National CAE Designated Institution
  • Classroom
Course Description

This lab-based course will introduce students to modern defensive skills required to counteract cyber threats. You will use live equipment and virtual machines representing blue forces tasked to negate real-world threats against systems and networks. Instructors will place particular emphasis on modeling current attack chains and the various techniques used to detect their tell-tale signatures.

Learning Objectives

  1. Gain understanding of prevention/detection and response/forensic tools.
  2. Develop the ability to identify Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs).
  3. Map defensive technology capabilities.
  4. Determine effective remediation strategies.
  5. Learn about the three tiers of capability/visibility: perimeter monitoring, internal network monitoring, and endpoint monitoring..

Framework Connections

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.