All Training Courses

GT-100-DOW

Shock & Awe: Cybersecurity Awareness for DOW Members and Contractors – Level 1

Description

Buckle up for an intensive cybersecurity awareness training experience designed specifically for the DOD/DOW community! Experience live demos and workshops revealing how attackers exploit vulnerabilities and showcasing a Hacker’s Toolkit: including evil devices that spy on you, phishing scams, ransomware, Wi-Fi poisoning, Evil Twins, and poison phone hacking. Investigate how hackers exploit social engineering and social media to infiltrate protected systems. With a focus on awareness, we’ll provide actionable insights tailored to the unique demands of DOW member and contractor roles including anonymizing data and PII.

Objectives

By the end of this course, participants will be able to:

  • Promote a culture of security within your team and organization.
  • Observe Hacker Toolkit (NDA/ethics contract must be signed, no photos).
  • Identify Social Engineering Attacks
  • Recognize the increasing threat landscape targeting DOW agencies.
  • Understand the impact of data breach.
  • Learn how to identify and mitigate social engineering and cyberattack tactics.
  • Recognize Supply Chain risks
  • Understand basic bug sweep techniques.

Key Takeaways

  • Become a Human Firewall!
  • Understanding of techniques used to compromise DOW and contractor equipment
  • Understand the importance of encryption, access controls, and MFA
  • Patch management
  • Supply Chain
  • The weakest link
  • How to anonymize yourself and family online

Certificate of Completion

  • Certificate of Completion issued after successful completion of all chapters, hands-on exercises, and course evaluation.
  • Certificate is downloadable from the Ghost Team Academy Education Portal.

Training Outline

Module 1: Welcome

  • Topics:
    • Introductions and Expectations
    • Pre-exam
    • Course Overview

Module 2: Cyber Threat Landscape

  • Topics:
    • DOW and Contractors
    • Most Common Cyber Threats
    • Hacker Toolkit (NDA/ethics contract must be signed, no photos)
    • Your Office and Equipment
    • Your Home and Family
    • Bug Sweeps
  • Case Study
    • Instructor Demo: Shock & Awe surprise

Module 3: OSINT – Open Source Intelligence

  • Topics:
    • DOW Sources
    • AI
    • The Dark Web
    • Paying for it

Module 4: Encryption, VPNs, & Cloud

  • Topics:
    • Encryption Fundamentals
    • Setup A Personal VPN
    • Are Your Devices Using A Cloud?

Module 5: Passwords, Authentication, & Access Control

  • Topics:
    • Strong Password Creation and Management
    • Authentication
    • Multi-Factor Authentication (MFA)
    • Cracking Passwords
    • ID Card

Module 6: Social Engineering

  • Topics:
    • Social Engineering: The art of lying in different forms
    • Social Media: You’re Bleeding Information
    • E-Mail
    • Phone
    • Fake Cell Towers
    • Insider Threat Detection and Prevention
    • Body Language
    • Communication
  • Instructor Demo: Surprise
  • Student Workshop: NATO Breach Case Study

Module 7: Device & Network Hardening

  • Topics:
    • Securing Devices
    • Clean Desk Policies
    • Physical Access Controls
    • Remote and Hybrid Workforces
    • Secure Use of Mobile Devices
    • Public Networks
    • Your Home Camera System and Alarm

Module 8: Bug Sweeps

  • Topics:
    • Bug Sweep Basics
    • Equipment
    • Office
    • Home
    • Hotel
    • Car

Module 9: Incident Response & Compliance

  • Topics:
    • What To Do in Case of a Breach or Suspected Attack
    • Internal Reporting Channels and Protocols
    • Working with IT, Legal, and Compliance Teams
    • Regulatory Breach Notification Requirements

Module 10: Conclusion

  • Topics:
    • Course Summary
    • Key Takeaways
    • Post Course Exam, on your laptop or phone, 30 minutes. Debrief
    • Q&A

Quick Info
  • Type: Hands-On, Workshop, Lecture, Demo
  • Delivery: In Person, Virtual, Hybrid
  • Level: Foundation
  • Duration: 1 day (8 hours total)
  • CEU Hours: 8