  • Topic B: Examining Common Vulnerabilities in Government Systems
  • Topic C: Conducting Vulnerability Scans for Government Networks

Lesson 7: Evaluating Security by Implementing Penetration Testing

  • Topic A: Conducting Penetration Tests on Network Assets for Government
  • Topic B: Following Up on Penetration Testing for Government Systems

Lesson 8: Collecting Cybersecurity Intelligence

  • Topic A: Deploying a Security Intelligence Collection and Analysis Platform for Government
  • Topic B: Data Collection from Network-Based Intelligence Sources for Government
  • Topic C: Data Collection from Host-Based Intelligence Sources for Government

Lesson 9: Analyzing Log Data

  • Topic A: Common Tools to Analyze Logs for Government
  • Topic B: Using SIEM Tools for Analysis in Government Environments

Lesson 10: Performing Active Asset and Network Analysis

  • Topic A: Analyzing Incidents using Windows-Based Tools for Government
  • Topic B: Analyzing Incidents using Linux-Based Tools for Government
  • Topic C: Analyzing Malware in Government Systems
  • Topic D: Analyzing Indicators of Compromise for Government Networks

Lesson 11: Responding to Cybersecurity Incidents

  • Topic A: Deploying Incident Handling and Response Architecture for Government
  • Topic B: Containing and Mitigating Incidents in Government Systems
  • Topic C: Preparing for Forensic Investigation as a CSIRT for Government

Lesson 12: Investigating Cybersecurity Incidents

  • Topic A: Using a Forensic Investigation Plan for Government
  • Topic B: Securely Collecting and Analyzing Electronic Evidence for Government
  • Topic C: Following Up on the Results of an Investigation for Government

Requirements

To ensure your success in this course, you should meet the following requirements: - A minimum of two years (recommended) of experience or education in computer network security technology, or a related field. - The ability or curiosity to identify information security vulnerabilities and threats within the context of risk management. - Foundational knowledge of the principles and operational frameworks of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and virtual private networks (VPNs). - General understanding of the principles and operational frameworks of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms. - Basic skills with some of the common operating systems used in computing environments. Entry-level knowledge of fundamental concepts for network environments, such as routing and switching. - General or practical knowledge of major TCP/IP networking protocols, including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP. These requirements are designed to align with the standards and practices for government cybersecurity initiatives.
 35 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories