award icon svg Certificate

Course Outline

DOMAIN 1: CYBERSECURITY CONCEPTS

  • 1.1 Knowledge of information assurance (IA) principles used to manage risks related to the use, processing, storage, and transmission of information or data for government.
  • 1.2 Knowledge of security management practices.
  • 1.3 Knowledge of risk management processes, including steps and methods for assessing risk in a public sector environment.
  • 1.4 Knowledge of the organization’s enterprise information technology (IT) goals and objectives as they pertain to government operations.
  • 1.5 Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non-nation state sponsored] and third generation [nation state sponsored]).
  • 1.6 Knowledge of information assurance (IA) principles and organizational requirements that are relevant to confidentiality, integrity, availability, authentication, and non-repudiation.
  • 1.7 Knowledge of common adversary tactics, techniques, and procedures (TTPs) in assigned areas of responsibility (e.g., historical country-specific TTPs, emerging capabilities).
  • 1.8 Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution).
  • 1.9 Knowledge of relevant laws, policies, procedures, and governance requirements for government.
  • 1.10 Knowledge of relevant laws, policies, procedures, or governance as they relate to work that may impact critical infrastructure for government.

DOMAIN 2: CYBERSECURITY ARCHITECTURE PRINCIPLES

  • 2.1 Knowledge of network design processes, including understanding of security objectives, operational objectives, and tradeoffs in a public sector context.
  • 2.2 Knowledge of security system design methods, tools, and techniques for government.
  • 2.3 Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]) for government systems.
  • 2.4 Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption) applicable to government operations.
  • 2.5 Knowledge of current industry methods for evaluating, implementing, and disseminating IT security assessment, monitoring, detection, and remediation tools and procedures, utilizing standards-based concepts and capabilities for government.
  • 2.6 Knowledge of network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defence in depth) for government networks.
  • 2.7 Knowledge of malware analysis concepts and methodology for government systems.
  • 2.8 Knowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologies for government environments.
  • 2.9 Knowledge of defence in depth principles and network security architecture for government networks.
  • 2.10 Knowledge of encryption algorithms (e.g., internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE]) for government use.
  • 2.11 Knowledge of cryptology principles and practices for government applications.
  • 2.12 Knowledge of encryption methodologies suitable for government systems.
  • 2.13 Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP], Open System Interconnection model [OSI]) in a government context.
  • 2.14 Knowledge of network protocols (e.g., Transmission Control Protocol and Internet Protocol) for government networks.

DOMAIN 3: SECURITY OF NETWORK, SYSTEM, APPLICATION, AND DATA

  • 3.1 Knowledge of computer network defence (CND) and vulnerability assessment tools, including open source tools, and their capabilities in a government context.
  • 3.2 Knowledge of basic system administration, network, and operating system hardening techniques for government systems.
  • 3.3 Knowledge of risks associated with virtualizations in government environments.
  • 3.4 Knowledge of penetration testing principles, tools, and techniques (e.g., metasploit, neosploit) suitable for government use.
  • 3.5 Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools for government networks.
  • 3.6 Knowledge of remote access technology concepts in a government context.
  • 3.7 Knowledge of systems administration concepts applicable to government operations.
  • 3.8 Knowledge of Unix command line for government systems.
  • 3.9 Knowledge of system and application security threats and vulnerabilities in a government environment.
  • 3.10 Knowledge of system lifecycle management principles, including software security and usability, for government applications.
  • 3.11 Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability in a government context.
  • 3.12 Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code) in government systems.
  • 3.13 Knowledge of social dynamics of computer attackers in a global context relevant to government operations.
  • 3.14 Knowledge of secure configuration management techniques for government systems.
  • 3.15 Knowledge of capabilities and applications of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware for government networks.
  • 3.16 Knowledge of communication methods, principles, and concepts that support the network infrastructure in a government context.
  • 3.17 Knowledge of common networking protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP]) and services (e.g., web, mail, Domain Name System [DNS]) and how they interact to provide network communications for government systems.
  • 3.18 Knowledge of different types of network communication (e.g., Local Area Network [LAN], Wide Area Network [WAN], Metropolitan Area Network [MAN], Wireless Local Area Network [WLAN], Wireless Wide Area Network [WWAN]) in a government context.
  • 3.19 Knowledge of virtualization technologies and virtual machine development and maintenance for government systems.
  • 3.20 Knowledge of application vulnerabilities in a government environment.
  • 3.21 Knowledge of information assurance (IA) principles and methods that apply to software development for government applications.
  • 3.22 Knowledge of risk threat assessment for government systems.

DOMAIN 4: INCIDENT RESPONSE

  • 4.1 Knowledge of incident categories, responses, and timelines for responses in a government context.
  • 4.2 Knowledge of disaster recovery and continuity of operations plans for government systems.
  • 4.3 Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools for government use.
  • 4.4 Knowledge of incident response and handling methodologies suitable for government environments.
  • 4.5 Knowledge of security event correlation tools for government systems.
  • 4.6 Knowledge of investigative implications of hardware, operating systems, and network technologies in a government context.
  • 4.7 Knowledge of processes for seizing and preserving digital evidence (e.g., chain of custody) for government investigations.
  • 4.8 Knowledge of types of digital forensics data and how to recognize them in a government environment.
  • 4.9 Knowledge of basic concepts and practices of processing digital forensic data for government use.
  • 4.10 Knowledge of anti-forensics tactics, techniques, and procedures (TTPs) relevant to government investigations.
  • 4.11 Knowledge of common forensic tool configuration and support applications (e.g., VMWare, Wireshark) for government use.
  • 4.12 Knowledge of network traffic analysis methods suitable for government systems.
  • 4.13 Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files in a government context.

DOMAIN 5: SECURITY OF EVOLVING TECHNOLOGY

  • 5.1 Knowledge of new and emerging information technology (IT) and information security technologies for government use.
  • 5.2 Knowledge of emerging security issues, risks, and vulnerabilities in a government context.
  • 5.3 Knowledge of risks associated with mobile computing for government operations.
  • 5.4 Knowledge of cloud concepts around data and collaboration for government systems.
  • 5.5 Knowledge of risks of moving applications and infrastructure to the cloud for government use.
  • 5.6 Knowledge of risks associated with outsourcing in a government context.
  • 5.7 Knowledge of supply chain risk management processes and practices for government systems.

Requirements

There are no established prerequisites for attending this course for government professionals.

 28 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories