Link Search Menu Expand Document

DCO-IDM Training

Table of contents

  1. Level 0 Training (Fundamentals)
  2. Level 1 Training (Operating)
  3. Level 2 Training (Deeper Background Material)
  4. Level 3 Training (Protection)
  5. Level 4 Training (Planning)

Tutorial on creating a training module using gitbooks

Level 0 Training (Fundamentals)

  1. (Networking Basics) (Network Intrusion)
  2. Linux Concepts
  3. Windows Concepts
  4. Security Basics (common vulnerabilities/attacks, security concepts)
  5. Shared Drive/Github Orientation (know where to find the most commonly used resources for self-learning and reference)
  6. Scripting (Python, Bash, Powershell)

Level 1 Training (Operating)

  1. Vuln Scanning, Detection and Mediation
  2. Intrusion Detection Mechanics (Splunk, etc)
  3. Malware I (Static Analysis)
  4. Windows Host Forensics I (collecting artifacts)
  5. Network Forensics (Log Analysis, ELK stacks, Data Processing)

Level 2 Training (Deeper Background Material)

  1. Malware II (Dynamic Analysis, Reversing, Signature Dev)
  2. Programming (Compiled as needed for basic reversing)
  3. Windows Operating System Concepts (Process Injection)
  4. Red Team Pentration Testing Fundamentals (Exploit Development I, Exploit Development II, Priv Esc)

Level 3 Training (Protection)

  1. Incident Response (Ransomware, DDOS, Spyware)
  2. Hunt Mission
  3. Target Hardening (Host)
  4. Target Hardening (Network)
  5. Forensics (SANS FOR 500)

Level 4 Training (Planning)

  1. Planning Defensive Cyber Operations
  2. Using Cyber Intel in Planning