Imperial Cyber Corps of Paulastra: Difference between revisions

m
Tag: 2017 source edit
Tag: 2017 source edit
Line 442: Line 442:
=== Advanced Training (AT) Schools ===
=== Advanced Training (AT) Schools ===
   
   
==== Threat Hunter (AT) Training School ====
*Threat Hunter (AT) Training School  
**Curriculum:** Threat Hunters undergo advanced training in proactive threat detection and hunting. Recruits learn advanced hunting techniques, threat profiling, and advanced threat intelligence analysis.
**Curriculum:** Threat Hunters undergo advanced training in proactive threat detection and hunting. Recruits learn advanced hunting techniques, threat profiling, and advanced threat intelligence analysis.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Cybersecurity Investigator (AT) Training School ====
* Cybersecurity Investigator (AT) Training School  
**Curriculum:** Cybersecurity Investigators receive advanced instruction in conducting cybercrime investigations. Training includes evidence collection, legal considerations, and case management.
**Curriculum:** Cybersecurity Investigators receive advanced instruction in conducting cybercrime investigations. Training includes evidence collection, legal considerations, and case management.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Threat Researcher (AT) Training School ====
*Threat Researcher (AT) Training School
**Curriculum:** Threat Researchers delve into advanced cyber threat research and analysis. Recruits learn to identify emerging threats, analyze attacker tactics, techniques, and procedures (TTPs), and contribute to threat intelligence.
**Curriculum:** Threat Researchers delve into advanced cyber threat research and analysis. Recruits learn to identify emerging threats, analyze attacker tactics, techniques, and procedures (TTPs), and contribute to threat intelligence.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Security Engineer (AT) Training School ====
* Security Engineer (AT) Training School  
**Curriculum:** Security Engineers undergo advanced training in security engineering, network security, and infrastructure protection. Recruits learn to design and implement security solutions.
**Curriculum:** Security Engineers undergo advanced training in security engineering, network security, and infrastructure protection. Recruits learn to design and implement security solutions.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Adversary Researcher (AT) Training School ====
* Adversary Researcher (AT) Training School
**Curriculum:** Adversary Researchers undergo advanced training in profiling and researching cyber adversaries. Recruits learn to analyze threat actor behavior, tactics, and motives.
**Curriculum:** Adversary Researchers undergo advanced training in profiling and researching cyber adversaries. Recruits learn to analyze threat actor behavior, tactics, and motives.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Network Saboteur (AT) Training School ====
* Network Saboteur (AT) Training School  
**Curriculum:** Network Saboteurs receive advanced training in tactics for disrupting or sabotaging adversary networks. Training includes offensive techniques and countermeasures.
**Curriculum:** Network Saboteurs receive advanced training in tactics for disrupting or sabotaging adversary networks. Training includes offensive techniques and countermeasures.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Communication Jammer (AT) Training School ====
* Communication Jammer (AT) Training School  
**Curriculum:** This school teaches recruits about electronic warfare and communication jamming. Training includes jamming equipment operation, electronic warfare theory, and counter-jamming techniques.
**Curriculum:** This school teaches recruits about electronic warfare and communication jamming. Training includes jamming equipment operation, electronic warfare theory, and counter-jamming techniques.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Infrastructure Sabotage Expert (AT) Training School ====
*Infrastructure Sabotage Expert (AT) Training School
