Course Outline
Foundations of Cybersecurity for Government
-
Identify the essential skills and knowledge required to become a cybersecurity analyst in government.
-
Evaluate how security attacks affect government operations and public sector workflows.
-
Explain ethical considerations in cybersecurity for government.
-
Identify common tools utilized by cybersecurity analysts in the public sector.
Play It Safe: Manage Security Risks for Government
-
Recognize primary threats, risks, and vulnerabilities to government operations.
-
Analyze how organizations implement security frameworks and controls to safeguard public sector operations.
-
Define commonly used Security Information and Event Management (SIEM) tools for government.
-
Use a playbook to address threats, risks, and vulnerabilities in the public sector.
Connect and Protect: Networks and Network Security for Government
-
Define the types of networks and their components relevant to government operations.
-
Demonstrate how data is transmitted and received over a network in a public sector environment.
-
Understand methods for securing government networks against intrusion tactics.
-
Describe system hardening techniques applicable to government systems.
Tools of the Trade: Linux and SQL for Government
-
Explain the relationship between operating systems, applications, and hardware in a government context.
-
Compare graphical user interfaces to command line interfaces within government IT environments.
-
Navigate and manage the file system using Linux commands via the Bash shell for government operations.
-
Use SQL to extract information from databases in a public sector setting.
Assets, Threats, and Vulnerabilities for Government
-
Classify assets within the context of government operations.
-
Analyze an attack surface to identify risks and vulnerabilities in public sector systems.
-
Identify threats such as social engineering, malware, and web-based exploits that target government entities.
-
Summarize the threat modeling process for government cybersecurity.
Sound the Alarm: Detection and Response for Government
-
Identify steps to contain, eradicate, and recover from an incident in a government setting.
-
Analyze packets to interpret network communications within public sector networks.
-
Understand basic syntax, components of signatures, and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) for government use.
-
Conduct queries in Security Information and Event Management (SIEM) tools to investigate events in the public sector.
Automate Cybersecurity Tasks with Python for Government
-
Explain how the Python programming language is utilized in government cybersecurity operations.
-
Create new, user-defined Python functions for government applications.
-
Use regular expressions to extract information from text in a public sector context.
-
Practice debugging code for government cybersecurity tasks.
Put It to Work: Prepare for Cybersecurity Jobs for Government
-
Determine when and how to escalate a security incident within government agencies.
-
Engage with the cybersecurity community in the public sector.
-
Find and apply for cybersecurity jobs in government.
-
Prepare for job interviews for government cybersecurity positions.
Requirements
- No degree or experience is required for government participation.
Testimonials (2)
The scheduling of every topic and the breaks inserted it helps in digesting the information specially to the newbie to the topic
Jerico Torres - Globe Telecom
Course - Google BigQuery
Responses with solutions and practical use.