- Payment Agreement
- › Our Cyber Training Courses
- Cyber Leader Course (CLC)
- Cyber Mission Foundations (CMF)
- Digital Forensics & Analysis (DFA)
- Mobile Digital Forensics (MDF)
- Offensive Methodology & Analysis (OMA)
- Windows & Linux Scripting (WLS)
- Windows Exploitation & Analysis (WEA)
- My Account
- Log In
- Class Alerts
- My Courses
Please call to register for this class.
Cost (single seat): Please call for course pricing. Course Length: 40 Days
Additional group and government discounts available. Contact Parrot Labs for more information.
What will you get out of CMF?
In CMF, you will become familiar with the Windows and Unix operating systems and learn to identify and resolve issues present in both. In addition to learning how data is transferred, you will also become proficient in computer and network security. You will begin to exhibit the mindset and methodologies of both a network attacker and a defender while analyzing and removing network artifacts relative to mission.
What makes CMF unique?
You’ll perform exercises and scenarios in a sandboxed network, which allows you to practice and learn at your own pace without affecting other students.
Why should you enroll in CMF?
Cyber Mission Foundations (CMF) is an eight-week, four-module course designed to give you a well-rounded foundation in the fields you will need to confidently and effectively carry out business in the digital environment. Each individual module spans two weeks and focuses on providing an in-depth understanding of the subject matter through the use of various lectures, exercises, quizzes, midterms and final exams. Throughout this course, you will:
- Learn to identify, monitor and defend targeted Windows systems
- Detect and resolve threats that threaten a wide range of Unix systems
- Analyze network traffic and gain in-depth knowledge of how systems communicate
- Bolster security, conduct situational awareness surveys and explore the engineering of malware
In the Windows module, students are introduced to the Windows system, including how to identify and address a wide range of suspicious activities within the system – such as incoming and outgoing connections or persistence of executable code. By the end of the module, students will have gained an in-depth knowledge of the Windows OS, including how to proficiently traverse and operate the system via the command line.
In the Unix module, students become familiar with the core components of a Unix system and develop a greater understanding of the Linux kernel. In addition to learning to quickly assess a system’s integrity, students will also develop skills to apply Solaris and Linux techniques to address discovered threats.
In the Networking Module, students gain knowledge of system communications and how they work within local area and wide area networks. They then learn the fundamentals of data communications and a variety of networking skills, including packet and network analysis and how to traverse a network undetected using SSH tunneling and redirection.
In the Security Concepts module, students learn the proper mindset, conduct and protocol for creating and maintaining a secure environment in cyberspace. Additionally, students learn how to assess the state of an existing environment and make well-informed and confident decisions to move forward with operations based on a system’s integrity.
The ACE CREDIT logo is a registered trademark of the American Council on Education and cannot be used or reproduced without the express written consent of the American Council on Education.