Network Training - Course Details

CSFI:DCOE CSFI: Defensive Cyber Operations Engineer (DCOE)

Network Training Course Description:
In this hands-on course, you will gain a better understanding of cyber operations (CO) for the deployment of computer network attack (CNA), computer network defense (CND), and computer network exploitation (CNE), against an adversary to achieve objectives and cause effects in support of a mission set. This course, founded on concept operations and real cyber capabilities, provides you with the understanding, tools, and processes needed to conduct malware analysis with real-world malicious code samples to dissect. You will prepare and plan an effective offensive and defensive strategy, as well as evaluate covert protocols. Analysis of system specific, non-descript tools will be introduced to aid in attack and defense.
Network Training Course Duration:
3 DAYS
Network Training Course Target Audience:
Anyone interested in the field of cyber warfare/cyber operations and/or looking to expand a cybersecurity career, including cyber commanders, information operations officers, information security/assurance professionals, cybersecurity consultants, cyber strategists, military members (J2, J3, J6, J9 types), SOC/NOC security analysts, network security engineers, penetration testers, auditors, government officials, and security engineers.
Network Training Course Prerequisite:
NONE
Course Content:


  • 1. Malware Analysis for Cyber Operations

    • Trends in malicious code growth
    • Classes of malware
    • Attack vectors
    • Surface analysis of malware
    • Run-time analysis of malware
    • System monitoring
    • Debuggers
    • Static reverse engineering of malware
    • Disassemblers
    • Malware analysis tools (obfuscation methods used by malware authors)
      • CND Focus
    • Malware mutation and development (US, Five Eyes, and NATO nations only)
      • CNA Focus

  • 2. Defensive Cyber Operations

  • Analysis of bypassing security measures (DEP, ASLR, and Bastille)
    • Usage of the Metasploit framework
    • Shell-coding and an overview of obfuscation
    • Automating an offensive and defensive environment
    • Fault injections for offensive purposes
    • Wireless attack vectors and defenses
  • Network analysis
    • Network evasion techniques and countermeasures
    • VoIP security exploitation and defense
    • Evaluating web technologies attacks, trends, and countermeasures
    • Automating web attacks for a perfect web