Course Outline

Foundations of Cybersecurity

  • Identify the essential skills and knowledge required to become a cybersecurity analyst for government operations.

  • Evaluate how security breaches can affect business and governmental operations.

  • Explain the principles of security ethics in the context of public sector responsibilities.

  • Identify common tools utilized by cybersecurity analysts for government tasks.

Play It Safe: Manage Security Risks

  • Identify the primary threats, risks, and vulnerabilities to business and governmental operations.

  • Examine how organizations implement security frameworks and controls to safeguard their operations for government purposes.

  • Define commonly used Security Information and Event Management (SIEM) tools in the public sector.

  • Utilize a playbook to effectively respond to threats, risks, and vulnerabilities in governmental contexts.

Connect and Protect: Networks and Network Security

  • Define the various types of networks and their components for government use.

  • Illustrate how data is transmitted and received over a network in governmental systems.

  • Understand methods to secure networks against intrusion tactics for government operations.

  • Describe system hardening techniques applicable to public sector environments.

Tools of the Trade: Linux and SQL

  • Explain the relationship between operating systems, applications, and hardware for government IT infrastructure.

  • Compare a graphical user interface to a command line interface in the context of public sector computing.

  • Navigate and manage the file system using Linux commands via the Bash shell for government tasks.

  • Use SQL to extract information from databases for government operations.

Assets, Threats, and Vulnerabilities

  • Classify assets within the context of public sector operations.

  • Analyze an attack surface to identify risks and vulnerabilities for government systems.

  • Identify threats, such as social engineering, malware, and web-based exploits in governmental contexts.

  • Summarize the threat modeling process for government applications.

Sound the Alarm: Detection and Response

  • Identify the steps to contain, eradicate, and recover from an incident in governmental settings.

  • Analyze packets to interpret network communications for government security.

  • Understand basic syntax, components of signatures, and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools for government use.

  • Perform queries in Security Information and Event Management (SIEM) tools to investigate an event for government purposes.

Automate Cybersecurity Tasks with Python

  • Explain how the Python programming language is utilized in cybersecurity for government operations.

  • Create new, user-defined Python functions for governmental tasks.

  • Use regular expressions to extract information from text in a governmental context.

  • Practice debugging code for government cybersecurity applications.

Put It to Work: Prepare for Cybersecurity Jobs

  • Determine when and how to escalate a security incident in governmental settings.

  • Engage with the cybersecurity community, particularly those focused on public sector issues.

  • Find and apply for cybersecurity jobs within government agencies.

  • Prepare for job interviews in the governmental cybersecurity field.

Requirements

  • No specific degree or prior experience is required for government positions in this category.
 35 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories