The current and future demand for cyber security professionals is outweighing the supply. Offensive Cyber Operations (OCO) is a niche capability sought by governments and militaries.
Offensive Cyber Operations is a course for operators interested in developing planning, management and technical skills. Over five days participants will learn the Offensive Cyber Tradecraft (OCT) Taxonomy. Completing the course participants will have the well-rounded knowledge, frameworks and experience on which to build future learning.
Conduct basic Offensive Cyber Operations activities:
Course is delivered on-site at Fifth Domain's training facility. Participants are required to BYOD laptop with wi-fi connectivity. All our labs are cloud-based so participant laptops are not required to run virtual machines.
Cyberwar, cyber-crime and cyber-espionage Tradecraft vs ToolcraftNetworking Fundamentals
Addressing - MACs, IPs, ports, hosts and domains
Protocols - TCP, UDP, ARP, DNS, NetBIOS, HTTP
Segmentation - VLANs, subnets, subdomainsTask Analysis
1st and 2nd order effects
Essential and implied tasks
Resources and constraintsTarget Analysis
Five-level target model
Target analysis framework
Discover - research and reconnaissance
Access - exploit, payload and vector
Assure - security, surveillance and stealth
Leverage - pillage and pivotTechniques, Tools & Procedures
Practical labs using a variety of open-source tools for:
Harvesting open-source intelligence, scanning and probing
Exploring exploit and payload options and delivery vectors
Maintaining persistence on the target
Collecting information and moving through the network
Following a guide-book, participants re-enact the intrusion and pivoting through a ficticious network. Participants will use a variety of native system functionality to discover, access and then leverage information within a network.
Participants will apply frameworks and techniques to gain entry to and collect information from a single computer system. Participants will maintain an operation-log and produce a final report on their activity.
Just like the individual challenge but bigger and in teams. This time teams of 5-8 people will role-play and OCO team who has been given the task of infiltrating a medium sized network in order to collect information. Teams will produce tactical and operational reports for higher management and customers.