Modern NetCentric Warfare The Department of Defense has migrated toward network-centric warfare concepts, and systems that support these concepts. Commercial...
Introduction to Malware Analysis Malware is a growing threat to the information and intellectual property of organizations. This introductory course will provide a...
Fundamentals of Cyber Systems Test and Evaluation Learn how to apply test and evaluation (T&E) to the cyber domain. The Fundamentals of Cyber Systems Test and Evaluation course approaches T...
Cybersecurity and Embedded Systems Embedded systems offer many opportunities to economically and effectively control large infrastructure systems, small single purpose devices...
Cybersecurity: A Systems Approach As many business sectors become increasingly information centric and network reliant, cybersecurity is becoming a critical pillar of the...
Introduction to Penetration Testing As businesses become more dependent on interconnected systems for survival, they recognize a need to train their own personnel in assessment...
Open Source Intelligence for Emerging Threats Take a deep dive into how to use public sources to recognize and respond to malicious cyber activities. This course will help technical...
Risk Management Framework The National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) provides a mechanism to inform risk decisions and...