Cyber Operations Learning Objectives.
The course culminates with discussion of malware and the phases of a cyber attack, leading to network reconnaissance,
attack and defense, and digital forensics. Students apply theory to practice by performing real-time hands-on activities
in each of these areas. Case studies are examined. Specific objectives are:
- Digital Computer Forensics.
- For a given activity, state the forensic evidence it leaves behind and where it can be found.
- Describe and use MD5 in digital forensics.
- Perform file carving, browser and email forensics; analyze forensic evidence to trace activity.
- Malware.
- Classify various types of malware.
- Describe malware as an attack vector that in most cases depends on both a vulnerability
and a user action; define "zero day".
- Phases of Cyber Attack.
- Describe the phases of a cyber attack, relating them to the pillars of IA.
- Conduct network reconnaissance.
- Computer Network Attack (CNA) and Computer Network Defense (CND).
- Give examples of defense-in-depth.
- Define and give examples of CNA. Conduct CNA, including actions that move through
layered defenses.
- Define, give examples of, and conduct CND.
- Case Studies.
- Use knowledge of the Cyber Battlefield, Models and Tools, and Cyber Operations to
analyze case studies to identify technical and human security failures.