Cyber Operations Learning Objectives.

The course culminates with discussion of malware and the phases of a cyber attack, leading to network reconnaissance, attack and defense, and digital forensics. Students apply theory to practice by performing real-time hands-on activities in each of these areas. Case studies are examined. Specific objectives are:
  1. Digital Computer Forensics.

    1. For a given activity, state the forensic evidence it leaves behind and where it can be found.

    2. Describe and use MD5 in digital forensics.

    3. Perform file carving, browser and email forensics; analyze forensic evidence to trace activity.

  2. Malware.

    1. Classify various types of malware.

    2. Describe malware as an attack vector that in most cases depends on both a vulnerability and a user action; define "zero day".

  3. Phases of Cyber Attack.

    1. Describe the phases of a cyber attack, relating them to the pillars of IA.

    2. Conduct network reconnaissance.

  4. Computer Network Attack (CNA) and Computer Network Defense (CND).

    1. Give examples of defense-in-depth.

    2. Define and give examples of CNA. Conduct CNA, including actions that move through layered defenses.

    3. Define, give examples of, and conduct CND.

  5. Case Studies.

    1. Use knowledge of the Cyber Battlefield, Models and Tools, and Cyber Operations to analyze case studies to identify technical and human security failures.