Cyber Security Certificate Program

Cyber Security Workshop

NIST Enterprise Network Defense Training Certificate Program

Earn a cyber security training certificate from the National Institute of Standards and Technology. Train on the same Cyber Range platform used by the U.S. Navy, Air Force and Army to detect and defend against malicious events.

This Enterprise Network Defense Analyst course provides the basic knowledge and practical skills necessary for cyber security personnel to defend, respond, report, mitigate, and restore enterprise systems before, during and after exploitation has occurred. An instructor from Metova Inc. will teach theory, operation, defensive techniques, and corrective action instruction for the enterprise architecture. At the end of the course, you can take an exam and receive an NIST Enterprise Network Defense Training Certificate.


Review current information available in publicly-available sources, from other more sensitive sources, and from US and International regulation, and identify how attacks are occurring and how to classify an attack.

Explain the fundamental principles of Cybersecurity and the risks to the Enterprise from vulnerabilities, threats and adversarial actors.

Describe the architecture, components, management, administration, operation and maintenance of the Enterprise Network IAW with best practices and higher authority's direction.

Understand how data bits are assembled into programming languages which form applications that ride on the operating system.

Explain and install group policies and other access controls IAW the security baseline using systems provided in the CENTS environment.

Describe how a network communicates, the principles behind network engineering, and security features of devices on the network using tools and devices found in the CENTS environment IAW best practices.

Identify, analyze, and report on application risks and vulnerabilities using tools provided within the CENTS environment.

Use network security tools and techniques to mitigate risk and eliminate threats.

In the CENTS environment, use Incident Response procedures IAW the IRP and CJCSM 6510.01B.

Suggested Prerequisites

  • Education: CS/IT Bachelors OR Industry Certification Equivalents
  • Military School: Basic Network Defense Analyst OR IT-Based Training
  • Field of Expertise: Cybersecurity Practitioner
  • Level: Journeyman

Technology Requirements

You are encouraged to bring a laptop or other device for note taking.

Arkansas residents


Out-of-state residents


Certification exam included in workshop fee.

Request More Information

Metova logo

Metova Inc. is a national software design and development company with a division that provides cyber security technology, training and IT services. Metova’s client list includes Fortune 500 companies and government agencies.


8:00 am to 11:50 am

  • Pre-test
  • Compliance
  • U.S. Laws & Permissions
  • Attack Composition
  • Executive Orders
  • Government Directives
  • Federal Criminal Statutes
  • State Laws

1:00 pm to 1:50 pm

  • National Cyber Chain of Command and Standing Cyber Mission Forces
  • Cyber Reporting Chain

2:00 pm to 2:50 pm

  • Cyber Security Definition
  • Common Attack Vectors
  • Threat Assessment
  • Risks, Threats and Vulnerabilities
  • Information Assurance
  • Risk Tolerance and Approach
  • Regulation Driving Policy
  • Navigation the DISA Website

3:00 pm to 3:50 pm

  • IT Service Management
  • Data and Security Management
  • Information and Security Management
  • Critical Infrastructure
  • Industrial Control System Operation

8:00 am to 11:50 am

  • Basic Computer Concepts
  • Major Components
  • Bootstrap Process
  • BIOS
  • Operating System and Kernel
  • Running Applications
  • Computer Language Structures
  • Basic Computer Operation
  • ITIL Event Management: Basic System Administration, Network, and Operating System Hardening Techniques
  • Operating Systems
  • System Logs
  • Compose
  • ITIL Incident Management: Six-Step Troubleshooting Technique
  • USB Devices
  • Wireless Devices

1:00 pm to 2:50 pm

  • Identify and Access Management
  • Creating and Modifying User Accounts
  • Stale Accounts
  • Secured Shares
  • Encryption
  • Cryptography
  • Digital Signatures

3:00 pm to 3:50 pm

  • OSI Model TCP/IP
  • Network Protocols
  • Monitoring Methods

8:00 am to 10:50 am

  • Packet Capture
  • Mapping and Fingerprinting
  • Protocol Analysis
  • Virtual Networks
  • Remote Login
  • VPN Security
  • Cisco Router and Switch Configuration
  • Terminology
  • Administrator Access Methods
  • Operating the Cisco Devices
  • Router Security
  • Access Control Lists
  • Configuring Network Protection Devices

11:00 am to 11:50 am

  • Programming Language Structures
  • Application Security
  • Vulnerabilities Assessment
  • Protecting Against Malware
  • Cyber Defense Tool Development
  • Unauthorized Software

1:00 pm to 1:50 pm

  • Continual Monitoring
  • Collection Management
  • Test IA
  • Using Security Management Tools

2:00 pm to 3:50 pm

  • Managing Network and Connectivity Security
  • Security Technical Implementation Guides (STIGs)
  • VRAM Overview and Asset Management Feedback
  • Internet Security Accelerator and the Forefront Threat Management Gateway
  • Intrusion Detection & Prevention Systems
  • Using SNORT

8:00 am to 8:50 am

  • Employ Defense-in-Depth
  • Coordinate with Chain of Command
  • Document and Escalate Incidents
  • Incident Response
  • Pre-Planned Responses
  • Forensics

9:00 am to 11:50 am

Putting It All Together

1:00 pm to 3:50 pm

Putting It All Together continued


8:00 am to 11:50 am

Final Team Problem

1:00 pm to 2:50 pm

Mini-Ex continued

3:00 pm to 3:50 pm

Final Exam

4:00 pm to 4:50 pm

Final Exam Review

  • Access to quality curriculum and security professionals
  • Earning a cyber security certificate demonstrates your skills and dedication to your employer, colleagues, and clients  
  • Network and learn from peers
  • Career pathway - Foundation for transitioning into cyber security within your organization or with another company.
  • Educational pathway – This cyber security certificate is intended for expert-level practitioners seeking to differentiate their skills.