This course is only available to Military and Law Enforcement Agencies. This course can be customized further for specific groups needs.
Integrating logs/ SIEM
MITRE Corporation ATT&CK model
Graph Theory for Modeling
Dark Web Investigations
Background on TOR
Overview of current markets
Case studies of web site takedowns
Step by step guide to investigations on the dark web
Zero Day Exploits
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.