175
edits
Pauldustllah (talk | contribs) Tag: 2017 source edit |
Pauldustllah (talk | contribs) Tag: 2017 source edit |
||
Line 442: | Line 442: | ||
=== Advanced Training (AT) Schools === | === Advanced Training (AT) Schools === | ||
*Threat Hunter (AT) Training School | |||
**Curriculum:** Threat Hunters undergo advanced training in proactive threat detection and hunting. Recruits learn advanced hunting techniques, threat profiling, and advanced threat intelligence analysis. | **Curriculum:** Threat Hunters undergo advanced training in proactive threat detection and hunting. Recruits learn advanced hunting techniques, threat profiling, and advanced threat intelligence analysis. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
* Cybersecurity Investigator (AT) Training School | |||
**Curriculum:** Cybersecurity Investigators receive advanced instruction in conducting cybercrime investigations. Training includes evidence collection, legal considerations, and case management. | **Curriculum:** Cybersecurity Investigators receive advanced instruction in conducting cybercrime investigations. Training includes evidence collection, legal considerations, and case management. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
*Threat Researcher (AT) Training School | |||
**Curriculum:** Threat Researchers delve into advanced cyber threat research and analysis. Recruits learn to identify emerging threats, analyze attacker tactics, techniques, and procedures (TTPs), and contribute to threat intelligence. | **Curriculum:** Threat Researchers delve into advanced cyber threat research and analysis. Recruits learn to identify emerging threats, analyze attacker tactics, techniques, and procedures (TTPs), and contribute to threat intelligence. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
* Security Engineer (AT) Training School | |||
**Curriculum:** Security Engineers undergo advanced training in security engineering, network security, and infrastructure protection. Recruits learn to design and implement security solutions. | **Curriculum:** Security Engineers undergo advanced training in security engineering, network security, and infrastructure protection. Recruits learn to design and implement security solutions. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
* Adversary Researcher (AT) Training School | |||
**Curriculum:** Adversary Researchers undergo advanced training in profiling and researching cyber adversaries. Recruits learn to analyze threat actor behavior, tactics, and motives. | **Curriculum:** Adversary Researchers undergo advanced training in profiling and researching cyber adversaries. Recruits learn to analyze threat actor behavior, tactics, and motives. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
* Network Saboteur (AT) Training School | |||
**Curriculum:** Network Saboteurs receive advanced training in tactics for disrupting or sabotaging adversary networks. Training includes offensive techniques and countermeasures. | **Curriculum:** Network Saboteurs receive advanced training in tactics for disrupting or sabotaging adversary networks. Training includes offensive techniques and countermeasures. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
* Communication Jammer (AT) Training School | |||
**Curriculum:** This school teaches recruits about electronic warfare and communication jamming. Training includes jamming equipment operation, electronic warfare theory, and counter-jamming techniques. | **Curriculum:** This school teaches recruits about electronic warfare and communication jamming. Training includes jamming equipment operation, electronic warfare theory, and counter-jamming techniques. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
*Infrastructure Sabotage Expert (AT) Training School | |||
**Curriculum:** Infrastructure Sabotage Experts undergo advanced training in physical and cyber-infrastructure sabotage tactics. Recruits learn about critical infrastructure vulnerabilities and exploitation. | **Curriculum:** Infrastructure Sabotage Experts undergo advanced training in physical and cyber-infrastructure sabotage tactics. Recruits learn about critical infrastructure vulnerabilities and exploitation. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
* Threat Indicator Collector (AT) Training School | |||
**Curriculum:** Threat Indicator Collectors undergo advanced training in collecting and analyzing threat indicators. Recruits learn about indicator types, collection methods, and correlation techniques. | **Curriculum:** Threat Indicator Collectors undergo advanced training in collecting and analyzing threat indicators. Recruits learn about indicator types, collection methods, and correlation techniques. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
* Intelligence Dissemination Specialist (AT) Training School | |||
