logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

Cyber Warfare for Management

SS Course: 2001219

Course Overview

TOP

The 3-day instructor-led training experience provides students with the important skills and information for overcoming conflicts in a cyber-war. The course addresses the strategic, operational, and tactical aspects of the conflicts and then apply this knowledge for creating efficient procedures and technical defenses. Risk management and security professionals can certainly find this training beneficial as they are tasked with resource allocation, driving security projects and policies for organizations. 

                                                                  

Scheduled Classes

TOP

What You'll Learn

TOP
  • Introduction to Cyber Warfare
  • The Layout of Cyberspace
  • Cyber Warriors
  • Computer Network Operations (CNO) Tools
  • Physical Weapons
  • Psychological Weapons
  • Fundamentals of Computer Network Exploitation (CNE)
  • Computer Network Attack (CNA)
  • Computer Network Defense
  • Compuer Network Operations Extra Players and Factors
  • Cyber Warfare and Global Legal Systems
  • Ethics 
  • The Future of Cyber War

 

Outline

TOP
Viewing outline for:

Module 1: The Cyberwarfare Landscape

  • Lesson 1A: Information as a Military Asset  
  • Lesson 1B: Targets and Combatants  
  • Lesson 1C: Cyberwarfare, Law, and Ethics 
  • Lesson 1D: Intelligence Operations in a Connected World  

Module 2: Offensive and Defensive Cyberwarfare  

  • Lesson 2A: The Evolving Threat: From Script Kiddies to Advanced Attackers  
  • Lesson 2B: Social Engineering and Cyberwarfare  
  • Lesson 2C: Weaponizing Cyberspace: A History  
  • Lesson 2D: Nonstate Actors in Cyberwar   
  • Lesson 2E: Defense-in-Depth Strategies  
  • Lesson 2F: Cryptography and Cyberwar  
  • Lesson 2G: Defending Endpoints  
  • Lesson 2H: Defending Networks  
  • Lesson 2I: Defending Data  

Module 3: The Future of Cyberwarfare  

  • Lesson 3A: Cyberwarfare and Military Doctrine  

Prerequisites

TOP

Before attending this course, students should have:

  • At least three years of experience in IT field, specifically security
  • CompTIA Security+ or EC-Council CEH certifications or hold equivalent experience and knowledge

 

    Who Should Attend

    TOP

    This course is intended for:

    • Policy Makers
    • CEOs
    • CISOs
    • Doctrinal Development
    • Penetration Testers
    • Network Administrators
    • Systems Administrators

     

    Next Step Courses

    TOP