Introduction to Cyber Warfare and Operations Design Training (ICWOD)
Commitment | 2 Days, 7-8 hours a day. |
Language | English |
User Ratings | Average User Rating 4.8 See what learners said |
Price | REQUEST |
Delivery Options | Instructor-Led Onsite, Online, and Classroom Live |
COURSE OVERVIEW
Learn the core set of skills needed to design and plan for cyberspace operations at all levels of the planning spectrum.
This Introduction to Cyber Warfare and Operations Design Training (ICWOD)course provides a basic understanding of full-spectrum cyberspace operations; the complexities of the cyberspace environment; and planning, organizing, and integrating cyber ops. The Introduction to Cyber Warfare and Operations Design (ICWODI)course consists of presentations and exercises that teach students how to design a cyberspace operations plan and bring it to fruition. Presented with an international conflict scenario, students are guided through a series of cascading exercises for conceptual, functional, and detailed planning. Following the design concept for problem framing students utilize the commander’s intent to plan toward the desired end state. In the Introduction to Cyber Warfare and Operations Design Training (ICWOD) course conclusion, students will have an appreciation for the planning process and have a fundamental understanding of how to plan for cyberspace operations.
IS THIS THE RIGHT COURSE?
Developed exclusively for the Cyber Security Forum Initiative (CSFI) by professionals with experience in military cyberspace operations, this course provides an introduction to cyber operations in the context of cyber warfare and the accompanying planning process. While this course includes a military scenario and doctrine, the concepts learned can be applied to virtually any organization with a cyber environment.
CSFI is highly invested in protecting American national security in cyberspace and is proud to provide cyberspace operations training to American entities, as well as foreign allies and partners in support of interoperability. While not a prerequisite, students of this course would benefit by having a basic understanding of cyber fundamentals.
WHAT'S INCLUDED?
- 2 days of Introduction to Cyber Warfare and Operations Design Training (ICWOD) with an expert instructor
- Introduction to Cyber Warfare and Operations Design (ICWOD) Electronic Course Guide
- Certificate of Completion
- 100% Satisfaction Guarantee
RESOURCES
- Introduction to Cyber Warfare and Operations Design (ICWOD) – https://www.wiley.com/
- Introduction to Cyber Warfare and Operations Design (ICWOD) – https://www.packtpub.com/
- Introduction to Cyber Warfare and Operations Design (ICWOD) – https://store.logicaloperations.com/
- Introduction to Cyber Warfare and Operations Design (ICWOD) – https://us.artechhouse.com/
- Introduction to Cyber Warfare and Operations Design Training (ICWOD) – https://www.amazon.com/
RELATED COURSES
- 5G Wireless Security Training
- Cloud Security Fundamentals Training
- Introduction to Cyber Security Training
- Certified Ethical Hacking (CEH) Training v12
- CompTIA Security+ Certification Training (SY0-601)
- ICS/SCADA Security Essentials Training
- Cybersecurity Foundations Training
- Cyber Threats Detection and Mitigation Training
- Cyber Threats Hunting (CCTHP) Training
- Cyber Threat Intelligence Analysis Training
- Cybersecurity Investigations and Network Forensics Analysis
ADDITIONAL INFORMATION
COURSE OBJECTIVES
Upon completing this Introduction to Cyber Warfare and Operations Design Training (ICWOD) course, learners will be able to meet these objectives:
- Understanding the Cyberspace Environment and Design
- Cyberspace Strategies
- Cyberspace Operations
- Cyberspace Operations Integration
- Building Cyber Warriors and Cyber Corps
- Designing Cyber-Related Commands
- Training and Readiness for Cyber Operations
- Rehearsal of Concept (ROC) Drill
- Tabletop Exercise (TTX)
CUSTOMIZE IT
- We can adapt this Introduction to Cyber Warfare and Operations Design Training (ICWOD) course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Introduction to Cyber Warfare and Operations Design (ICWOD) course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Introduction to Cyber Warfare and Operations Design (ICWOD) Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Introduction to Cyber Warfare and Operations Design (ICWOD) course in a manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The target audience for this Introduction to Cyber Warfare and Operations Design Training (ICWOD) course: course:
- Anyone interested in the field of cyber warfare/cyber operations
- Anyone looking to expand a cyber-security career
- Military commanders
- Information-operations officers
- Information security/assurance professionals
- