Imperial Cyber Corps of Paulastra: Difference between revisions

Jump to navigation Jump to search
m
Tag: 2017 source edit
Tag: 2017 source edit
Line 360: Line 360:
=== Basic Training (BT) Schools ===
=== Basic Training (BT) Schools ===
   
   
==== Policy Officer (BT) Training School ====
* Policy Officer (BT) Training School  
**Curriculum:** This school provides comprehensive training in cybersecurity policy fundamentals. Recruits learn about policy development, analysis, and implementation. They study relevant laws and regulations, as well as best practices in policy creation.
**Curriculum:** This school provides comprehensive training in cybersecurity policy fundamentals. Recruits learn about policy development, analysis, and implementation. They study relevant laws and regulations, as well as best practices in policy creation.
**Training Length:** 3 months
**Training Length:** 3 months
   
   
==== IAM Administrator (BT) Training School ====
*IAM Administrator (BT) Training School  
**Curriculum:** The IAM Administrator Training School focuses on the basics of identity and access management. Recruits learn about user provisioning, access control, and authentication methods. They gain hands-on experience in managing user identities and access rights.
**Curriculum:** The IAM Administrator Training School focuses on the basics of identity and access management. Recruits learn about user provisioning, access control, and authentication methods. They gain hands-on experience in managing user identities and access rights.
**Training Length:** 2 months
**Training Length:** 2 months
   
   
==== Compliance Manager (BT) Training School ====
* Compliance Manager (BT) Training School  
**Curriculum:** This school covers the basics of compliance within the cybersecurity domain. Recruits study regulatory requirements, auditing techniques, and compliance reporting. They learn how to assess and ensure compliance with cybersecurity laws and standards.
**Curriculum:** This school covers the basics of compliance within the cybersecurity domain. Recruits study regulatory requirements, auditing techniques, and compliance reporting. They learn how to assess and ensure compliance with cybersecurity laws and standards.
**Training Length:** 3 months
**Training Length:** 3 months
   
   
==== Risk Manager (BT) Training School ====
* Risk Manager (BT) Training School  
**Curriculum:** Risk management is the focus of this training school. Recruits delve into cyber risk assessment, risk management frameworks, and effective risk reporting. They acquire the skills needed to identify, analyze, and mitigate cybersecurity risks.
**Curriculum:** Risk management is the focus of this training school. Recruits delve into cyber risk assessment, risk management frameworks, and effective risk reporting. They acquire the skills needed to identify, analyze, and mitigate cybersecurity risks.
**Training Length:** 3 months
**Training Length:** 3 months
   
   
==== Cyber Risk Analyst (BT) Training School ====
*Cyber Risk Analyst (BT) Training School  
**Curriculum:** This school focuses on the basics of cyber risk analysis. Recruits learn how to identify, assess, and prioritize cybersecurity risks. The curriculum covers risk assessment methodologies and tools.
**Curriculum:** This school focuses on the basics of cyber risk analysis. Recruits learn how to identify, assess, and prioritize cybersecurity risks. The curriculum covers risk assessment methodologies and tools.
**Training Length:** 3 months
**Training Length:** 3 months
   
   
==== Threat Intelligence Analyst (BT) Training School ====
* Threat Intelligence Analyst (BT) Training School  
**Curriculum:** Threat Intelligence Analysts receive foundational training in gathering, analyzing, and interpreting cyber threat intelligence. Recruits learn about threat indicators, cyber threat landscape, and information sources.
**Curriculum:** Threat Intelligence Analysts receive foundational training in gathering, analyzing, and interpreting cyber threat intelligence. Recruits learn about threat indicators, cyber threat landscape, and information sources.
**Training Length:** 3 months
**Training Length:** 3 months
   
   
==== Penetration Tester (BT) Training School ====
* Penetration Tester (BT) Training School  
**Curriculum:** This school provides comprehensive training in ethical hacking and penetration testing. Recruits learn to identify vulnerabilities, conduct security assessments, and exploit weaknesses responsibly. The curriculum includes hands-on lab exercises.
**Curriculum:** This school provides comprehensive training in ethical hacking and penetration testing. Recruits learn to identify vulnerabilities, conduct security assessments, and exploit weaknesses responsibly. The curriculum includes hands-on lab exercises.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Access Control Analyst (BT) Training School ====
* Access Control Analyst (BT) Training School  
**Curriculum:** This school focuses on access control mechanisms, including authentication, authorization, and access management. Recruits learn to implement and manage access control solutions.
**Curriculum:** This school focuses on access control mechanisms, including authentication, authorization, and access management. Recruits learn to implement and manage access control solutions.
**Training Length:** 3 months
**Training Length:** 3 months
   
   
==== Cyber Reconnaissance Specialist (BT) Training School ====
* Cyber Reconnaissance Specialist (BT) Training School  
**Curriculum:** Recruits in this school receive foundational training in cyber reconnaissance techniques. Training includes open-source intelligence (OSINT) gathering, reconnaissance tools, and information discovery.
**Curriculum:** Recruits in this school receive foundational training in cyber reconnaissance techniques. Training includes open-source intelligence (OSINT) gathering, reconnaissance tools, and information discovery.
**Training Length:** 3 months
**Training Length:** 3 months
   
   
==== Information Gatherer (BT) Training School ====
* Information Gatherer (BT) Training School  
**Curriculum:** This school teaches recruits how to gather and analyze information relevant to cybersecurity investigations. Training includes information sources, data collection, and analysis methods.
**Curriculum:** This school teaches recruits how to gather and analyze information relevant to cybersecurity investigations. Training includes information sources, data collection, and analysis methods.
**Training Length:** 2 months
**Training Length:** 2 months
   
   
==== Cyber Disruption Specialist (BT) Training School ====
* Cyber Disruption Specialist (BT) Training School  
**Curriculum:** Prevention Specialists receive training in security engineering and the implementation of security measures. Recruits learn about firewalls, access control, and security policies.
**Curriculum:** Prevention Specialists receive training in security engineering and the implementation of security measures. Recruits learn about firewalls, access control, and security policies.
**Training Length:** 3 months
**Training Length:** 3 months
   
   
==== Penetration Tester (BT) Training School ====
* Penetration Tester (BT) Training School  
**Curriculum:** This school focuses on the fundamentals of penetration testing, ethical hacking, and security testing. Recruits learn how to identify vulnerabilities, exploit them, and provide mitigation recommendations.
**Curriculum:** This school focuses on the fundamentals of penetration testing, ethical hacking, and security testing. Recruits learn how to identify vulnerabilities, exploit them, and provide mitigation recommendations.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Zero-Day Exploiter (BT) Training School ====
* Zero-Day Exploiter (BT) Training School  
**Curriculum:** Recruits in this school receive foundational training in discovering and exploiting zero-day vulnerabilities. Training includes reverse engineering, exploit development, and vulnerability analysis.
**Curriculum:** Recruits in this school receive foundational training in discovering and exploiting zero-day vulnerabilities. Training includes reverse engineering, exploit development, and vulnerability analysis.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Threat Intelligence Analyst (BT) Training School ====
* Threat Intelligence Analyst (BT) Training School  
**Curriculum:** Threat Intelligence Analysts undergo training in collecting, analyzing, and disseminating threat intelligence. Recruits learn about threat indicators, threat landscapes, and threat intelligence platforms.
**Curriculum:** Threat Intelligence Analysts undergo training in collecting, analyzing, and disseminating threat intelligence. Recruits learn about threat indicators, threat landscapes, and threat intelligence platforms.
**Training Length:** 3 months
**Training Length:** 3 months
   
   
==== Cyber Threat Researcher (BT) Training School ====
* Cyber Threat Researcher (BT) Training School  
**Curriculum:** Cyber Threat Researchers receive foundational training in researching and analyzing cyber threats. Training includes malware analysis, incident response, and threat actor profiling.
**Curriculum:** Cyber Threat Researchers receive foundational training in researching and analyzing cyber threats. Training includes malware analysis, incident response, and threat actor profiling.
**Training Length:** 3 months
**Training Length:** 3 months
   
   
==== Cyber Forensics Investigator (BT) Training School ====
* Cyber Forensics Investigator (BT) Training School  
**Curriculum:** Recruits in this school learn the fundamentals of digital forensics, evidence collection, and analysis. Training includes data recovery, chain of custody, and forensic tools.
**Curriculum:** Recruits in this school learn the fundamentals of digital forensics, evidence collection, and analysis. Training includes data recovery, chain of custody, and forensic tools.
**Training Length:** 5 months
**Training Length:** 5 months
   
   
==== Digital Evidence Analyst (BT) Training School ====
* Digital Evidence Analyst (BT) Training School ====
**Curriculum:** Digital Evidence Analysts undergo training in analyzing digital evidence, including documents, images, and files. Training covers evidence preservation, authentication, and analysis techniques.
**Curriculum:** Digital Evidence Analysts undergo training in analyzing digital evidence, including documents, images, and files. Training covers evidence preservation, authentication, and analysis techniques.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Incident Response Coordinator (BT) Training School ====
*Incident Response Coordinator (BT) Training School  
**Curriculum:** This school focuses on incident response coordination and management. Recruits learn how to effectively respond to cybersecurity incidents, coordinate teams, and manage incident documentation.
**Curriculum:** This school focuses on incident response coordination and management. Recruits learn how to effectively respond to cybersecurity incidents, coordinate teams, and manage incident documentation.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Attribution Specialist (BT) Training School ====
* Attribution Specialist (BT) Training School  
**Curriculum:** Attribution Specialists receive training in identifying and tracking cyber threat actors. Training includes threat actor profiling, attribution techniques, and threat actor motivations.
**Curriculum:** Attribution Specialists receive training in identifying and tracking cyber threat actors. Training includes threat actor profiling, attribution techniques, and threat actor motivations.
**Training Length:** 4 months
**Training Length:** 4 months
   
   
==== Cyber Architect (BT) Training School ====
* Cyber Architect (BT) Training School  
**Curriculum:** Recruits in this school learn the fundamentals of cyber architecture, network design, and cybersecurity infrastructure. Training covers architectural principles and security considerations.
**Curriculum:** Recruits in this school learn the fundamentals of cyber architecture, network design, and cybersecurity infrastructure. Training covers architectural principles and security considerations.
**Training Length:** 5 months
**Training Length:** 5 months
=== Advanced Training (AT) Schools ===
=== Advanced Training (AT) Schools ===
   
   
175

edits

Navigation menu