Course Outline

 Module 1: Security Concepts

  • Explain the CIA triad and its relevance for government security practices.
  • Evaluate different security deployment strategies to enhance protection for government systems.
  • Define key security terms and their application in government contexts.
  • Distinguish between various security concepts and their implications for government operations.
  • Outline the principles of the defense-in-depth strategy as it pertains to securing government information.
  • Compare different access control models used for government data management.
  • Describe terms defined in CVSS and their significance for assessing vulnerabilities in government systems.
  • Identify challenges related to data visibility (network, host, and cloud) in the detection of security incidents for government networks.
  • Determine potential data loss from provided traffic profiles within government environments.
  • Analyze the 5-tuple approach to isolate a compromised host in a grouped set of logs for government systems.
  • Contrast rule-based detection with behavioral and statistical detection methods used in government cybersecurity.

 Module 2: Security Monitoring

  • Differentiate between attack surface and vulnerability assessments for government security monitoring.
  • Identify the types of data provided by various technologies used in government security operations.
  • Explain how these technologies impact data visibility in government networks.
  • Discuss the uses of different data types in security monitoring for government agencies.
  • Describe network attacks such as protocol-based, denial of service, distributed denial of service, and man-in-the-middle, focusing on their implications for government systems.
  • Explain web application attacks like SQL injection, command injections, and cross-site scripting in the context of government websites.
  • Outline social engineering attacks and their potential impact on government personnel and operations.
  • Describe endpoint-based attacks such as buffer overflows, command and control (C2), malware, and ransomware for government endpoints.
  • Explain evasion and obfuscation techniques like tunneling, encryption, and proxies in the context of government network security.
  • Discuss the impact of certificates on security for government communications, including PKI, public/private key exchange, and symmetric/asymmetric encryption.
  • Identify certificate components in a given scenario within government systems.

 Module 3: Host-Based Analysis

  • Explain the functionality of endpoint technologies in regard to security monitoring for government networks.
  • Identify components of an operating system (such as Windows and Linux) in a given scenario within government environments.
  • Describe the role of attribution in investigations for government cybersecurity incidents.
  • Determine the type of evidence used based on provided logs for government security analysis.
  • Compare tampered and untampered disk images in the context of government forensic investigations.
  • Analyze operating system, application, or command line logs to identify an event in government systems.
  • Interpret the output report of a malware analysis tool (such as a detonation chamber or sandbox) for government security purposes.

 Module 4: Network Intrusion Analysis

  • Map provided events to source technologies in government network environments.
  • Evaluate the impact and no-impact scenarios for various items in government cybersecurity.
  • Compare deep packet inspection with packet filtering and stateful firewall operation in government networks.
  • Contrast inline traffic interrogation and taps or traffic monitoring methods used in government security.
  • Distinguish between the characteristics of data obtained from taps or traffic monitoring and transactional data (NetFlow) in the analysis of network traffic for government systems.
  • Extract files from a TCP stream when given a PCAP file and Wireshark, tailored to government cybersecurity needs.
  • Identify key elements in an intrusion from a given PCAP file within government networks.
  • Analyze the fields in protocol headers as they relate to intrusion analysis for government systems.
  • Interpret common artifact elements from an event to identify an alert in government cybersecurity operations.
  • Understand and apply basic regular expressions for government security monitoring.

 Module 5: Security Policies and Procedures

  • Explain management concepts relevant to government security practices.
  • Describe the elements of an incident response plan as stated in NIST.SP800-61 for government agencies.
  • Apply the incident handling process (such as NIST.SP800-61) to a specific event in government operations.
  • Map elements to these steps of analysis based on the NIST.SP800-61 guidelines for government cybersecurity.
  • Map organization stakeholders against the NIST IR categories (CMMC, NIST.SP800-61) in government settings.
  • Explain concepts as documented in NIST.SP800-86 and their application for government security.
  • Identify elements used for network profiling in government systems.
  • Identify elements used for server profiling in government environments.
  • Identify protected data within a government network to ensure compliance with regulations.
  • Classify intrusion events into categories as defined by security models, such as the Cyber Kill Chain Model and Diamond Model of Intrusion, for government incident response.
  • Describe the relationship between SOC metrics (time to detect, time to contain, time to respond, time to control) and scope analysis in government cybersecurity operations.

Requirements

Before participating in this course, participants should possess the following knowledge and skills:

  • An understanding of Ethernet and TCP/IP networking for government operations.
  • Practical experience with the Windows and Linux operating systems.
  • A foundational knowledge of networking security principles.
 35 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories