Course Outline

Foundations of Cybersecurity for Government

  • Identify the essential skills and knowledge required to become a cybersecurity analyst in government.

  • Evaluate how security attacks affect government operations and public sector workflows.

  • Explain ethical considerations in cybersecurity for government.

  • Identify common tools utilized by cybersecurity analysts in the public sector.

Play It Safe: Manage Security Risks for Government

  • Recognize primary threats, risks, and vulnerabilities to government operations.

  • Analyze how organizations implement security frameworks and controls to safeguard public sector operations.

  • Define commonly used Security Information and Event Management (SIEM) tools for government.

  • Use a playbook to address threats, risks, and vulnerabilities in the public sector.

Connect and Protect: Networks and Network Security for Government

  • Define the types of networks and their components relevant to government operations.

  • Demonstrate how data is transmitted and received over a network in a public sector environment.

  • Understand methods for securing government networks against intrusion tactics.

  • Describe system hardening techniques applicable to government systems.

Tools of the Trade: Linux and SQL for Government

  • Explain the relationship between operating systems, applications, and hardware in a government context.

  • Compare graphical user interfaces to command line interfaces within government IT environments.

  • Navigate and manage the file system using Linux commands via the Bash shell for government operations.

  • Use SQL to extract information from databases in a public sector setting.

Assets, Threats, and Vulnerabilities for Government

  • Classify assets within the context of government operations.

  • Analyze an attack surface to identify risks and vulnerabilities in public sector systems.

  • Identify threats such as social engineering, malware, and web-based exploits that target government entities.

  • Summarize the threat modeling process for government cybersecurity.

Sound the Alarm: Detection and Response for Government

  • Identify steps to contain, eradicate, and recover from an incident in a government setting.

  • Analyze packets to interpret network communications within public sector networks.

  • Understand basic syntax, components of signatures, and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) for government use.

  • Conduct queries in Security Information and Event Management (SIEM) tools to investigate events in the public sector.

Automate Cybersecurity Tasks with Python for Government

  • Explain how the Python programming language is utilized in government cybersecurity operations.

  • Create new, user-defined Python functions for government applications.

  • Use regular expressions to extract information from text in a public sector context.

  • Practice debugging code for government cybersecurity tasks.

Put It to Work: Prepare for Cybersecurity Jobs for Government

  • Determine when and how to escalate a security incident within government agencies.

  • Engage with the cybersecurity community in the public sector.

  • Find and apply for cybersecurity jobs in government.

  • Prepare for job interviews for government cybersecurity positions.

Requirements

  • No degree or experience is required for government participation.
 35 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories