Cyberforce Superiority White Belt

Cyberforce Superiority

Part of the Cyberforce Superiority™ “Belts” courses
Instructors: Mark Lowenthal, Sara-Michele Lazarus

Fee: $4495

The 5-day White Belt course gives students a solid foundation on ethics, policy, basic computer science and hacking.  A White Belt student will learn about the history of hacking and how that bears relevance on today’s events and priorities.  This will segue into a discussion of the applicable laws that govern the ethical use of hacking in the student’s upcoming career.  However, before the student can learn hacking techniques they must first become grounded in the basic understanding of how a computer works from the computer chip all the way to the command prompt.  Students will be introduced to programming concepts, Windows and Linux tools, Boolean logic and computer math principles to lay the groundwork for a more hands-on understanding of cyber concepts.

This course has been approved for CEUs by George Mason University.George Mason University

 

Starting Dates

No events available...

Learning Objectives and Course Content

What is hacking?Define hacking, CNA, CND and CNE

Define the basic U.S. laws that control cyber operations

Discuss ethical hacking and the difference between legal and ethical hacking

Identify and discuss recent examples of hacking activity in the news

  • History of hacking
  • Why hacking is relevant
  • Laws
    • Title 10
    • Title 50
  • Computer Network Operations
    • Computer Network Attack
    • Computer Network Defense
    • Computer Network Exploitation
Computer ArchitectureIdentify and describe the parts of a computer

Define assembly language

Create a simple assembly language program

Describe the differences between 32 and 64-bit architectures

Define and describe the function of a hypervisor

Practice installing and configuring an operating system inside a virtual machine

Describe the role of an operating system

Discuss the role of device drivers in a computer

  • Parts of a computer
    • CPU
    • RAM
    • Hard Drive
    • Motherboard
    • Peripherals
  • Operating Systems
  • Hardware Drivers
  • Boolean Logic
  • Binary, Octal and Hexadecimal Numbers
NetworkingIllustrate a network map

Describe the differences between routers, switches, hubs and other network devices

List and describe the layers of the OSI networking model

Discuss the differences between TCP and UDP

  • Defining Networking
  • The OSI Model
  • Network Protocols
  • Network Security
Basic Windows UsageDemonstrate the ability to find information about Windows commands using built-in help

Demonstrate the ability to use the Windows command line to navigate the system, view and modify files and file properties, view and modify network properties, view and modify users and groups

Discuss differences between Windows and Linux handling of system security

  • User Names and Passwords
  • Control Panel
  • File System
  • Drive Letters
  • The Command Line

 

Basic Unix UsageDemonstrate the ability to find information about Linux commands using built-in help

Demonstrate the ability to use the Linux command line to navigate the system, view and modify files and file properties, view and modify network properties, view and modify users and groups

Practice configuring a Linux machine to provide services over a network

Discuss differences between Windows and Linux handling of system security

  • History of Linux
  • User Names and Passwords
  • File System
  • The Command Line
  • Editing Files

Capstone/Lab Exercise