Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

CSFI: Defensive Cyberspace Operations Engineer (DCOE)

Develop cyberspace operations skills and obtain a DCO-based certification.

GK# 9733

Course Overview

TOP

In this course from the Cyber Security Forum Initiative (CSFI), students will develop the skills for planning, executing, and integrating defensive cyberspace operations (DCO) into organizational missions in support of DCO requirements. This course builds upon the planning skills learned in the Introduction to Cyber Warfare and Operations Design (ICWOD) course. Adversarial tactics, techniques, and procedures (TTPs) and their use of associated tools are presented following the cyber kill chain for students to learn to defend friendly networks against current and emerging threats.

Using multiple labs, this course will provide students with hands-on exposure to deploy live attacks and analysis in a controlled environment to then learn how to prevent, detect, and counter such activities.

Note: This course requires students to bring their own laptop preloaded with VMware Workstation 9 or 10.

In order to attain the DCOE certification, students must pass the DCOE exam (open-book, included as part of the course).

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

Class is Full
This session is full. Please select a different session.

What You'll Learn

TOP
  • Elements of Cyberspace Operations and components of the Cyber Mission Force
  • Application and analysis of the Cyber Kill Chain
  • Methods and sources for threat intelligence and information sharing
  • Popular tools of the trade
  • Deception methods and reconnaissance
  • The importance of having a solid plan before execution and lessons learned
  • Defense of networks and systems through simulated attacks, including data exfiltration
  • Persistent, integrated operations
  • Network protection

 

Outline

TOP
Viewing outline for:

Classroom Live Outline

  • Cyberspace Operations and Cyber Mission Force
    • Cyberspace as a Warfighting Domain
    • The Operating Environment
    • Cyberspace Militarization
    • DoD Cyber Strategy
    • Cyberspace Operations (NetOps, DODIN-OPS, DCO, DCO-IDM, DCO-RA, OCO)
    • CMF Construct – CPT, NMT, CMT
    • CPT Methodology (Survey, Secure, Protect)
  • Cyber Kill Chain
    • Steps of the Cyber Kill Chain
    • Stages of an Attack
    • Case Study: Data Breach and Lessons Learned
    • Threat Intelligence Sharing

  • Kali Linux
    • Cyber Tradecraft
    • Installation
    • Command Line Tasks
    • Navigating Kali

  • Reconnaissance (Passive and Active)
    • CIA’s MICE Motivational Framework
    • Open Source Intelligence (OSINT) – Common Tools
    • Information Sources
    • Case Study: Social Media Experiment
    • Reconnaissance with Kali Linux
    • Network Scanning
    • SQL Mapping

  • PBED Framework
    • Plan – ME3C-(PC)2 Model
    • Brief
    • Execute
    • Debrief
    • PBED Exercise

  • Attack Across Networks and Systems
    • Web Application Vulnerabilities
    • Cross-Site Scripting (XSS)
    • SQL Injection (SQLI)
    • Webshell
    • Wireless Threats
    • Network Exploitation
    • Conducting Attacks with Metasploit
    • Password Cracking
  • Persistent, Integrated Operation
    • Command and Control (C2): Maintaining Access
    • Rootkits
    • Tunneling
    • Remote Access
    • Elevated Privileges
    • Covert Channels
    • Covering Tracks: Hiding Evidence
    • Altering Logs and History Files
    • Hidden Files
    • Timestamps
  • Network Protection
    • Network Traffic Analysis
    • Vulnerability Scanning
    • Intrusion Detection System (IDS) and Intrusion Protection System (IPS)

 

Labs

TOP
Viewing labs for:

Classroom Live Labs

  • Lab 01: Navigating Kali Linux
  • Lab 02: Network Mapping
  • Lab 03: Python Scripting: Scanning and Brute Force
  • Lab 04: PBED Exercise
  • Lab 05: Cracking Wireless
  • Lab 06: Metasploit 1
  • Lab 07: Metasploit 2
  • Lab 08: Metasploit 3
  • Lab 09: EternalBlue
  • Lab 10: SQL Injection
  • Lab 11: Password Cracking
  • Lab 12: Data Exfiltration
  • Lab 13: Kernel Rootkit
  • Lab 14: Packet Capture and Analysis
  • Lab 15: IDS Deployment, Alert Analysis, and Reporting
  • Bonus Lab: Vulnerability Scanning
  • Bonus Lab: OSINT and Malware Analysis: Syrian Electronic Army (SEA)
  • CAPSTONE: Capture-the-Flag (CTF)

Prerequisites

TOP

Introduction to Cyber Warfare and Operations Design (ICWOD) recommended, but not required.

Who Should Attend

TOP
  • Information Operations Officers
  • Cyber Warfare Operations Officers
  • Cyber Operators
  • Information Security / Assurance Professionals
  • Cyber Security Consultants
  • Cyber Planners
  • Military Members
  • Security Analysts
  • Network Security Engineers
  • Penetration Testers
  • Auditors
  • Security Engineers
  • Threat Hunters

 

Course Delivery

This course is available in the following formats:

Classroom Live

Receive face-to-face instruction at one of our training center locations.

Duration: 3 day

Request this course in a different delivery format.
Enroll