• Classroom
Course Description

Students learn to perform and sustain computer network operations (CNO) using cyber attack methodologies and tactics similar to Advanced Persistent Threats (APTs) with open-source tools and the Metasploit exploitation framework. Two-weeks, instructor led. ACE-recommendation 3 undergraduate credit hours.

Learning Objectives

 

  • Define the Offensive Methodology.
  • Demonstrate basic familiarity with the phases of the Offensive Methodology.
  • Conduct offensive computer network operations (CNO) using the process, techniques, and concepts of the offensive methodology.
  • Analyze returned data to better determine the next steps.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.