Academics > Portfolio >

Course Catalogue

M6-109

Network Vulnerability Assessment & Risk Mitigation Course

Conducted by COSEC

Aim

The aim of this course is to prepare students to apply the methodologies and techniques used for vulnerability assessments and follow on mitigation.

Details

Duration: 10 Weeks
Course Structure: Resident (1) - eLearning (8) - Resident (1)
Language: English 3333 IAW STANAG 6001
Classification: NATO Unclassified
Discipline: COP - Cyberspace Operations
Area: CD - Cyber Defence Operations
Depth of Knowledge: 3 - Advance
ePrime No.: ACT.368
ETOC Code: COP-CD-31370

Course Iterations

Code Course Dates Open Seats
M6-109-A-24 15 Apr 24 - 21 Jun 24 Contact POC
M6-109-B-24 26 Aug 24 - 01 Nov 24 Contact POC

If you wish to join a resident course you may have your agency POC send a seat request. Please click on the POC Finder to obtain the contact information of your agency POC.

ADL courses can be accessed without the need for enrolment but students are required to register through the JADL portal using a military/government email address otherwise they will not be accepted.

Learning Objectives

Describe Methodology to Assess Organizational Vulnerability: Based on lectures, classroom and online discussions, videos, online labs and quizzes, students will describe the methodology used to assess the vulnerability of an organization connected to the Internet, in accordance with the guidelines provided by the course material posted on Sakai.

Employ Common Assessment and Threat Mitigation Tools: Based on lectures, classroom and online discussions, videos, online labs and quizzes, students will employ the common tools of the trade used during the assessments and used in mitigation, in accordance with the guidelines provided by the course material posted on Sakai.

Use distribution of LINUX: Based on lectures, classroom and online discussions, videos, online labs and quizzes, students will use a distribution of Linux to compile new tools and use such applications as vi and nmap, in accordance with the guidelines provided by the course material posted on Sakai.

Explain Hacking motivations: Based on lectures, classroom and online discussions, videos, online labs and quizzes, students will explain why hackers hack (their motivations), the different types of hackers, and some of the history of hackers and their exploits, in accordance with the guidelines provided by the course material posted on Sakai.

Assess Lab Network: Given their knowledge and skills acquired during the course, students will conduct an assessment on lab network, to include a full mapping of the network, vulnerabilities, and exploits that could be used as threats against them, in accordance with the guidelines provided by the course material posted on Sakai.

Describe types of Vulnerabilities: Based on lectures, classroom and online discussions, videos, online labs and quizzes, students will describe current types of vulnerabilities and how to protect against them, in accordance with the guidelines provided by the course material posted on Sakai.

Course Participants

This is a technical course that requires a modicum of technical education and/or experience background. The target audience is personnel (security managers, technicians and engineers) whose work responsibilities require or would benefit from understanding the potential vulnerabilities and their mitigation in networked systems by studying methods to: (1) obtain information about a remote network, (2) to possibly exploit or subvert systems residing on that network and (3) techniques to mitigate risks to networked systems. No rank requirement.

Language Proficiency: English 3333 IAW STANAG 6001
Rank Requirements: NCO: No restrictions
Officer: No restrictions

Prerequisite Courses

Code Name
M6-108 Network Security Course

Methodology

This ten-week course is a mix of lectures, classroom seminar-style discussions, online discussions, videos, online labs and quizzes. Labs provide practical experience with current network attack and vulnerability assessment tools, as well as tools and methodologies for a systematic approach to reducing vulnerabilities. A final project that demonstrates skill and knowledge is required. This course is designed so that the majority of the resources used in the teaching of the course will be supplied from the EC Council's Certified Ethical Hacking materials, as well as NPS instructor’s supplemental materials, delivered on-line (via PowerPoint presentations), supplemented with classroom discussions and videos with key subject matter experts in the field. Students will be expected to have read assigned readings ahead of class time, as some of the in class lectures will be in an open forum style where key questions on the reading will be discussed, and course participation partially evaluated. The student's preparatory time will average 2 to 4 hours a week during the Distance Learning (DL) segment of the course, mostly reading assignments, with some additional time (up to 3 or 4 hours a week) required for the lab projects. Student will receive various summative assessments

Further Information

-The methodologies will be reviewed in-depth as they are applied from the vantage point of a hacker. An extensive amount of hands-on lab exercises will be used to improve the student's detailed knowledge of security threats and the methods used to exploit them.
-This course involves one week resident training at NATO school followed by 8 weeks of distance learning followed by one more week at NATO school.