- This course explores techniques used by hackers to access protected data.
- Students will learn about cybercrime laws, penalties and organizations defending civil liberties of citizens.
- Students will learn about the various methodologies hackers use to gain access to confidential data such stealthy network recon, passive traffic identification, etc.
Learning Objectives
- Evaluate cybercrimes and penalties and contrast cybercrimes with civil liberties of citizens in the digital world.
- Compare the different methods of attacks used by hackers to gain access to confidential data and describe them.
- Compare and contrast the different testing policies when performing a vulnerability assessment.
- Assess vulnerabilities on a network, obeying the rules of engagement.
- Write a formal report documenting the procedures used by an attacker attempting to gain access to confidential data.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.