**Curriculum:** This school focuses on advanced intelligence dissemination techniques and strategies. Recruits learn how to effectively share threat intelligence with relevant parties. | **Curriculum:** This school focuses on advanced intelligence dissemination techniques and strategies. Recruits learn how to effectively share threat intelligence with relevant parties. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
*Vulnerability Manager (AT) Training School | |||
**Curriculum:** Vulnerability Managers receive advanced training in managing vulnerabilities within a cybersecurity program. Training includes vulnerability assessment, prioritization, and remediation. | **Curriculum:** Vulnerability Managers receive advanced training in managing vulnerabilities within a cybersecurity program. Training includes vulnerability assessment, prioritization, and remediation. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
*Security Assessment Analyst (AT) Training School | |||
**Curriculum:** Security Assessment Analysts undergo advanced training in conducting comprehensive security assessments. Recruits learn about security testing methodologies and reporting. | **Curriculum:** Security Assessment Analysts undergo advanced training in conducting comprehensive security assessments. Recruits learn about security testing methodologies and reporting. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
*Patch Management Specialist (AT) Training School | |||
**Curriculum:** Patch Management Specialists receive advanced training in planning and implementing patch management strategies. Training includes vulnerability patching, testing, and deployment. | **Curriculum:** Patch Management Specialists receive advanced training in planning and implementing patch management strategies. Training includes vulnerability patching, testing, and deployment. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
*Vulnerability Remediation Coordinator (AT) Training School | |||
**Curriculum:** Vulnerability Remediation Coordinators undergo advanced training in coordinating and managing vulnerability remediation efforts. Training includes communication, prioritization, and tracking. | **Curriculum:** Vulnerability Remediation Coordinators undergo advanced training in coordinating and managing vulnerability remediation efforts. Training includes communication, prioritization, and tracking. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
*Infrastructure Designer (AT) Training School | |||
**Curriculum:** Infrastructure Designers undergo advanced training in designing secure network and IT infrastructures. Training includes advanced architectural concepts and security practices. | **Curriculum:** Infrastructure Designers undergo advanced training in designing secure network and IT infrastructures. Training includes advanced architectural concepts and security practices. | ||
**Training Length:** 5 months | **Training Length:** 5 months | ||
* Systems Engineer (AT) Training School | |||
**Curriculum:** Systems Engineers receive advanced training in managing and securing IT systems. Training covers system administration, hardening, and security best practices. | **Curriculum:** Systems Engineers receive advanced training in managing and securing IT systems. Training covers system administration, hardening, and security best practices. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
* Cloud Solutions Architect (AT) Training School | |||
**Curriculum:** Cloud Solutions Architects undergo advanced training in designing and securing cloud-based solutions. Training includes cloud architecture, migration, and security considerations. | **Curriculum:** Cloud Solutions Architects undergo advanced training in designing and securing cloud-based solutions. Training includes cloud architecture, migration, and security considerations. | ||
**Training Length:** 5 months | **Training Length:** 5 months | ||
* Software Engineer (AT) Training School | |||
**Curriculum:** Software Engineers receive advanced training in software development with a focus on security. Training includes secure coding practices and software security testing. | **Curriculum:** Software Engineers receive advanced training in software development with a focus on security. Training includes secure coding practices and software security testing. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
* Application Developer (AT) Training School | |||
**Curriculum:** Application Developers undergo advanced training in developing secure applications. Training covers application security, threat modeling, and secure coding. | **Curriculum:** Application Developers undergo advanced training in developing secure applications. Training covers application security, threat modeling, and secure coding. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
* DevOps Engineer (AT) Training School | |||
