Defensive CyberOps: Defensive Cyberspace Operations

IT Security    |    Intermediate
  • 14 videos | 42m 26s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 18 users Rating 4.5 of 18 users (18)
A well-planned and properly executed DCO mission will enable the cyber warrior to repel attacks and rapidly prepare for offensive action. In this course, you'll learn the principles of Defensive Cyber Operations, including measures and responses. You'll explore cybersecurity and cyberspace operations in DCO. Next, you'll look at DCO analytics, missions, and operating domains. You'll explore the role of the mission owner and network owner in DCO, as well as planning considerations. Finally, you'll learn about cyberspace threats that may occur during the course of maneuver operations and common security and system tools used in DCO.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the doctrinal principles of defensive cyber operations
    Describe the operations of dco in terms of missions, actions, and forces
    Describe the role of dco in terms of traditional network, system security, and administration
    Describe the purpose of dco in relation to cyberspace operations
    Describe the functions of c2, intel, host, network, and analytic functions for dco
    Describe and compare the different types of dco missions
  • Describe the dco operating domain responsibilities in terms of blue, gray, and red space
    Describe the role of the mission owner in dco
    Describe the role of the network owner in dco
    Describe considerations for dco planning and coordination
    Describe cyberspace threats during the course of maneuver operations
    Describe situations in which common security and system tools are used in dco
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 30s
  • 4m 25s
    Upon completion of this video, you will be able to describe the doctrinal principles of Defensive Cyber Operations. FREE ACCESS
  • Locked
    3.  DCO Measures and Response
    3m 59s
    Upon completion of this video, you will be able to describe the operations of DCO in terms of missions, actions, and forces. FREE ACCESS
  • Locked
    4.  DCO and Cybersecurity
    3m 22s
    Upon completion of this video, you will be able to describe the role of DCO in terms of traditional network security, system security, and administration. FREE ACCESS
  • Locked
    5.  DCO Maneuver Operations
    3m 12s
    Upon completion of this video, you will be able to describe the purpose of DCO in relation to cyberspace operations. FREE ACCESS
  • Locked
    6.  DCO Analytics
    3m 33s
    Upon completion of this video, you will be able to describe the functions of C2, intelligence, host, network, and analytic functions for DCO. FREE ACCESS
  • Locked
    7.  DCO Missions
    2m 18s
    After completing this video, you will be able to describe and compare the different types of DCO missions. FREE ACCESS
  • Locked
    8.  DCO Operating Domains
    2m 48s
    After completing this video, you will be able to describe the DCO operating domain responsibilities in terms of blue, gray, and red space. FREE ACCESS
  • Locked
    9.  DCO Mission Owner
    2m 27s
    Upon completion of this video, you will be able to describe the role of the mission owner in the DCO process. FREE ACCESS
  • Locked
    10.  DCO Network Owner
    4m 1s
    After completing this video, you will be able to describe the role of the network owner in data center operations. FREE ACCESS
  • Locked
    11.  DCO Planning Considerations
    3m 20s
    Upon completion of this video, you will be able to describe considerations for DCO planning and coordination. FREE ACCESS
  • Locked
    12.  DCO Threat Detection and Characterization
    3m 21s
    After completing this video, you will be able to describe cyberspace threats during the course of maneuver operations. FREE ACCESS
  • Locked
    13.  DCO Tools and Capabilities
    3m
    After completing this video, you will be able to describe situations in which common security and system tools are used in data center operations. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 12s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.6 of 1033 users Rating 4.6 of 1033 users (1033)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 215 users Rating 4.6 of 215 users (215)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.8 of 26 users Rating 4.8 of 26 users (26)