Getting into the deeper concepts of network defense require security researchers to get their hands a little dirty. By tearing apart malware after executing it, students will gain an appreciation for the inner workings of not just the motive of cyber attackers, but their TTPs as well. This course will use adversary emulation to push the capabilities of the students defense mechanisms to break them down, but for the purpose of building them back stronger.
Shadowscape
802 W. Bannock St.
Suite 1005
Boise, ID 83702
NET-I or equivalent is strongly recommended
This course will teach students intermediate network defense concepts such as defensive network architecture, security operations, introductory threat hunting, malware analysis and intel-driven digital forensics incident response. This course will guide students through operational network defense, examining network traffic flow, attack indicators, vulnerability analysis and much, much mode. Students should expect to have a firm grasp on intermediate network defense concepts by the end of this course.
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.