Module/Workshop

Overview of Cyber Threats

2 Lessons

This is the first module in the Cyber Intelligence: Analyzing Cyber Adversaries and Threats course.  The purpose of this module is to introduce students to trends and challenges in cyber threats. The material is approached from the perspective of what are examples of cyber threats, how are they impacting on cyber security and how are we responding.  

This module provides a high-level introduction to cyber intelligence to prepare students for opportunities as cyber analysts and/or cyber intelligence specialists in industry and government.

Learning Objectives
  • Describe some common cyber threats
  • Explain the evolving trends and challenges associated with cyber threats
  • Describe the relationship between hacking and cyber security industries
  • Provide examples of ways that we defend against cyber threats
  • Describe the relationship between cyber security and cyber intelligence
  • Explain how cyber intelligence fits into one of the seven categories of the National Cybersecurity Workforce Framework (NCWF)
  • Start to practice safe cyber operational security (aka) cyber security hygiene such as not using the same password on multiple accounts and being cautious about clicking on links in email messages
Faculty Instructions

This module has been designed with configurability in mind. Optional homework and additional assessment opportunities are outlined in each lesson plan, but can be incorporated or completely left out at the discretion of the instructor (with no adverse effect).

Each lesson includes links to videos and team exercises requiring students to pause, engage in discussion, and apply the concepts.  For example, Lesson 1 includes several exercises in which the first one involves watching a cyber threat video and answering questions.

This module also contains a quiz for each lesson. The quiz has matching and short essays. An answer key is provided.

Files
Overview of Cyber Threats Module Description

Log In
to download materials

* NICE Cybersecurity Workforce Framework KSAs Addressed
  • K0005: * Knowledge of cyber threats and vulnerabilities.
  • K0045: Knowledge of information security systems engineering principles.
  • K0059: Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
  • K0114: Knowledge of electronic devices (e.g., computer systems/components, access control devices, digital cameras, electronic organizers, hard drives, memory cards, modems, network components, printers, removable storage devices, scanners, telephones, copiers, credit card skimmers, facsimile machines, global positioning systems [GPSs]).
  • K0151: Knowledge of current and emerging threats/threat vectors.
  • K0309: Knowledge of emerging technologies that have potential for exploitation by adversaries.
* NSA/DHS Center of Excellence (CAE) KUs Addressed
  • Cyber Threats (CTH)

* Most courseware content maps to NIST NICE Cybersecurity Workforce Framework (NCWF) Knowledge, Skills, and Abilities (KSAs) and/or NSA/DHS CAE Knowledge Units (KUs). For more information on KSAs and KUs, please visit:

KSAs: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.pdf

KUs: https://www.iad.gov/NIETP/documents/Requirements/CAE-CD_2019_Knowledge_Units.pdf