Cyber Operations Learning Objectives.
The course culminates with discussion of malware and the phases of a cyber attack, leading to network reconnaissance, attack and defense, and digital forensics. Students apply theory to practice by performing real-time hands-on activities in each of these areas. Case studies are examined. Specific objectives are:
- Digital Computer Forensics.
- Describe Locard's Exchange Principle.
- State the forensic evidence (artifacts) given activities leave behind and where the artifacts can be found.
- Describe the use of and use MD5 in digital forensics.
- Perform basic digital forensics activities.
- Analyze basic digital forensic artifacts to deduce events that occurred in information systems.
- Classify various types of malware.
- Describe malware as an attack vector that in most cases depends on both a vulnerability
and a user action; define "zero day".
- Phases of Cyber Attack.
- Describe the phases of a cyber attack, relating them to the Pillars of Cyber Security.
- Conduct network reconnaissance.
- Computer Network Attack (CNA) and Computer Network Defense (CND).
- Give examples of defense-in-depth.
- Define and give examples of CNA. Conduct CNA, including actions that move through
- Define, give examples of, and conduct CND.
- Case Studies.
- Use knowledge of the Cyber Battlefield, Cyber Security Tools, and Cyber Operations to analyze case studies to identify technical and human security failures.