Course Outline
Lesson 1: Assessment of Information Security Risks for Government
- Topic A: The Importance of Risk Management in Government Operations
- Topic B: Assessing Risk within Government Systems
- Topic C: Mitigating Risk to Ensure Government Continuity
- Topic D: Integrating Documentation into Government Risk Management Processes
Lesson 2: Analyzing the Threat Landscape for Government
- Topic A: Classifying Threats and Threat Profiles in Government Environments
- Topic B: Performing Ongoing Threat Research for Government Agencies
Lesson 3: Computing and Network Environments: Analyzing Reconnaissance Threats for Government
- Topic A: Implementing Threat Modeling in Government Networks
- Topic B: Assessing the Impact of Reconnaissance on Government Systems
- Topic C: Assessing the Impact of Social Engineering on Government Operations
Lesson 4: Analyzing Attacks on Computing and Network Environments for Government
- Topic A: Assessing the Impact of System Hacking Attacks on Government Systems
- Topic B: Assessing the Impact of Web-Based Attacks on Government Networks
- Topic C: Assessing the Impact of Malware in Government Environments
- Topic D: Assessing the Impact of Hijacking and Impersonation Attacks on Government Systems
- Topic E: Assessing the Impact of DoS Incidents on Government Operations
- Topic F: Assessing the Impact of Threats to Mobile Security in Government Devices
- Topic G: Assessing the Impact of Threats to Cloud Security for Government Services
Lesson 5: Examining Post-Attack Techniques for Government
- Topic A: Examine Command and Control Techniques Used in Government Attacks
- Topic B: Examine Persistence Techniques in Government Systems
- Topic C: Examine Lateral Movement and Pivoting Techniques in Government Networks
- Topic D: Examine Data Exfiltration Techniques Targeting Government Data
- Topic E: Examine Anti-Forensics Techniques Used Against Government Agencies
Lesson 6: Managing Vulnerabilities in the Organization for Government
- Topic A: Implement a Vulnerability Management Plan for Government Systems
- Topic B: Examine Common Vulnerabilities in Government IT Environments
- Topic C: Conduct Vulnerability Scans on Government Networks and Assets
Lesson 7: Evaluating Security by Implementing Penetration Testing for Government
- Topic A: Conduct Penetration Tests on Government Network Assets
- Topic B: Follow Up on Penetration Testing Results for Government Agencies
Lesson 8: Collecting Cybersecurity Intelligence for Government
- Topic A: Deployment of a Security Intelligence Collection and Analysis Platform for Government Use
- Topic B: Data Collection from Network-Based Intelligence Sources for Government
- Topic C: Data Collection from Host-Based Intelligence Sources for Government
Lesson 9: Analyzing Log Data for Government
- Topic A: Common Tools to Analyze Logs in Government Environments
- Topic B: Using SIEM Tools for Analysis in Government Systems
Lesson 10: Performing Active Asset and Network Analysis for Government
- Topic A: Analyzing Incidents using Windows-Based Tools in Government Networks
- Topic B: Analyzing Incidents using Linux-Based Tools in Government Systems
- Topic C: Analyzing Malware within Government Environments
- Topic D: Analyzing Indicators of Compromise for Government Agencies
Lesson 11: Response to Cybersecurity Incidents for Government
- Topic A: Deployment of Incident Handling and Response Architecture in Government
- Topic B: Containment and Mitigation of Incidents within Government Systems
- Topic C: Preparation for Forensic Investigation as a CSIRT in Government Agencies
Lesson 12: Investigating Cybersecurity Incidents for Government
- Topic A: Using a Forensic Investigation Plan for Government Incidents
- Topic B: Securely Collecting and Analyzing Electronic Evidence in Government Environments
- Topic C: Following Up on the Results of an Investigation for Government Agencies
Requirements
To ensure your success in this course, you should meet the following requirements:
• At least two years (recommended) of experience or education in computer network security technology or a related field.
• The ability or curiosity to identify information security vulnerabilities and threats within the context of risk management for government operations.
• Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and virtual private networks (VPNs).
• General understanding of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
• Foundation-level skills with some of the common operating systems used in computing environments for government. Entry-level understanding of key concepts for network environments, such as routing and switching.
• General or practical knowledge of major TCP/IP networking protocols, including but not limited to, Transmission Control Protocol (TCP), Internet Protocol (IP), User Datagram Protocol (UDP), Domain Name System (DNS), Hypertext Transfer Protocol (HTTP), Address Resolution Protocol (ARP), Internet Control Message Protocol (ICMP), and Dynamic Host Configuration Protocol (DHCP).