WSS 011 Cyber Training Range – Intermediate
 Description
The Intermediate (Level 200) Cyber Training Range - This workshop provides hands on laboratory exploration of cyber threats to DoD networks using sophisticated cyberattack methods such as a Ransomware. Students will learn and execute (in the lab environment) a cyberattack kill chain using offensive cyber tactics, techniques and procedures. Examples of tactics, techniques and procedures include establishing an initial foothold using attacks such as Cross Site Scripting; conducting reconnaissance by manipulating email accounts and executing a Phishing attack; laterally moving throughout the network and escalating privilege; and running an attack to effect mission such as a ransomware. The workshop will also expose the students to cyber Capture the Flag. All students will develop cyber countermeasure design requirements, design solutions and testing approaches to improve DoD network survivability and resilience in the modern cyber contested battlefield.

Critical Behaviors: Upon completion of this workshop the student will in their work environment, be able to:
  1. Write system cybersecurity performance requirements from the perspective of defeating adversarial attacks.
  2. Provide subject matter expertise at system design reviews regarding architectures and designs that are necessary to defeat cyberattacks.
  3. Assume a leadership role in developing and executing cooperative and adversarial cybersecurity test and evaluation plans and procedures.
  4. Identify exploitable weaknesses in web applications, operating systems and software code using COTS tools.
  5. Train program office personnel and system developers on cyberattack vectors including web applications, insider threats, social engineering, and network.
Objectives
Terminal Learning Objective (TLO)
  • Use threat based engineering principles to support decisions made regarding cybersecurity throughout the program’s development lifecycle
Enabling Learning Objective (ELO)
  • ELO 1: Analyze cyberattack vectors—“Think like an adversary”
  • ELO 2: Describe the approach to “baking in” cybersecurity in designs as part of the systems engineering technical processes
  • ELO 3: Develop system requirements which are intended to reduce the likelihood of cyberattack success or reduce the mission impact of a successful attack
  • ELO 4: Execute cyberattacks against DoD networks in a laboratory environment to identify vulnerabilities
  • ELO 5: Execute cyberattacks against DoD networks in a laboratory environment to assess effectiveness of implemented countermeasures
  • ELO 6: Describe how threat based engineering and assessment are accomplished
Target Attendees
System Program Office personnel and test organizations to include government and support contractors.
Prerequisite(s)
REQUIRED: NONE
RECOMMENDED:
  • Completion of WSS 010 Cyber Training Range workshop or equivalent experience/training strongly recommended.
Predecessor Course(s) (Acceptable substitutes for meeting current course prerequisite and certification standards)
Predecessor Predecessor Course Title PDS Code Accepted Until
None None None None
Course Length
2 days
Additional Course Information
Delivery Mode  Workshop
Equivalent Courses  N/A
ACE Recommended Credits  N/A
PDS Code  None
Walk-ins Authorized  N/A
Pre-work required   No
First Offering  3/14/2022
Continuous Education Units  0
Continuous Learning Points 16 
Reservist Retirement Points 0  
Historical Allocations  Click here
Fulfillment Eligible   N/A
Technical Requirements Click Here
Notes
  • Taught at the unclassified level.
  • Workshop is offered via Virtual Instructor Led Training online or onsite at the DAU Cyber Training Range located at the California, MD campus.
  • Course is offered once per month and seating is limited.
  • Sign up via iCatalog/CSOD