A comprehensive study of targeted cyberattacks, including advanced persistent threats. The aim is to plan and prepare for, respond to, and recover from targeted cyberattacks. Focus is on the phases of targeted cyberattacks and methods used by attackers during each phase. Topics include cyberattack prevention, mitigation, and response. Students may receive credit for only one of the following courses: CST 620 or CTCH 635.
Learning Objectives
Learners will master the following Cybersecurity Skills upon completion of the course.
Demonstrate proficiency in the use of scripting languages to write simple scripts (e.g., to automate system administration tasks)
Write simple linear and looping scripts
Analyze how security policies are implemented on systems to protect a network
Evaluate how network operational procedures relate to network security
Determine which cryptographic protocols, tools and techniques are appropriate for a given situation
Detail basic security issues of operating systems
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.