Posts Tagged Epsilon
Year 2011 proved to be the record year for cyber attacks. Security experts have discovered the biggest series of cyber attacks to date, involving the infiltration of the networks of 72 organizations including the United Nations, governments and companies around the world.
The graph shows many of the main Cyber Events of this tremendous 2011 up to June 16, 2011. Additional attacks were discovered against U.S. Defense Contractors (L-3 on April 6th, and Northrop Grumman on May 26th) as well. Cyber acts are a growing problem.
Other companies that suffered cyber attacks later in the year were Sega video game software developer, and the biggest security breach of the year: Zappos online shoe and apparel shop.
Would you information to protect your company against this modern day threat?
Applied Technology Institute, LLC offers a new Cyber Warfare-Theory and Fundamentals course on April 3-4, 2012 in Columbia, MD.
This two-day course is intended for technical and programmatic staff involved in the development, analysis, or testing of Information Assurance, Network Warfare, Network-Centric, and NetOPs systems. The course will provide perspective on emerging policy, doctrine, strategy, and operational constraints affecting the development of cyber warfare systems. This knowledge will greatly enhance participants’ ability to develop operational systems and concepts that will produce integrated, controlled, and effective cyber effects at each warfare level. U.S. citizenship required for students registered in this course.
You will learn the following:
- What are the relationships between cyber warfare, information assurance, information operations, and network-centric warfare?
- How can a cyber warfare capability enable freedom of action in cyberspace?
- What are legal constraints on cyber warfare?
- How can cyber capabilities meet standards for weaponization?
- How should cyber capabilities be integrated with military exercises?
- How can military and civilian cyberspace organizations prepare and maintain their workforce to play effective roles in cyberspace?
- What is the Comprehensive National Cybersecurity Initiative (CNCI)?
From this course you will obtain in-depth knowledge and awareness of the cyberspace domain, its functional characteristics, and its organizational inter-relationships enabling your organization to make meaningful contributions in the domain of cyber warfare through technical consultation, systems development, and operational test & evaluation.
Call today for registration at 410-956-8805 or 888-501-2100 or access registration page on our website at. Any ATI course can be presented as an on-site at your facility. For general questions please email us at ATI@ATIcourses.com
ATI specializes in short course technical training
Our mission here at the Applied Technology Institute (ATI) is to provide expert training and the highest quality professional development in space, communications, defense, sonar, radar, and signal processing. We are not a one-size-fits-all educational facility. Our short classes include both introductory and advanced courses.