top header
top gradation HOME top vertical line top vertical line top vertical line top vertical line top vertical line top vertical line top vertical line menu gray
black line 2
menu gray tab More About ATI
menu blue ATI — Who We Are
white line
menu blue Contact ATI Courses
white line
menu blue List Of ATI Courses
white line
menu blue Attendees Testimonials
white line
menu blue The ATI FAQ Sheet
white line
menu blue Suggestions/Wait List
white line
menu blue New Courses
white line
menu blue Become an ATI Instructor
menu gray tab site resources
menu blue Acoustics & Sonar
white line
menu blue Rockets & Space
white line
menu blue GPS Technology
white line
menu blue ATI Blog
white line
menu blue ATI Space News
white line
menu blue ATI Site Map
white line
menu blue ATI Staff Tutorials
white line
menu blue ATI Sampler Page
white line
menu gray tab bar
menu gray tab courses
white line
menu blue Current Schedule
white line
menu blue Onsite Courses
white line
menu blue Register Online
white line
menu blue Request Brochure
white line
menu blue Free On-Site Price Quote
white line
menu blue Download Catalog
white line
menu blue Distance Learning
black line  

The Doctrine, Strategy, Policy, & Theory of Operational Cybersecurity

ATI's Cyber Warfare - Global Trends course


Share |

Summary:

Technical Training Short On Site Course Quote

This three-day course is intended for operational leaders and programmatic staff involved in the planning, analysis, or testing of Cyber Warfare and Network-Centric systems. The course will provide perspective on emerging policy, doctrine, strategy, and operational constraints affecting the development of cyber warfare systems. This knowledge will greatly enhance participants' ability to develop operational systems and concepts that will produce integrated, controlled, and effective cyber effects at each warfare level.

This course is appropriate for both new and experience people working in cyber security. The value of this course is to help engineers & scientists understand how their senior customers view cyber security & enable them to speak broadly on the topic with those customers and to understand different conops. The course is not detailed in programming techniques and tools. Those wanting that material should take one of the Certified Ethical Hacker classes.

U.S. citizenship required for students registered in this course. more info

Survey On Growing Trends in Cyber Security Jobs

Tuition:

Instructor:

What You Will Learn:

  • What are the relationships between cyber warfare, information assurance, information operations, and network-centric warfare?
  • How can a cyber warfare capability enable freedom of action in cyberspace?
  • What are legal constraints on cyber warfare?
  • How can cyber capabilities meet standards for weaponization?
  • How should cyber capabilities be integrated with military exercises?
  • How can military and civilian cyberspace organizations prepare and maintain their workforce to play effective roles in cyberspace?
  • What is the Comprehensive National Cybersecurity Initiative (CNCI)?

      From this course you will obtain in-depth knowledge and awareness of the cyberspace domain, its functional characteristics, and its organizational inter-relationships enabling your organization to make meaningful contributions in the domain of cyber warfare through technical consultation, systems development, and operational test & evaluation.

Course Outline:

  1. Global Internet Governance
  2. A Cyber Power Framework
  3. Global Supply Chain & Outsourcing Issues
  4. Critical Infrastructure Issues
  5. U.S. Cyberspace Doctrine and Strategy.
  6. Cyberspace as a Warfare Domain.
  7. Netcentricity
  8. U.S. Organizational Constructs in Cyber Warfare.
  9. Legal Considerations for Cyber Warfare.
  10. Operational Theory of Cyber Warfare.
  11. Operational and Tactical Maneuver in Cyberspace - Stack Positioning
  12. Capability Development & Weaponization.
  13. Cyber Warfare Training and Exercise Requirements.
  14. Command & Control for Cyber Warfare.
  15. Cyber War Case Study
  16. Human Capital in Cybersecurity
  17. Survey of International Cyber Warfare Doctrine & Capabilities.
  18. Large-Scale Cybersecurity Mechanisms
  19. Social Considerations in Cybersecurity - Culture & the Human Interface
  20. Cybersecurity, Civil Liberties, & Freedom Around the World
  21. Non-State Actor Trends - Cyber Crime, Cyber Terrorism, Hactivism
  22. Homeland Security Case Study / Industrial Espionage Case Study


Tuition:

This course is not on the current schedule of open enrollment courses. If you are interested in attending this or another course as open enrollment, please contact us at (410) 956-8805 or at ati@aticourses.com and indicate the course name and number of students who wish to participate. ATI typically schedules courses with a lead time of 3-5 months. Group courses can be presented at your facility. For on-site pricing, request an on-site quote. You may also call us at (410) 956-8805 or email us at ati@aticourses.com.

Register Now Without Obligation

spacer