This course introduces methods for attacking and compromising various systems including authentication systems, passwords, networks, computers, people and peripheral devices (IoT). Students will develop skills necessary to participate in Red Team ethical hacking exercises and competitions. Prerequisite(s): IST 166 and CYB 110 or instructor approval
Learning Objectives
Explain the importance of information as a military asset.
Describe the targets and combatants of cyberwarfare.
Explain the role of law and ethics in cyberwarfare.
Describe intelligence operations in cyberwarfare.
Describe cyberwarfare attackers and the evolution of cyberwarfare techniques.
Describe the concept of defense-in-depth and various defense-in-depth strategies.
Explain how cryptography is used in cyberwar.
Explain how to attack/defend endpoints, networks, and data.
Explain how military doctrine guides the conduct of warfare.
Summarize what cyberwarfare may be like in the future.
Describe ethical hacking skills, techniques and tools.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.