Students learn to perform and sustain computer network operations (CNO) using cyber attack methodologies and tactics similar to Advanced Persistent Threats (APTs) with open-source tools and the Metasploit exploitation framework. This course is an abridged version of the Offensive Methodology & Analysis (OMA) course focusing on Windows exploitation and analysis. One-week, instructor led.
- Define the Offensive Methodology.
- Demonstrate basic familiarity with the phases of the Offensive Methodology.
- Conduct offensive computer network operations (CNO) against Windows systems using the process, techniques, and concepts of the offensive methodology.
- Analyze returned data to better determine the next steps.
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.