Cyber Operations Learning Objectives.

The course culminates with discussion of malware and the phases of a cyber attack, leading to network reconnaissance, attack and defense, and digital forensics. Students apply theory to practice by performing real-time hands-on activities in each of these areas. Case studies are examined. Specific objectives are:

  1. Digital Computer Forensics.

    1. Describe Locard's Exchange Principle.

    2. State the forensic evidence (artifacts) given activities leave behind and where the artifacts can be found.

    3. Describe the use of and use MD5 in digital forensics.

    4. Perform basic digital forensics activities.

    5. Analyze basic digital forensic artifacts to deduce events that occurred in information systems.

  2. Malware.

    1. Classify various types of malware.

    2. Describe malware as an attack vector that in most cases depends on both a vulnerability and a user action; define "zero day".

  3. Phases of Cyber Attack.

    1. Describe the phases of a cyber attack, relating them to the Pillars of Cyber Security.

    2. Conduct network reconnaissance.

  4. Computer Network Attack (CNA) and Computer Network Defense (CND).

    1. Give examples of defense-in-depth.

    2. Define and give examples of CNA. Conduct CNA, including actions that move through layered defenses.

    3. Define, give examples of, and conduct CND.

  5. Case Studies.

    1. Use knowledge of the Cyber Battlefield, Cyber Security Tools, and Cyber Operations to analyze case studies to identify technical and human security failures.