Welcome Back!
Pick up where you left off
Take me therePick up where you left off
Take me thereYou may be asking yourself...
Yeah, you do.
The United States is the
number one target
for foreign-based
cyber operations.
- Bill Evanina, Director of NCSC
Every network and device
has vulnerabilities,
some inherent,
some self-imposed.
Our foreign adversaries are forever seeking
opportunities to infiltrate and exploit
these vulnerabilities.
Nearly 75 % of all legitimate websites have unpatched vulnerabilities
Attackers reside within a network an average of 8
months before they are even detected
89 % of all cyber attacks involve financial or espionage motivations
Before you can fully understand the threat, you need to have a good foundation in the fundamental operations and capabilities of a computer and its networks.
At the end of this course, you will understand how foreign adversaries
could infiltrate and exploit our cyber networks through inherent
and/or self-imposed vulnerabilities and the security
procedures you can implement to help
mitigate the risk.
Vulnerabilities lie within three areas:
Technology
Configuration
Security
At the end of Module 01, you will be able to identify the computer’s component layers and associated functions.
At the end of Module 02, you will be able to recognize virtualization concepts.
At the end of Module 03, you will be able to choose the correct security protection associated with a computer’s component layer.