CSFI: Introduction to Cyber Warfare and Operations Design
CSFI: Introduction to Cyber Warfare and Operations Design Course Details:
This course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, as well as planning, organizing, and integrating cyberspace operations. The course will consist of presentations and exercises that will teach you how to develop a cyber-operations design and bring it to fruition. At the conclusion of the course, you will have a fundamental understanding of how to analyze, plan for, and execute cyberspace operations.
Call (919) 283-1674 to get a class scheduled online or in your area!
1. Understanding the Cyberspace Environment and Design
- Cyberspace environment and its characteristics
- Developing a design approach
- Planning for cyberspace operation
2. Cyberspace Operational Approaches
- Foundational approaches that utilize cyberspace capabilities to support organizational missions
- The pros and cons of the different approaches
(This module sets the foundation for CSFI Cyberspace Operations Strategist and Planner [CCOSP] advanced course.)
3. Cyberspace Operations
- Network Operations (NETOPS)
- Defensive Cyberspace Operations (DCO)
- Offensive Cyberspace Operations (OCO)
- Defense and Diversity of Depth network design
- Operational methodologies to conduct cyberspace operations
4. Cyberspace Integration
- Design a cyberspace operation and integrate it with a Joint Operations plan
- Practice the presented methodologies in a practical application exercise
5. Building Cyber Warriors and Warrior Corps
- The warrior and warrior corps concept as applied to cyber organizations
- The challenges of training and developing a cyber workforce from senior leadership to the technical workforce
6. Designing Cyber Related Commands
- Mission statements
- Essential tasks
- Organizational structures
- Tables of organizations
7. Training and Readiness for Cyber Related Commands
- Mission Essential Tasks (METs)
- Developing the cyber workforce
- Plan your own training programs within your organization
8. Final Exercise
- You will presented with a scenario from which all previous instruction topics and exercises will be used to develop and integrate a cyber plan
- The exercise will also include a brief Rehearsal of Concept (ROC) and Table Top Exercise (TTX) to exercise and evaluate your developed plan
*Please Note: Course Outline is subject to change without notice. Exact course outline will be provided at time of registration.
- Cyberspace operations methodologies
- Integration of cyberspace capabilities
- The role of Information Assurance in cyberspace operations
- Training and developing the cyber workforce
- Designing cyber related organizations
- Anyone interested in the field of cyber warfare/cyber operations
- Anyone looking to expand a cyber-security career
- Military commanders
- Information-operations officers
- Information security/assurance professionals
- Cyber-security consultants
- Cyber planners
- Military members (J2, J3, J5, J6, J9)
- Security analysts
- Network-security engineers
- Penetration testers
- Auditors
- Government officials
- Security engineers