DCOE Training | Defensive Cyber Operations Engineer Training

DCOE Training | Defensive Cyber Operations Engineer Training

Introduction:

DCOE Certification Training | Defensive Cyber Operations Engineer Training with hands-on labs

In this DCOE Certification Training | Defensive Cyber Operations Engineer Training course, you will acquire the skills for the planning, executing, and integrating defensive cyberspace operations (DCO) into organizational missions and DCO requirements. The DCOE Certification Training | Defensive Cyber Operations Engineer Training course builds on the planning skills learned in the Introduction to Cyber Warfare and Operations Design (ICWOD) course. Adversarial use of tools and their associated techniques are presented to assess network vulnerabilities and to defend friendly networks against adversary threats.

The DCOE Certification Training | Defensive Cyber Operations Engineer Training course covers the use of open source tools and websites for system configuration, penetration testing, and control testing. You will use Linux and Windows command lines and unleash an attack on target servers and analyze the results. Attacks and analysis of will expose you to live attacks in a controlled environment where students can see first-hand the adversary realm of possible actions, how to detect, mitigate, and counter such activities.

DCOE Training | Defensive Cyber Operations Engineer TrainingRelated Courses:

Duration:3 days

Skills Gained:

After completing this course, attendees will be able to:

● Assess adversary intent and how threat vectors can support malicious intent
● How to counter known and emerging threat vectors
● Allocation and guidance for resource usage to counter adversary threats
● Integration of DCO into larger organizational constructs
● Deception methods
● Data exfiltration and defense against exfiltration methodologies

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Course Content:

1. Operational Environment

DCO Planning
Cloud Operations
Network Packet Capture and Data Exfiltration
Windows and Linux Operating System Differences and Configurations
Wireless Networks Operations and Access
Open Source Tool Usage
Network and Internet Reconnaissance

2. Defensive Methods

Adversary Perspective of Target Selection
Tool Capability and Countermeasure Planning
Maltego
Metasploit
Social Engineering Toolkit (SET) Usage
Defensive Tools for Network Threat Situational Awareness
DS/IPS – Snort
Honeypots
Detection Avoidance
Malware Analysis

3. Payload configuration and tool customization

Target Selection to Support Adversarial Intent
Tailoring Payloads to Adversary Intent
Payload Detection Avoidance
System Log Analysis
Sensor Adjustments
Payload Altering
Current Threat Detection
Emerging Threat detection

4. Web Application Defense

SQL Injection
Cross Site Scripting
Local File Inclusion
Remote File Inclusion
Web Shells

Whether you are looking for general information or have a specific question, we want to help

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment