Menu



WSS 012 Defensive Cyber Operations (DCO)





DAU Courses
AUD

iCatalog Home WSS 012 Defensive Cyber Operations (DCO)
(Last Modified:02-Aug-2022)


apply apply
print


 
Description
The Cyber Training Range - DCO course provides hands on laboratory exploration of cyber defensive measures used in support of DoD information systems. Students will enumerate system attack surface; analyze vulnerability scan data to prioritize appropriate defensive measures; identify, review, and implement secure configuration standards; and analyze network data to identify anomalous activity and initiate incident response activities. The WSS 012 workshop is conducted as a VILT offering 4 times per year (once per quarter).

Critical Behaviors: Upon completion of this workshop the student will in their work environment, be able to:
  1. Enumerate the cyber attack surface associated with common information system and network components using manual and automated tactics and techniques.
  2. Write defensive system cybersecurity performance requirements from the perspective of defending against adversarial attacks on a DOD system utilizing information technology.
  3. Provide subject matter expertise at system design reviews regarding defensive Information Technology architectures and designs that are necessary to defeat cyber attacks.
  4. Train program office personnel and system developers on various defensive measures to address system vulnerabilities and/or cyber incidents.
Objectives
Terminal Learning Objective (TLO): Use threat-based engineering principles to support decisions made regarding defensive cybersecurity throughout systems development lifecycle
  • Enabling Learning Objective (ELO) 1: Utilize various techniques and tools to enumerate system attack surface
  • ELO 2: Select appropriate security measures for application based on the laboratory system/network contents and configuration
  • ELO 3: Analyze and process vulnerability scan data to determine and prioritize potential operating system and application vulnerabilities
  • ELO 4: Utilize tools and techniques to analyze network data to identify potential anomalous activity typical of cyber attacks
  • ELO 5: Select and apply the appropriate incident response procedures based on the laboratory scenario
Target Attendees
Personnel assigned in positions involving acquisition, development, or sustainment of information systems used in both enterprise and weapon systems
Prerequisite(s)
Prior experience in Windows and Linux operating systems and knowledge of defensive cyber concepts is highly desired.
Predecessor Course(s)
Predecessor Predecessor Course Title PDS Code Expires On
None None None None
Course Length
3 days
Additional Course Information
Delivery Mode Workshop
Equivalent Courses N/A
Availability All
PDS Code  
Walk-ins Authorized N/A
Pre-work required No
First Offering
ACE Recommended Credits N/A
Continuing Education Units   0
Continuous Learning Points  24
Reservist Retirement Points  0
Historical Allocations Mouse Over for Past CEU/CLPs
Fulfillment Eligible N/A
Technical Requirements Click Here
Notes
  • Taught at the unclassified level
  • Course is offered quarterly
  • Sign up via iCatalog/CSOD