Course Description
This overview course offers a launchpad for several integrated and dynamically updated courses oriented on enhancing effective decision making across the span of national security stakeholders. Built on a framework of real-world cyber operations and adversary threat knowledge, this offering baselines an understanding of cyber operations in design and execution, adversary motivation and tradecraft, understanding and assessing risk, cybersecurity and network operations, the impact of human factors in cyber, cyber threat intelligence, vulnerability management, incident response, and shifting from a culture of compliance to a culture of trust. Follow-on courses will offer deep-dives and synthesize case studies related to policy development, military and civilian decision makers, technologists, project managers and acquisition professionals, among others.
Key Takeaways
Examine the motivations of threat actors and how they operate in cyberspace
Explain how risk is managed in cyberspace
Select best practices for network security and security operations
Analyze the roles of cyber threat intelligence, vulnerability management, and incident response in securing and defending networks
Deconstruct the human factors that impact cyberspace operations
Establish a positive cybersecurity culture
Prerequisites
None.