In this course, you will acquire the skills for the planning, executing, and integrating defensive cyberspace operations (DCO) into organizational missions and DCO requirements. The course builds on the planning skills learned in the Introduction to Cyber Warfare and Operations Design (ICWOD) course. Adversarial use of tools and their associated techniques are presented to assess network vulnerabilities and to defend friendly networks against adversary threats.
The course covers the use of open source tools and websites for system configuration, penetration testing, and control testing. You will use Linux and Windows command lines and unleash an attack on target servers and analyze the results. Attacks and analysis of will expose you to live attacks in a controlled environment where students can see first-hand the adversary realm of possible actions, how to detect, mitigate, and counter such activities.
Note: This course requires you to bring your own laptop preloaded with VMware Workstation 9 or 10.
In order to attain the DCOE certification, you must have an ICWOD completion certificate as well as pass the DCOE exam.
Assess adversary intent and how threat vectors can support malicious intent
How to counter known and emerging threat vectors
Allocation and guidance for resource usage to counter adversary threats
Integration of DCO into larger organizational constructs
Data exfiltration and defense against exfiltration methodologies
Who Can Benefit
Information operations officers
Information security / assurance professionals
Military members (J2, J3, J6)
Network security engineers
In order to attain the DCOE certification, students must have an ICWOD completion certificate as well as pass the DCOE exam
1. Operational Environment
Network Packet Capture and Data Exfiltration
Windows and Linux Operating System Differences and Configurations
Wireless Networks Operations and Access
Open Source Tool Usage
Network and Internet Reconnaissance
2. Defensive Methods
Adversary Perspective of Target Selection
Tool Capability and Countermeasure Planning
Social Engineering Toolkit (SET) Usage
Defensive Tools for Network Threat Situational Awareness
https://www.exitcertified.com/it-training/cisco/security/secure-access-control/csfi-defensive-cyber-operations-engineer-20039-detail.html9733CSFI: Defensive Cyber Operations Engineer (DCOE)https://assets.exitcertified.com/assets/CourseImages/68e40e673b/AdobeStock_268308133__FitMaxWzEwMDAsMTAwMF0.jpg2595.00USDInStock/Training/Cisco/Security/Secure Access ControlIn this course, you will acquire the skills for the planning, executing, and integrating defensive cyberspace operations (DCO)...2595.00CiscoClassroom2013-01-10T10:56:44+00:00USD