Communications Security (COMSEC) Training Fundamentals
Commitment | 5 Days, 7-8 hours a day. |
Language | English |
User Ratings | Average User Rating 4.8 See what learners said |
Price | REQUEST |
Delivery Options | Instructor-Led Onsite, Online, and Classroom Live |
COURSE OVERVIEW
The goal of COMSEC is to maintain the confidentiality, integrity, and availability of DoD classified and unclassified information that has not been approved for public release during transmission. Communications Security (COMSEC) Training Fundamentals is a 5-day practical training course that focuses on structured analysis to establish a solid foundation for any communications security skillset and to amplify existing skills. The course will help practitioners from across the communications security spectrum. Communication professionals, security analysts, an individual who manages the Communications Security (COMSEC) resources of any organization, or key custodians for a Crypto Key Management System (CKMS), will benefit from this course.
COMSEC protects traffic on military communications networks, including voice, video, and data, and is used for both analog and digital applications, and both wired and wireless links. COMSEC includes:
- Cryptographic security: Encrypts data and represents it unreadable until the information is decrypted
- Emission Security: Blocks the release or capture of equipment emissions to prevent information from illegal interception
- Physical security: Assures the safety of, and avoids unauthorized access to a network’s cryptographic data, documents, and equipment
- Transmission security: When data is tangibly transferred to stabilize issues such as service interruption, it defends against illegal access
WHAT'S INCLUDED?
- 5 days of Communications Security (COMSEC) Training Fundamentals with an expert instructor
- Communications Security (COMSEC) Training Fundamentals Electronic Course Guide
- Certificate of Completion
- 100% Satisfaction Guarantee
RESOURCES
- Communications Security (COMSEC) Training Fundamentals – https://www.wiley.com/
- Communications Security (COMSEC) Training Fundamentals – https://www.packtpub.com/
- Communications Security (COMSEC) Fundamentals – https://store.logicaloperations.com/
- Communications Security (COMSEC) Fundamentals – https://us.artechhouse.com/
- Communications Security (COMSEC) Training Fundamentals – https://www.amazon.com/
RELATED COURSES
ADDITIONAL INFORMATION
CUSTOMIZE IT
- We can adapt this Communications Security (COMSEC) Training Fundamentals course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Communications Security (COMSEC) Training Fundamentals course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Communications Security (COMSEC) Training Fundamentals course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policymaker), and present the Communications Security (COMSEC) Training Fundamentals course in a manner understandable to lay audiences.
COURSE OBJECTIVES
Upon completing this Communications Security (COMSEC) Training Fundamentals course, learners will be able to meet these objectives:
AUDIENCE/TARGET GROUP
The target audience for this Communications Security (COMSEC) Training Fundamentals course:
- Technical personnel
- Electronic warfare or radar system planning, design, development, operations, and maintenance
- Electrical engineers
- Software engineers
- System engineers
- System analysts
- Cyber security professionals
- Verification and validation personnel
- Project managers
- Program managers
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this Communications Security (COMSEC) Training Fundamentals course are:
- N/A
COURSE SYLLABUS
Communications Security (COMSEC) Overview
- Overview of Telecommunications networks (L2, L3, ad PHY including radio and microwaves)
- Security surrounding the use of communication devices
- High level overview of Secret Internet Protocol Router Network (SIPRNet)
- Security principles behind a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information
- Firewalls and intrusion detection systems (IDS)
- Authenticity and measures taken to deny unauthorized access
- National security policies
- Methods to prevent uncontrolled distribution of secure information
- Use of cryptographic security measures
Transmission Security (TRANSEC)
- Mode of Transmission
- Overview of Spread Spectrum and CDMA
- Principles of Reed-Solomon Encoding, Interleaving, DSSS and Frequency Hopping
- Electromagnetic Transmission
- Electromagnetic Transmission
- Non-Electromagnetic Transmission
COMSEC Policies and Procedures
- Cryptographic Security
- Encryption systems to secure data and voice communications over Internet Protocol (IP) networks
- Link and Trunk Encryption systems
- Secure data and voice communication over point-to-point wideband data links
- Secure Voice and limited data communications over unsecured IP and public-switched telephone networks
- Encryption systems to secure data encryption capabilities for data at rest
- Embedded Cryptographic Modernization Initiative
Overview of Emissions Security (EMSEC)
- Tools and methods to protect classified information and control the radiation of electromagnetic signals
- Emissions security
- Transmission security
- Hardware used to encrypt and protect sensitive or classified communications
Physical Security of COMSEC
- Storage Of Classified Or Sensitive Materials
- Secret And Confidential
- Handling And Using Materials
- Control Access Area (CAA)
- Access Authorization
- Methods Of Identification
Principles of Telecommunications and Electrical Machinery Protected from Emanations Security (TEMPEST)
- Overview of TEMPEST and TEMPEST Countermeasures
- U.S. National Security Agency (NSA) specification and NATO TEMPEST certifications
- Overview of TEMPEST shielded facilities
- Housing sensitive equipment and information in a Tempest shielded room
- Electronic devices, computers and computer screens radiated electromagnetic emissions
- TEMPEST certification testing
- Security of information systems by the elimination of “leaking emanations”, including unintentional radio or electrical signals, sounds, and vibrations
- Shielding standards
- NSA TEMPEST Certification Program (TCP)
- Certified TEMPEST Products Program (CTPP)
- Certified TEMPEST Test Services Program (CTTSP)
- NSA Certified TEMPEST Test Services List (CTTSL)