Cybersecurity Operations and Planning 5-Day Course
This 5 day course concentrates on providing cyber security specialists from various disciplines a baseline understanding across the major areas of cyber operations (network operations, defense, exploitation and attack) and planning. It will cover unclassified capabilities and techniques, tactics and procedures for effectively planning and operating in each of these areas. This course will also familiarize students with pertinent cyber laws and policies governing Private, DoD and Federal Agencies. This course will conclude with a 1-day cyber exercise in a virtual environment in which students will employ offensive and defensive cyberspace capabilities.
NICE Work Roles
Information Systems Security Manager
Responsible for the cybersecurity of a program, organization, system, or enclave.
Cyber Policy and Strategy Planner
Develops and maintains cybersecurity plans, strategy, and policy to support and align with organizational cybersecurity initiatives and regulatory compliance.
Leads, coordinates, communicates, integrates, and is accountable for the overall success of the program, ensuring alignment with agency or enterprise priorities.
IT Project Manager
Directly manages information technology projects.
- Module 1 - Critical Definitions
- Module 2 – Laws, Policies and Ethics
- Module 3 – Cyber Doctrine
- Module 4 – Cyber Operations Planning
- Module 5 – Network Operations
- Module 6 – Cyber Defense
- Module 7 – Cyber Exploitation
- Module 8 – Cyber Attack
- Module 9 – Capstone Exercise
No image gallery for this course as of yet.
No video for this course as of yet.