Course Overview
TOPThe 3-day instructor-led training experience provides students with the important skills and information for overcoming conflicts in a cyber-war. The course addresses the strategic, operational, and tactical aspects of the conflicts and then apply this knowledge for creating efficient procedures and technical defenses. Risk management and security professionals can certainly find this training beneficial as they are tasked with resource allocation, driving security projects and policies for organizations.
Scheduled Classes
TOPWhat You'll Learn
TOP- Introduction to Cyber Warfare
- The Layout of Cyberspace
- Cyber Warriors
- Computer Network Operations (CNO) Tools
- Physical Weapons
- Psychological Weapons
- Fundamentals of Computer Network Exploitation (CNE)
- Computer Network Attack (CNA)
- Computer Network Defense
- Compuer Network Operations Extra Players and Factors
- Cyber Warfare and Global Legal Systems
- Ethics
- The Future of Cyber War
Outline
TOP
Viewing outline for:
Module 1: The Cyberwarfare Landscape
- Lesson 1A: Information as a Military Asset
- Lesson 1B: Targets and Combatants
- Lesson 1C: Cyberwarfare, Law, and Ethics
- Lesson 1D: Intelligence Operations in a Connected World
Module 2: Offensive and Defensive Cyberwarfare
- Lesson 2A: The Evolving Threat: From Script Kiddies to Advanced Attackers
- Lesson 2B: Social Engineering and Cyberwarfare
- Lesson 2C: Weaponizing Cyberspace: A History
- Lesson 2D: Nonstate Actors in Cyberwar
- Lesson 2E: Defense-in-Depth Strategies
- Lesson 2F: Cryptography and Cyberwar
- Lesson 2G: Defending Endpoints
- Lesson 2H: Defending Networks
- Lesson 2I: Defending Data
Module 3: The Future of Cyberwarfare
- Lesson 3A: Cyberwarfare and Military Doctrine
Prerequisites
TOPBefore attending this course, students should have:
- At least three years of experience in IT field, specifically security
- CompTIA Security+ or EC-Council CEH certifications or hold equivalent experience and knowledge
Who Should Attend
TOPThis course is intended for:
- Policy Makers
- CEOs
- CISOs
- Doctrinal Development
- Penetration Testers
- Network Administrators
- Systems Administrators