Cyberforce Superiority White Belt
Part of the Cyberforce Superiority™ “Belts” courses
Instructors: Mark Lowenthal, Sara-Michele Lazarus
Fee: $4495
The 5-day White Belt course gives students a solid foundation on ethics, policy, basic computer science and hacking. A White Belt student will learn about the history of hacking and how that bears relevance on today’s events and priorities. This will segue into a discussion of the applicable laws that govern the ethical use of hacking in the student’s upcoming career. However, before the student can learn hacking techniques they must first become grounded in the basic understanding of how a computer works from the computer chip all the way to the command prompt. Students will be introduced to programming concepts, Windows and Linux tools, Boolean logic and computer math principles to lay the groundwork for a more hands-on understanding of cyber concepts.
This course has been approved for CEUs by George Mason University.
Starting Dates
Learning Objectives and Course Content
What is hacking?Define hacking, CNA, CND and CNE
Define the basic U.S. laws that control cyber operations Discuss ethical hacking and the difference between legal and ethical hacking Identify and discuss recent examples of hacking activity in the news |
|
Computer ArchitectureIdentify and describe the parts of a computer
Define assembly language Create a simple assembly language program Describe the differences between 32 and 64-bit architectures Define and describe the function of a hypervisor Practice installing and configuring an operating system inside a virtual machine Describe the role of an operating system Discuss the role of device drivers in a computer |
|
NetworkingIllustrate a network map
Describe the differences between routers, switches, hubs and other network devices List and describe the layers of the OSI networking model Discuss the differences between TCP and UDP |
|
Basic Windows UsageDemonstrate the ability to find information about Windows commands using built-in help
Demonstrate the ability to use the Windows command line to navigate the system, view and modify files and file properties, view and modify network properties, view and modify users and groups Discuss differences between Windows and Linux handling of system security |
|
Basic Unix UsageDemonstrate the ability to find information about Linux commands using built-in help
Demonstrate the ability to use the Linux command line to navigate the system, view and modify files and file properties, view and modify network properties, view and modify users and groups Practice configuring a Linux machine to provide services over a network Discuss differences between Windows and Linux handling of system security |
|
Capstone/Lab Exercise |