Mitigating Cyber Attacks
$1490 per person
This 2-day course will show both technical and business professionals how to mitigate cyber attacks by implementing simple and inexpensive solutions to help secure wireless communications, including military communications. The course will also present some real world case studies to illustrate cyber attacks so the student can understand their potential damage.
What you will learn:
- Using simple tools to combat cyber attacks to protect military communications
- Understanding the history of cyber attacks against military communications
- Exposure to real world cyber attacks that led to the exploitation of military networks
- Relating business or technical processes to reinforce protection from cyber attacks
- Social Media Security and its relation to military communications
- Mobile Device Security and its relation to military communications
- Router Security including VPN
- Exposure to tools used by cyber attackers (i.e. Wireshark and Hash Suite)
- Military communications risks to cyber attacks
- Brief History of Technology Scams and Attacks – From the telephone to the iPhone, scammers always have their “I’s” on the prize; how today’s attackers are no different than the ones that “hacked” technology in the 1920s!
- Correlation between cyber attacks and convenience – An illustration of how our search for ease has resulted in the growth of vulnerabilities, including concerning military communications (i.e. wearing trackable exercise devices)
- Vulnerabilities in communications, specifically military communications – Examples of how complacency and convenience has made us relinquish our responsibilities to ensure secure communications
- Real-world exploitation of military communications through insider threats and how those threats could be mitigated (John Walker, Jerry Whitworth). Real world examples of how these vulnerabilities caused havoc during the Cold War.
- Cyber attack methods against wireless communications – Using available cyber attack software like WireShark and Hash Suite to collect and exploit wireless communications. Examples of how these are used today to exploit vulnerabilities in the what was once thought to be strong encryption (i.e. WP2).
- Definition and explanation of risks associated with wireless communications – A brief explanation, along with statistical explanations, of risks associated with military communications and simple illustrations of how those communications can be exploited by the most inexpensive methods
- Using simple communication algorithm to illustrate potential of cyber attacks against communication networks – With just one simple mathematical formula, the class can learn how to justify any type of cybersecurity protections; how by just increasing the network by one computer, one can expand the vulnerabilities by much more than one
- Current Federal Government guidance on protecting communications – A quick review of the National Institute of Standards and Technology (NIST) guidance including both FIPS and Special Publications (SPs) that could help any organization better track their vulnerabilities.
- Shannon’s Law of Entropy and password security – A quick look at Claude Shannon’s ground breaking 1948 research paper that changed how we determine how secure our digital communications should be and how that still applies today!
- Social media, mobile devices, and cyber protection – Some very simple methods to ensure that military and government users are not exploited in their use of military communications; how to counter prying eyes on your social media
- How cyber attackers are using time-proven methods to attack and “own” wireless communications – Real world exercises on determining if you are vulnerable to these attacks.
If this course is not on the current schedule of open enrollment courses and you are interested in attending this or another course as an open enrollment, please contact us at (410) 956-8805 or firstname.lastname@example.org. Please indicate the course name, number of students who wish to participate. and a preferred time frame. ATI typically schedules open enrollment courses with a 3-5 month lead time. For on-site pricing, you can use the request an on-site quote form, call us at (410) 956-8805, or email us at email@example.com.
Chris Greco is a retired Air Force Intelligence Officer and Federal Government Employee with over 40 years combined experience in intelligence, computer security, project management, and cybersecurity while serving in positions of high responsibility in Federal Government and private industry. Early in his I.T. career, Chris fought the MELISSA and NIMDA virus attacks in 2000 and 2002 respectively using innovative methods to fight the NIMDA virus including performance monitoring software as a make shift anti-virus. In 2016, Chris won the coveted Mullin Award by the Computer Measurement Group (CMG) in 2016 (www.cmg.org) for a cybersecurity presentation on capacity and performance monitoring. In 2017 he was one of the winners of the Information Security Leadership Award (ISLA) for work on cybersecurity programs keeping senior citizens aware of cybersecurity vulnerabilities (www.isc2.org). He owns several trademarks designating cybersecurity training for assorted demographics including senior citizens and lawyers. In 2015, he became an author/illustrator of one of first cybersecurity children’s book to prepare our next generation about cyber vulnerabilities. In 2017 he was chosen as a contract instructor teaching cybersecurity to Department of Army civilians at Aberdeen Proving Ground. He still conducts 6-minute seminars on YouTube® for individuals that want to know more about cyber vulnerabilities (www.youtube.com – GRECTECH). He has presented several cybersecurity webinars in support of the project management community through www.projectmanagement.com and volunteers to present cybersecurity information to middle school and high school student US wide through an organization called Nepris (www.nepris.org). He has written a variety of articles on cybersecurity for his blog (www.grectechblog.wordpress.com) and endeavors to raise cyber vulnerabilities in every presentation to project management groups. He still teaches cybersecurity to a Department of Defense agency as a contract instructor, receiving exemplary feedback for his innovative and exciting teaching techniques.
Contact this instructor (please mention course name in the subject line)