• Online, Self-Paced
Course Description

The course introduces the automated information systems (AIS) environment and the threats and vulnerabilities faced when working within the government or defense industrial systems. It provides a working knowledge of cyber intrusion methods and cybersecurity countermeasures to assist employees in preventing cyber attacks and protecting their systems and information.

Learning Objectives

• Identify the key indicators of the cyber threat:
- Spear phishing and spoofed emails
- Emails with malicious links or attachments
- Stolen logon credentials
- Use of weak or default passwords
- Unpatched or outdated software vulnerabilities
- Removable media
- Website vulnerabilities
• Identify countermeasures to safeguard against cyber threats
• Recognize the types of suspicious cyber events and behaviors that should be reported and identify how to report them

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Threat Analysis
  • Training, Education, and Awareness
  • Cybersecurity Management

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.