Electronic Protection and Electronic Attack Training
|Commitment||3 days, 7-8 hours a day.|
|How To Pass||Pass all graded assignments to complete the course.|
|User Ratings||Average User Rating 4.8 See what learners said|
|Delivery Options||Instructor-Led Onsite, Online, and Classroom Live|
Electronic Protection and Electronic Attack Training Course – Hands-on
Electronic Protection and Electronic Attack Training Course – Customize it
- We can adapt this training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this training course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the training around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the training course in manner understandable to lay audiences.
Electronic Protection and Electronic Attack Training Course – Audience/Target Group
The target audience for this training course:
Electronic Protection and Electronic Attack Training Course – Objectives:
Upon completing this training course, learners will be able to meet these objectives:
- ES, EW, and ELINT receiver architectures and techniques
- Radar range equation, sensitivity, detection, Pd and Pfa
- Direction finding and location
- Electronic attack techniques
- Fundamental ECM principles
- Basic jamming equations and J/S
- Interactions between electronic attack and electronic protection
Electronic Protection and Electronic Attack Training – Course Content
EW Principals & Overview Review of Electronic Warfare basics and dB math.
Electronic Spectrum Warfare. The nature and significance of this newly recognized “battle space.”
Legacy Radars Description of current threat systems and the EW techniques used against them.
Next Generation Threat Radars Description of new threat systems developed to counter current EW techniques and equipment.
Digital Communication Digital communication theory and its application to modern communication threat systems including integrated air defense systems.
Legacy Comm Threats Current hostile military communication and the countermeasures used against them.
Modern Comm Threats New generation hostile communications systems – including IEDs and the EW techniques used against them.
DRFMs Description of digital RF memory hardware & software and their application to EW operations.
IR Threats and CM Legacy and new generation IR threats and the countermeasures used against them.
Radar Decoys Modern radar decoys and how they protect airborne and shipboard assets.