National CAE Designated Institution
  • Classroom
Course Description

This lab-based course will provide students with an understanding of the threat vectors and exploitation techniques used to penetrate systems and networks. As businesses become more dependent on interconnected systems for survival, they recognize a need to train their own personnel in assessment, exploitation and remediation techniques. These teams are becoming vital to organizations, exposing vulnerabilities early, implementing remediation procedures and continually assessing the effectiveness of security strategies with an ever-changing threat landscape.

Learning Objectives

  1. Gain understanding of the threat vectors and exploitations used to penetrate products and networks
  2. Explore both classic and modern attacks and impacts
  3. Define the penetration testing process: domain definition, exploitation, impact assessment, remediation cycle
  4. Explore tools and techniques for exploiting vulnerabilities and assessing impact
  5. Determine effective remediation strategies
  6. Socialize penetration testing and assessment results
  7. Create a culture of security throughout an organization

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.