**Curriculum:** Infrastructure Sabotage Experts undergo advanced training in physical and cyber-infrastructure sabotage tactics. Recruits learn about critical infrastructure vulnerabilities and exploitation.
**Curriculum:** Infrastructure Sabotage Experts undergo advanced training in physical and cyber-infrastructure sabotage tactics. Recruits learn about critical infrastructure vulnerabilities and exploitation.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Threat Indicator Collector (AT) Training School ====
* Threat Indicator Collector (AT) Training School
**Curriculum:** Threat Indicator Collectors undergo advanced training in collecting and analyzing threat indicators. Recruits learn about indicator types, collection methods, and correlation techniques.
**Curriculum:** Threat Indicator Collectors undergo advanced training in collecting and analyzing threat indicators. Recruits learn about indicator types, collection methods, and correlation techniques.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Intelligence Dissemination Specialist (AT) Training School ====
* Intelligence Dissemination Specialist (AT) Training School
**Curriculum:** This school focuses on advanced intelligence dissemination techniques and strategies. Recruits learn how to effectively share threat intelligence with relevant parties.
**Curriculum:** This school focuses on advanced intelligence dissemination techniques and strategies. Recruits learn how to effectively share threat intelligence with relevant parties.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Vulnerability Manager (AT) Training School ====
*Vulnerability Manager (AT) Training School  
**Curriculum:** Vulnerability Managers receive advanced training in managing vulnerabilities within a cybersecurity program. Training includes vulnerability assessment, prioritization, and remediation.
**Curriculum:** Vulnerability Managers receive advanced training in managing vulnerabilities within a cybersecurity program. Training includes vulnerability assessment, prioritization, and remediation.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Security Assessment Analyst (AT) Training School ====
*Security Assessment Analyst (AT) Training School  
**Curriculum:** Security Assessment Analysts undergo advanced training in conducting comprehensive security assessments. Recruits learn about security testing methodologies and reporting.
**Curriculum:** Security Assessment Analysts undergo advanced training in conducting comprehensive security assessments. Recruits learn about security testing methodologies and reporting.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Patch Management Specialist (AT) Training School ====
*Patch Management Specialist (AT) Training School  
**Curriculum:** Patch Management Specialists receive advanced training in planning and implementing patch management strategies. Training includes vulnerability patching, testing, and deployment.
**Curriculum:** Patch Management Specialists receive advanced training in planning and implementing patch management strategies. Training includes vulnerability patching, testing, and deployment.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Vulnerability Remediation Coordinator (AT) Training School ====
*Vulnerability Remediation Coordinator (AT) Training School  
**Curriculum:** Vulnerability Remediation Coordinators undergo advanced training in coordinating and managing vulnerability remediation efforts. Training includes communication, prioritization, and tracking.
**Curriculum:** Vulnerability Remediation Coordinators undergo advanced training in coordinating and managing vulnerability remediation efforts. Training includes communication, prioritization, and tracking.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Infrastructure Designer (AT) Training School ====
*Infrastructure Designer (AT) Training School  
**Curriculum:** Infrastructure Designers undergo advanced training in designing secure network and IT infrastructures. Training includes advanced architectural concepts and security practices.
**Curriculum:** Infrastructure Designers undergo advanced training in designing secure network and IT infrastructures. Training includes advanced architectural concepts and security practices.
**Training Length:** 5 months
**Training Length:** 5 months
   
