Cyber Battlefield Information Assurance
Digital Data: Part 1, Part 2
PC: Architecture & Dissection
Operating Systems: Part 1, Part 2, Part 3
programs: Part 1, Part 2, Part 3, Part 4, Exercises
Basic Web: HTML and the Web & Build-a-Webpage
Intermediate Web: Client-Side Scripting: Non-Event Driven, Event Driven & Forms
Advanced Web: Server-Side Scripting, Injection Attacks & XSS
Networking: Part 1, Part 2 Part 3, Part 4, Nuts and Bolts, Build-a-LAN, Wireless, Build-a-WLAN
Security Tools Encryption: Symmetric, Asymmetric
Hashing & Passwords Activity
Cryptography in Practice: Digital Cryptography Tools and Applications, Digital Certificates
Cyber Operations Forensics: Digital Forensics, Digital Forensics Lab
Reconnaissance: Phases of a Cyber Attack & Cyber Recon, Cyber Recon Lab
Attack: Malware, Cyber Attack, Cyber Attack Lab, Cyber Attack Lab Debrief
Defense: Cyber Defense, Cyber Defense Lab, Cyber Defense Lab Debrief
Case Studies, Course Wrap-Up