Successful completion of this exam will demonstrate a candidate's ability to conduct different types of offensive activities or capabilities (such as: Computer Network Attack and Computer Network Exploitation) and recognize the toolkits, malicious code, and techniques used. The candidate's understanding of the activities that, through the use of cyberspace, actively gather information from computers, information systems, or networks, or manipulate, disrupt, deny, degrade, or destroy targeted computers, information systems, or networks will also be demonstrated.
Successful completion of this exam will demonstrate the candidate's ability to infiltrate target computer networks to extract and gather intelligence data. The candidate shall be able to demonstrate techniques and processes that use computers or computer networks to penetrate targeted systems and networks. They shall also be able to demonstrate how to collect sensitive or confidential data, which is typically kept hidden and protected from the general public.
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.