Defensive CyberOps: Defensive Cyberspace Operations
IT Security
| Intermediate
- 14 videos | 42m 26s
- Includes Assessment
- Earns a Badge
A well-planned and properly executed DCO mission will enable the cyber warrior to repel attacks and rapidly prepare for offensive action. In this course, you'll learn the principles of Defensive Cyber Operations, including measures and responses. You'll explore cybersecurity and cyberspace operations in DCO. Next, you'll look at DCO analytics, missions, and operating domains. You'll explore the role of the mission owner and network owner in DCO, as well as planning considerations. Finally, you'll learn about cyberspace threats that may occur during the course of maneuver operations and common security and system tools used in DCO.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe the doctrinal principles of defensive cyber operationsDescribe the operations of dco in terms of missions, actions, and forcesDescribe the role of dco in terms of traditional network, system security, and administrationDescribe the purpose of dco in relation to cyberspace operationsDescribe the functions of c2, intel, host, network, and analytic functions for dcoDescribe and compare the different types of dco missions
-
Describe the dco operating domain responsibilities in terms of blue, gray, and red spaceDescribe the role of the mission owner in dcoDescribe the role of the network owner in dcoDescribe considerations for dco planning and coordinationDescribe cyberspace threats during the course of maneuver operationsDescribe situations in which common security and system tools are used in dcoSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 30s
-
4m 25sUpon completion of this video, you will be able to describe the doctrinal principles of Defensive Cyber Operations. FREE ACCESS
-
3m 59sUpon completion of this video, you will be able to describe the operations of DCO in terms of missions, actions, and forces. FREE ACCESS
-
3m 22sUpon completion of this video, you will be able to describe the role of DCO in terms of traditional network security, system security, and administration. FREE ACCESS
-
3m 12sUpon completion of this video, you will be able to describe the purpose of DCO in relation to cyberspace operations. FREE ACCESS
-
3m 33sUpon completion of this video, you will be able to describe the functions of C2, intelligence, host, network, and analytic functions for DCO. FREE ACCESS
-
2m 18sAfter completing this video, you will be able to describe and compare the different types of DCO missions. FREE ACCESS
-
2m 48sAfter completing this video, you will be able to describe the DCO operating domain responsibilities in terms of blue, gray, and red space. FREE ACCESS
-
2m 27sUpon completion of this video, you will be able to describe the role of the mission owner in the DCO process. FREE ACCESS
-
4m 1sAfter completing this video, you will be able to describe the role of the network owner in data center operations. FREE ACCESS
-
3m 20sUpon completion of this video, you will be able to describe considerations for DCO planning and coordination. FREE ACCESS
-
3m 21sAfter completing this video, you will be able to describe cyberspace threats during the course of maneuver operations. FREE ACCESS
-
3mAfter completing this video, you will be able to describe situations in which common security and system tools are used in data center operations. FREE ACCESS
-
1m 12s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.