|
|
|
|
8.5 Hours Network Forensics Section 101 (NFS 101) | Skill Level: Beginner | | + Description | | Network Forensics Section 101 (NFS 101)
Prerequisite(s): None
Course Setting: Online, self-paced
Length: 8.5 hours
Training Purpose: Skill Development
Audience: Network Forensic Section (NFS) Analysts and others assigned by management
Description:
The NFS 101 course aims to establish a baseline understanding of the NFS mission, goals, structure, and deployment kits. The course identifies components of a deployment kit and provides an overview of the pre-deployment, onsite, and remote functions of the kit. It also discusses the NFS process for artifacts and data collection, as well as the basic analysis of artifacts and data.
By the end of the course, trainees will be able to:
- State the NFS mission, goals, and structure.
- Identify components of a deployment kit.
- Describe the pre-deployment, onsite, and remote functions of the kit.
- Discuss the NFS process for collecting artifacts and data.
- Discuss the NFS process for basic analysis of artifacts and data.
|
| + Course Modules/Units | | Module 1: Introduction | Module 2:Kit Components | Module 3: Kit Deployment | Module 4: Data Collection & Analysis | Module 5: Conclusion |
|
|
|
|
5 Hours Coding 101 | Skill Level: Beginner | | + Description | | This course focuses on the basics of computer programming and how to give a machine a set of instructions to produce a desired behavior. This course also provides information on the elements of programming and programming languages, frameworks, and models. The course includes an interactive programming game, interactive knowledge checks, and the chance to write a fully functional code.
Learning Objectives:
- Define programming.
- Describe the structure and purpose of major programming paradigms.
- Explain the difference between high-level and low-level languages.
- Describe the uses of scripting and compiled languages.
- State the elements of programming.
- Explain when to use a variable in programming.
- List basic data types.
- State how operators are used in programming.
- Explain why logic and flow are important in programming.
- State the purpose of programming frameworks.
Date: 2017
Training Purpose: Skill Development
Training Proficiency Area: Level 1 - Beginner
Alignment to the NIST SP 800-181 Cybersecurity Workforce Framework
Category | Specialty Area | Work Roles |
Securely Provision |
Systems Development |
Systems Developer |
Securely Provision |
Systems Requirements Planning |
Systems Requirements Planner |
Securely Provision |
Systems Architecture |
Security Architect |
Securely Provision |
Technology R&D |
Research & Development Specialist |
Securely Provision |
Test and Evaluation |
System Testing and Evaluation Specialist |
|
| |
|
1 Hour Incident Response 101 | Skill Level: Beginner | | + Description | | This course focuses on cyberattacks, specifically compromises via ransomware. Implementing strategies to defend against attacks as well as preparations for response and recovery in the event of an incident is critical to an organization’s resilience. This course reviews malware types and vectors for compromise, common issues hindering an effective response, best practices for preparing and responding to an infection incident, and defensive measures to strengthen the cybersecurity posture.
Learning Objectives:
- Identify the various types of disruptionware, vectors for compromise, and the impact of an infection on business operations.
- Recognize the common problems that can hinder effective incident response and prevention activities.
- Know the ordered steps in following documented incident reporting procedures including immediate actions and communication.
- Explain the importance of defense-in-depth layered strategy for protecting the enterprise with examples of implementation.
Date: 2020
Training Purpose: Skill Development
Training Proficiency Area: Level 1 - Beginner
Alignment to the NIST SP 800-181 Cybersecurity Workforce Framework
Category | Specialty Area | Work Roles |
Oversee and Govern |
Cybersecurity Management |
Information Systems Security Manager |
Protect and Defend |
Incident Response |
Cyber Defense Incident Responder |
|
| + Course Modules/Units | | Malware Attacks and Vectors of Compromise | Incident Response - Common Problems/Issues | Ransomware Immediate Infection Response | Incident Response Backups | Cyberattack Defensive Strategies | IR Course Exam |
|
|
|