• Classroom
Course Description
  • This course explores techniques used by hackers to access protected data.
  • Students will learn about cybercrime laws, penalties and organizations defending civil liberties of citizens.
  • Students will learn about the various methodologies hackers use to gain access to confidential data such stealthy network recon, passive traffic identification, etc.

Learning Objectives

  1. Evaluate cybercrimes and penalties and contrast cybercrimes with civil liberties of citizens in the digital world.
  2. Compare the different methods of attacks used by hackers to gain access to confidential data and describe them.
  3. Compare and contrast the different testing policies when performing a vulnerability assessment.
  4. Assess vulnerabilities on a network, obeying the rules of engagement.
  5. Write a formal report documenting the procedures used by an attacker attempting to gain access to confidential data.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Collection Operations
  • Cyber Defense Infrastructure Support
  • Network Services
  • Systems Administration

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.