DCO-IDM Training
Table of contents
- Level 0 Training (Fundamentals)
- Level 1 Training (Operating)
- Level 2 Training (Deeper Background Material)
- Level 3 Training (Protection)
- Level 4 Training (Planning)
Tutorial on creating a training module using gitbooks
Level 0 Training (Fundamentals)
- (Networking Basics) (Network Intrusion)
- Linux Concepts
- Windows Concepts
- Security Basics (common vulnerabilities/attacks, security concepts)
- Shared Drive/Github Orientation (know where to find the most commonly used resources for self-learning and reference)
- Scripting (Python, Bash, Powershell)
Level 1 Training (Operating)
- Vuln Scanning, Detection and Mediation
- Intrusion Detection Mechanics (Splunk, etc)
- Malware I (Static Analysis)
- Windows Host Forensics I (collecting artifacts)
- Network Forensics (Log Analysis, ELK stacks, Data Processing)
Level 2 Training (Deeper Background Material)
- Malware II (Dynamic Analysis, Reversing, Signature Dev)
- Programming (Compiled as needed for basic reversing)
- Windows Operating System Concepts (Process Injection)
- Red Team Pentration Testing Fundamentals (Exploit Development I, Exploit Development II, Priv Esc)
Level 3 Training (Protection)
- Incident Response (Ransomware, DDOS, Spyware)
- Hunt Mission
- Target Hardening (Host)
- Target Hardening (Network)
- Forensics (SANS FOR 500)
Level 4 Training (Planning)
- Planning Defensive Cyber Operations
- Using Cyber Intel in Planning