   
==== Systems Engineer (AT) Training School ====
* Systems Engineer (AT) Training School  
**Curriculum:** Systems Engineers receive advanced training in managing and securing IT systems. Training covers system administration, hardening, and security best practices.
**Curriculum:** Systems Engineers receive advanced training in managing and securing IT systems. Training covers system administration, hardening, and security best practices.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Cloud Solutions Architect (AT) Training School ====
* Cloud Solutions Architect (AT) Training School  
**Curriculum:** Cloud Solutions Architects undergo advanced training in designing and securing cloud-based solutions. Training includes cloud architecture, migration, and security considerations.
**Curriculum:** Cloud Solutions Architects undergo advanced training in designing and securing cloud-based solutions. Training includes cloud architecture, migration, and security considerations.
**Training Length:** 5 months
**Training Length:** 5 months
   
   
==== Software Engineer (AT) Training School ====
* Software Engineer (AT) Training School  
**Curriculum:** Software Engineers receive advanced training in software development with a focus on security. Training includes secure coding practices and software security testing.
**Curriculum:** Software Engineers receive advanced training in software development with a focus on security. Training includes secure coding practices and software security testing.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Application Developer (AT) Training School ====
* Application Developer (AT) Training School  
**Curriculum:** Application Developers undergo advanced training in developing secure applications. Training covers application security, threat modeling, and secure coding.
**Curriculum:** Application Developers undergo advanced training in developing secure applications. Training covers application security, threat modeling, and secure coding.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== DevOps Engineer (AT) Training School ====
* DevOps Engineer (AT) Training School  
**Curriculum:** DevOps Engineers receive advanced training in integrating security into the DevOps lifecycle. Training includes DevSecOps principles and automation for security.
**Curriculum:** DevOps Engineers receive advanced training in integrating security into the DevOps lifecycle. Training includes DevSecOps principles and automation for security.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Scripting Specialist (AT) Training School ====
* Scripting Specialist (AT) Training School  
**Curriculum:** Scripting Specialists undergo advanced training in scripting for cybersecurity purposes. Training includes scripting languages, automation, and scripting for security tasks.
**Curriculum:** Scripting Specialists undergo advanced training in scripting for cybersecurity purposes. Training includes scripting languages, automation, and scripting for security tasks.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Infrastructure Manager (AT) Training School ====
* Infrastructure Manager (AT) Training School  
**Curriculum:** Infrastructure Managers receive advanced training in managing complex cybersecurity infrastructure. Training includes infrastructure optimization, scalability, and resource allocation.
**Curriculum:** Infrastructure Managers receive advanced training in managing complex cybersecurity infrastructure. Training includes infrastructure optimization, scalability, and resource allocation.
**Training Length:** 5 months
**Training Length:** 5 months
   
   
==== Network Administrator (AT) Training School ====
* Network Administrator (AT) Training School  
**Curriculum:** Network Administrators undergo advanced training in managing and securing network infrastructure. Training includes network design, configuration, and troubleshooting.
**Curriculum:** Network Administrators undergo advanced training in managing and securing network infrastructure. Training includes network design, configuration, and troubleshooting.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Systems Administrator (AT) Training School ====
* Systems Administrator (AT) Training School  
**Curriculum:** Systems Administrators receive advanced training in managing and securing IT systems, servers, and endpoints. Training covers advanced system administration and security practices.
**Curriculum:** Systems Administrators receive advanced training in managing and securing IT systems, servers, and endpoints. Training covers advanced system administration and security practices.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Cloud Operations Specialist (AT) Training School ====
* Cloud Operations Specialist (AT) Training School  
**Curriculum:** Cloud Operations Specialists undergo advanced training in managing and securing cloud-based operations. Training includes advanced cloud services, automation, and security best practices.
**Curriculum:** Cloud Operations Specialists undergo advanced training in managing and securing cloud-based operations. Training includes advanced cloud services, automation, and security best practices.
**Training Length:** 5 months
**Training Length:** 5 months
   
   
==== Exploit Developer (AT) Training School ====
* Exploit Developer (AT) Training School
**Curriculum:** Exploit Developers receive advanced training in developing and analyzing exploits. Training includes exploit development techniques, vulnerability analysis, and reverse engineering.
**Curriculum:** Exploit Developers receive advanced training in developing and analyzing exploits. Training includes exploit development techniques, vulnerability analysis, and reverse engineering.
**Training Length:** 5 months
**Training Length:** 5 months
   
   
==== Vulnerability Researcher (AT) Training School ====
* Vulnerability Researcher (AT) Training School  
**Curriculum:** Vulnerability Researchers undergo advanced training in identifying, analyzing, and mitigating software vulnerabilities. Training includes vulnerability research methodologies and security assessments.
**Curriculum:** Vulnerability Researchers undergo advanced training in identifying, analyzing, and mitigating software vulnerabilities. Training includes vulnerability research methodologies and security assessments.
**Training Length:** 5 months
**Training Length:** 5 months
   
   
==== Malware Analyst (AT) Training School ====
* Malware Analyst (AT) Training School  
**Curriculum:** Malware Analysts receive advanced training in analyzing and combating malware threats. Training covers malware analysis techniques, threat hunting, and incident response.
**Curriculum:** Malware Analysts receive advanced training in analyzing and combating malware threats. Training covers malware analysis techniques, threat hunting, and incident response.
**Training Length:** 5 months
**Training Length:** 5 months
   
   
==== Red Team Operator (AT) Training School ====
*Red Team Operator (AT) Training School  
**Curriculum:** Red Team Operators undergo advanced training in simulating cyberattacks and assessing an organization's security posture. Training includes red teaming methodologies and advanced attack simulations.
**Curriculum:** Red Team Operators undergo advanced training in simulating cyberattacks and assessing an organization's security posture. Training includes red teaming methodologies and advanced attack simulations.
**Training Length:** 5 months
**Training Length:** 5 months
 
=== Training and Education Schools ===
=== Training and Education Schools ===
   
   
175

edits