Cyber Warfare – Global Trends
This three-day course is intended for operational leaders and programmatic staff involved in the planning, analysis, or testing of Cyber Warfare and Network-Centric systems. The course will provide perspective on emerging policy, doctrine, strategy, and operational constraints affecting the development of cyber warfare systems. This knowledge will greatly enhance participants’ ability to develop operational systems and concepts that will produce integrated, controlled, and effective cyber effects at each warfare level.
This course is appropriate for both new and experience people working in cyber security. The value of this course is to help engineers & scientists understand how their senior customers view cyber security & enable them to speak broadly on the topic with those customers and to understand different conops. The course is not detailed in programming techniques and tools. Those wanting that material should take one of the Certified Ethical Hacker classes.
U.S. citizenship required for students registered in this course.
What you will learn:
- What are the relationships between cyber warfare, information assurance, information operations, and network-centric warfare?
- How can a cyber warfare capability enable freedom of action in cyberspace?
- What are legal constraints on cyber warfare?
- How can cyber capabilities meet standards for weaponization?
- How should cyber capabilities be integrated with military exercises?
- How can military and civilian cyberspace organizations prepare and maintain their workforce to play effective roles in cyberspace?
- What is the Comprehensive National Cybersecurity Initiative (CNCI)?From this course you will obtain in-depth knowledge and awareness of the cyberspace domain, its functional characteristics, and its organizational inter-relationships enabling your organization to make meaningful contributions in the domain of cyber warfare through technical consultation, systems development, and operational test & evaluation.
- Global Internet Governance
- A Cyber Power Framework
- Global Supply Chain & Outsourcing Issues
- Critical Infrastructure Issues
- U.S. Cyberspace Doctrine and Strategy.
- Cyberspace as a Warfare Domain.
- U.S. Organizational Constructs in Cyber Warfare.
- Legal Considerations for Cyber Warfare.
- Operational Theory of Cyber Warfare.
- Operational and Tactical Maneuver in Cyberspace – Stack Positioning
- Capability Development & Weaponization.
- Cyber Warfare Training and Exercise Requirements.
- Command & Control for Cyber Warfare.
- Cyber War Case Study
- Human Capital in Cybersecurity
- Survey of International Cyber Warfare Doctrine & Capabilities.
- Large-Scale Cybersecurity Mechanisms
- Social Considerations in Cybersecurity – Culture & the Human Interface
- Cybersecurity, Civil Liberties, & Freedom Around the World
- Non-State Actor Trends – Cyber Crime, Cyber Terrorism, Hactivism
- Homeland Security Case Study / Industrial Espionage Case Study
REGISTRATION: There is no obligation or payment required to enter the Registration for an actively scheduled course. We understand that you may need approvals but please register as early as possible or contact us so we know of your interest in this course offering.
SCHEDULING: If this course is not on the current schedule of open enrollment courses and you are interested in attending this or another course as an open enrollment, please contact us at (410)956-8805 or email@example.com. Please indicate the course name, number of students who wish to participate. and a preferred time frame. ATI typically schedules open enrollment courses with a 3-5 month lead-time. To express your interest in an open enrollment course not on our current schedule, please email us at firstname.lastname@example.org.