**Curriculum:** DevOps Engineers receive advanced training in integrating security into the DevOps lifecycle. Training includes DevSecOps principles and automation for security. | **Curriculum:** DevOps Engineers receive advanced training in integrating security into the DevOps lifecycle. Training includes DevSecOps principles and automation for security. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
* Scripting Specialist (AT) Training School | |||
**Curriculum:** Scripting Specialists undergo advanced training in scripting for cybersecurity purposes. Training includes scripting languages, automation, and scripting for security tasks. | **Curriculum:** Scripting Specialists undergo advanced training in scripting for cybersecurity purposes. Training includes scripting languages, automation, and scripting for security tasks. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
* Infrastructure Manager (AT) Training School | |||
**Curriculum:** Infrastructure Managers receive advanced training in managing complex cybersecurity infrastructure. Training includes infrastructure optimization, scalability, and resource allocation. | **Curriculum:** Infrastructure Managers receive advanced training in managing complex cybersecurity infrastructure. Training includes infrastructure optimization, scalability, and resource allocation. | ||
**Training Length:** 5 months | **Training Length:** 5 months | ||
* Network Administrator (AT) Training School | |||
**Curriculum:** Network Administrators undergo advanced training in managing and securing network infrastructure. Training includes network design, configuration, and troubleshooting. | **Curriculum:** Network Administrators undergo advanced training in managing and securing network infrastructure. Training includes network design, configuration, and troubleshooting. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
* Systems Administrator (AT) Training School | |||
**Curriculum:** Systems Administrators receive advanced training in managing and securing IT systems, servers, and endpoints. Training covers advanced system administration and security practices. | **Curriculum:** Systems Administrators receive advanced training in managing and securing IT systems, servers, and endpoints. Training covers advanced system administration and security practices. | ||
**Training Length:** 4 months | **Training Length:** 4 months | ||
* Cloud Operations Specialist (AT) Training School | |||
**Curriculum:** Cloud Operations Specialists undergo advanced training in managing and securing cloud-based operations. Training includes advanced cloud services, automation, and security best practices. | **Curriculum:** Cloud Operations Specialists undergo advanced training in managing and securing cloud-based operations. Training includes advanced cloud services, automation, and security best practices. | ||
**Training Length:** 5 months | **Training Length:** 5 months | ||
* Exploit Developer (AT) Training School | |||
**Curriculum:** Exploit Developers receive advanced training in developing and analyzing exploits. Training includes exploit development techniques, vulnerability analysis, and reverse engineering. | **Curriculum:** Exploit Developers receive advanced training in developing and analyzing exploits. Training includes exploit development techniques, vulnerability analysis, and reverse engineering. | ||
**Training Length:** 5 months | **Training Length:** 5 months | ||
* Vulnerability Researcher (AT) Training School | |||
**Curriculum:** Vulnerability Researchers undergo advanced training in identifying, analyzing, and mitigating software vulnerabilities. Training includes vulnerability research methodologies and security assessments. | **Curriculum:** Vulnerability Researchers undergo advanced training in identifying, analyzing, and mitigating software vulnerabilities. Training includes vulnerability research methodologies and security assessments. | ||
**Training Length:** 5 months | **Training Length:** 5 months | ||
* Malware Analyst (AT) Training School | |||
**Curriculum:** Malware Analysts receive advanced training in analyzing and combating malware threats. Training covers malware analysis techniques, threat hunting, and incident response. | **Curriculum:** Malware Analysts receive advanced training in analyzing and combating malware threats. Training covers malware analysis techniques, threat hunting, and incident response. | ||
**Training Length:** 5 months | **Training Length:** 5 months | ||
*Red Team Operator (AT) Training School | |||
**Curriculum:** Red Team Operators undergo advanced training in simulating cyberattacks and assessing an organization's security posture. Training includes red teaming methodologies and advanced attack simulations. | **Curriculum:** Red Team Operators undergo advanced training in simulating cyberattacks and assessing an organization's security posture. Training includes red teaming methodologies and advanced attack simulations. | ||
**Training Length:** 5 months | **Training Length:** 5 months | ||
=== Training and Education Schools === | === Training and Education Schools === | ||
edits