• Online, Self-Paced
Course Description

This course covers how common threat sources actually get exploited. You will learn about social engineering, exploit kits, ransomware, and much more.

Learning Objectives

Vulnerabilities and Exploits

  • start the course
  • describe what white hat hackers are and how they can help ameliorate the security of a business or product
  • describe what social engineering is and why it can be so dangerous
  • specify how phishing can affect the security of a business
  • recognize deceptive e-mail messages
  • describe how exploit kits can be used to take advantage of vulnerabilities in operating systems and applications
  • define ransomware attacks and how they can affect sensitive data
  • describe how the influence of governments in hacking incidents has become a large issue for IT security
  • specify how bug bounties can help result in more exploits being found and fixed
  • describe how web-based applications have gained more popularity and what implications for data security they have
  • describe how WAFs can protect web applications
  • list and define disaster recovery terms such as BCP, DRP, RTO, and RPO

 

Practice: Recalling Attack Details

  • describe how malicious users use tools to exploit vulnerabilities

 

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Infrastructure Support
  • Cyber Investigation
  • Cybersecurity Management
  • Exploitation Analysis
  • Vulnerability Assessment and Management

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.