Course Outline: Cyber Operations Fast Track (COFT)

Overview

You understand IT security but want to learn more about the cat and mouse game of cyber operations. Cyber Operations Fast Track (COFT) provides you with both theoretical and hands-on technical learning to ‘get your head around’ offensive and defensive cyber operations.

COFT is an abridged version of FIFTH DOMAIN ‘s more comprehensive OCO and DCO courses spread across 10 weeks of 3-hour classes. It is designed to make our training more accessible to people who may be interested in moving into a career in cyber operations but not sure what is involved. The course is fast-paced but will provide you with the foundation for further learning.

Learning Outcomes

Understand and apply core offensive and defensive cyber operations principles and techniques:

  • Plan and execute simple computer network compromise operations against simple corporate networks.
  • Design and deploy defensive technologies for the detection and investigation of network intrusions.

Delivery

COFT is delivered over ten weeks with weekly 3-hour evening classes. The course is delivered on-site at Fifth Domain’s training facility in the center of Canberra. Participants are required to BYOD laptop with wi-fi connectivity.

Prerequisites

Students need a good technical foundation with the ability to troubleshoot technical problems.

  • Networking: Intermediate
  • System administration: Basic
  • Programming: Nil
  • Data analysis: Basic

Dates

Wednesday evenings 1730-2030

01 March - 17 May 2017

Cost

Full-time students $600

Early-bird (pay before 31 Jan) $800

Standard enrolment $1200

Registration

Please reserve your seat on the course by registering online at register or by emailing: courses@fifthdomain.com.au

Payment details will be provided

Course Program
Cyber Operations Fast Track

OFFENSIVE OPERATIONS (1-29 March 2017)

Week 1

Offensive Cyber Tradecraft Taxonomy

Networking Fundamentals

Target Analysis

Week 2

Open source and network reconnaissance

Target exploitation and implant installation

Week 3

Maintaining persistence and operation assurance

Data exfiltration and propagating access

Week 4

Individual challenge to compromise a single target machine

Week 5

Team exercise to infiltrate a medium network and recover intelligence

DEFENSIVE OPERATIONS (19 April - 19 May 2017)

Week 6

Theoretical foundations

SOC capabilities – protection, collection, detection, analysis, reporting, response

Week 7

Threat modeling

Protection: hardening and obfuscation

Collection: network and host

Week 8

Detection: signatures and anomalies

Analysis: verification and correlation

Reporting

Week 9

Individual challenge to defend a small network against an automated attack

Week 10

Team exercise to defend a medium network against a determined actor