• Classroom
  • Online, Self-Paced
Course Description

Successful completion of this exam will demonstrate a candidate's ability to analyze exploits of different types of vulnerabilities of various services (protocols such as: HTTP, HTTPS, ICP, HTCP, WCCP, SOCKS, PHP, CGI, ODBC, HTML, and XML) and technologies (such as: Web Servers, Database Servers, Windows, Linux, and Embedded Devices). The candidate shall demonstrate the ability to recognize the toolkits, malicious code, and techniques used for exploitation. The candidate's understanding of the associated risks, effects, severity, and the prevention, mitigation, and recovery methods for different exploits will also be demonstrated.

Learning Objectives

Successful completion of this exam will demonstrate the candidate's ability to understand at a high level the methods in securing web services and preventing web services related attacks. The candidate shall be familiar with toolkits, malicious code, and techniques used for exploitation upon completion.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.