This course explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this course will give information security professionals at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists.
Understand the history of warfare including cyber warfare
Implement the methods of attack used in cyber warfare
Implement strategies for defending endpoints, networks, and data
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.