This course discusses the Plan, Brief, Execute, and Debrief process, which is part of a larger Military Decision-Making Process (MDMP). It discusses mission analysis, COA development, executing the mission, and gathering important lessons learned for debriefing an incident.
This course discusses the Plan, Brief, Execute, and Debrief process, which is part of a larger Military Decision-Making Process (MDMP). It discusses mission analysis, COA development, executing the mission, and gathering important lessons learned for debriefing an incident.
The Cyber Analyst (Basic) course facilitates an understanding of the special command-line tools and devices residing within the IT security suite. The tools taught in this course are vendor agnostic, open source tools that provide funtionality training. The course uses the Cyberoperations Enhanced Network & Training Simulators (CENTS) cyber range configurations. This course cover BASELINE to FUNCTIONAL training requirements, and it provides fundamental information required to perform as a Cyber Analyst. This course is a pre-requisite course for the Cyber Analyst and Range Engineer tracks of training.
Security testing is the primary job of the Vulnerability Assessor. The goal of the security test is for the assessor to test the system and evaluate and measure its potential vulnerabilities.
This course introduces the process and tools used to perform a vulnerability assessment using open-source, vulnerability assessment tools, such as Nmap, Nikto, OpenVAS and Wireshark.This topic provides an understanding of security through defense-in-depth and defines risks to our enterprise from breaches.
This topic is an overview of National and International regulations that drive our organization's cybersecurity policy framework.
In this topic, we discuss several management frameworks that will assist you in performing security operations.
Production Version 3.6
This course reviews one of our most important tools, Information!! In the topic, we'll discuss current events in the cybersecurity realm. We'll then discuss resources that are available for doing open-source research, or intelligence. Lastly, we'll display how the bad guy uses this same tool to enumerate a target.
Cyber teams, when responding to an incident, must properly plan for deployment on the network, execute that plan seamlessly, and brief and debrief stakeholders. This course explains the Planning, Briefing, Executing, and & Debriefing process, as used by the United States Air Force.
Some security is provided by limiting our public-facing IP space. By using NAT and/or proxy server techniques, we can mask the IP of our internal user. This topic is a deep-dive in the Network Address Translation, Port Address Translation and Proxying.
This course introduces you to the basic operation of the Internet, the key protocols, their uses, how they are typically exploited and how you can protect a network that requires the protocol.
We begin with a short discussion about how packets are structured in encapsulated layers on the Internet and what normal protocols look like in the protocol analysis tool Wireshark.
This course provides
an introduction to the concept of intrusion detection using Snort and Suricata,
two open-source Network Intrusion Detection System (NIDS). You will complete labs to familiarize yourself
with the sensor’s functionality, rule writing, and alerting on traffic.
This course provides an understanding of email log and header analysis, and it provides an overview of the use of DNS with email.
This topic is an introductory course in Malware Analysis and Monitoring. Discussions in the topic include the definition of different types of malware, the use of anti-virus, and what to do when under attack by malware.
This topic provides basic and intermediate training in the Structured Query Language (SQL), as well as the use of SQL injection (SQLi) as a means to break through defenses.
This course introduces you to basic concepts in a Cross-Site Scripting (XSS) attack. This is a very common and dangerous class of attacks involving web site vulnerabilities through the use of malicious code injection in a web page or application.
When you complete this course, you will understand the different types of XSS attacks, how they are used and what they are designed to achieve from an attacker’s viewpoint. The course also provides a discussion on detection and mitigation strategies.
This course is an introduction to Operational Technology (OT). The intended audience are students that want to understand Industrial Control Systems (ICS) and the convergence of IT/OT into the Industrialized Internet of Things (IIOT).
The course provides an introduction to ICS, the Purdue reference model for control systems, attacks on critical infrastructure and basic security design principles.
This course gives an introductory to intermediate view on the CyberCENTS Knowledge Center, and the integration with the Sentinel, Legion, Auto-build, Myrmidon and Reconstitution (SLAM-R) software and hardware systems.
This course provides information on the operation of the CENTS Capture-The-Flag scoring engine.
This course is designed to provide participants with an introduction to the CyberCENTS range and its incorporated tools sufficiently to conduct network mapping and discovery. This course provides additional basic system and network administration refresher information to support normal and maintenance operations in the CENTS environment.
This course gives an introductory view on the CyberCENTS range offerings, and the operation of the Sentinel, Legion, Auto-build, Myrmidon and Reconstitution (SLAM-R) software and hardware systems.
This space is used as a template for Military Exercises post April 2024.
This course walks the student through the Joint Event Life Cycle or JELC used by the US DoD. It is a tried and true exercise planning tool used by the military to properly plan, execute, and de-brief exercises.
This course provides educators and trainers with the information required to perform in the work role of Trainer and Educator.
This course is a template that may be used to create new courses using the lesson activity. Utilize this course along with the LMS Style Guide to ensure your course adheres to the design template to provide a consistent experience across the site.
In this block, add a course description that will be displayed on the main course list.
Include a course image below using the guidelines in the style guide.
This section is for collaboration of files and schedules for work with Leonardo UK.
This space is used as a template for Military Exercises post April 2024.