- Intro to Range and Hacker Methodology
- Knowing Normal: Recognizing Traffic Patterns
- Traffic Shaping and Manipulation
- Logging and Monitoring
- Windows Hosts
- Linux Hosts
- Network Services
- Forensics
Teaching Cyber Security with the Arkansas Range
This series will cover the eight curriculum modules developed through a partnership with ADE, UCA, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.
With the increase in cyberattacks that have hit both public and private institutions across the globe in recent years, now, more than ever, the nation is in dire need of talented cybersecurity professionals.
Segment 1 of 9
Segment 2 of 9
Segment 3 of 9
Segment 4 of 9
Segment 5 of 9
Segment 6 of 9
Segment 7 of 9
Segment 8 of 9
Segment 9 of 9