Defensive Cyber Operations Engineer Training (DCOE)

Print Friendly, PDF & Email
Introduction

Defensive Cyber Operations Engineer Training (DCOE) Course Description

Learn the core set of skills needed for practical and dynamic cyber defense and set the foundation to become a CSFI-DCOE with this Defensive Cyber Operations Engineer Training (DCOE).

In this Defensive Cyber Operations Engineer Training (DCOE) course, you will acquire the skills for the planning, executing, and integrating defensive cyberspace operations (DCO) into organizational missions and DCO requirements.

The Defensive Cyber Operations Engineer Training (DCOE) course builds on the planning skills learned in the Introduction to Cyber Warfare and Operations Design (ICWOD) course. Adversarial use of tools and their associated techniques are presented to assess network vulnerabilities and to defend friendly networks against adversary threats.

The Defensive Cyber Operations Engineer Training (DCOE) course covers the use of open source tools and websites for system configuration, penetration testing, and control testing. You will use Linux and Windows command lines and unleash an attack on target servers and analyze the results. Attacks and analysis of will expose you to live attacks in a controlled environment where students can see first-hand the adversary realm of possible actions, how to detect, mitigate, and counter such activities.

Duration: 3 days

Defensive Cyber Operations Engineer Training (DCOE) Related Courses

 
Defensive Cyber Operations Engineer Training (DCOE) - Customize It!

• We can adapt this Defensive Cyber Operations Engineer Training (DCOE) course to your group’s background and work requirements at little to no added cost.
• If you are familiar with some aspects of this Defensive Cyber Operations Engineer Training (DCOE) course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Defensive Cyber Operations Engineer Training (DCOE) course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Defensive Cyber Operations Engineer Training (DCOE) course in manner understandable to lay audiences.

Audience / Target Group

• Anyone interested in the field of cyber warfare/cyber operations
• Anyone looking to expand a cyber-security career
• Military commanders
• Information-operations officers
• Information security/assurance professionals
• Cyber-security consultants
• Cyber planners
• Military members (J2, J3, J5, J6, J9)
• Security analysts
• Network-security engineers
• Penetration testers
• Auditors
• Government officials
• Security engineers

Defensive Cyber Operations Engineer Training (DCOE) - Objectives:

After completing this Defensive Cyber Operations Engineer Training (DCOE) course, attendees will be able to:

• Assess adversary intent and how threat vectors can support malicious intent
• How to counter known and emerging threat vectors
• Allocation and guidance for resource usage to counter adversary threats
• Integration of DCO into larger organizational constructs
• Deception methods
• Data exfiltration and defense against exfiltration methodologies

Defensive Cyber Operations Engineer Training (DCOE) - Course Content:

1. Operational Environment

• DCO Planning
• Cloud Operations
• Network Packet Capture and Data Exfiltration
• Windows and Linux Operating System Differences and Configurations
• Wireless Networks Operations and Access
• Open Source Tool Usage
• Network and Internet Reconnaissance

2. Defensive Methods

• Adversary Perspective of Target Selection
• Tool Capability and Countermeasure Planning
• Maltego
• Metasploit
• Social Engineering Toolkit (SET) Usage
• Defensive Tools for Network Threat Situational Awareness
• DS/IPS - Snort
• Honeypots
• Detection Avoidance
• Malware Analysis

3. Payload configuration and tool customization

• Target Selection to Support Adversarial Intent
• Tailoring Payloads to Adversary Intent
• Payload Detection Avoidance
• System Log Analysis
• Sensor Adjustments
• Payload Altering
• Current Threat Detection
• Emerging Threat detection

4. Web Application Defense

• SQL Injection
• Cross Site Scripting
• Local File Inclusion
• Remote File Inclusion
• Web Shells

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment

0