• Online, Self-Paced
Course Description

The Hacker 101 module is designed to introduce students to the basic concepts of hacker activity, understand how to combat such activities, and learn how to reduce the risk of cyber-attacks by understanding the hacker mindset. The module covers reconnaissance before a hacker attack, exploiting a system and performing an attack, and post-exploit activities. The Secure Coding module teaches students how to reduce the cybersecurity risks associated with the systems under development by teaching students how to build resilient systems from the ground up. The module reviews common terms, web programming basics, and walks through a series of the most common CWEs. The module describe the issues associated with bad coding practices by explaining what they are, how they work, and how they can be avoided using a fictitious insecure banking application in addition to providing codes samples in various programming languages. The complete course provides the background needed for engineers to begin evaluating their systems from a cybersecurity perspective and to understand how various coding practices can make a system more vulnerable to attack.

Learning Objectives

  • Perform research and hacking activities to evaluate system security posture
  • Employ hacking techniques leveraging frameworks and command-line tools
  • Site examples of vulnerabilities that commonly occur in various types of applications, and resources for secure coding best practices
  • Detail programming basics and techniques for automated static code analysis

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Test and Evaluation
  • Exploitation Analysis
  • Cyber Defense Analysis
  • Software Development
  • Systems Development

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.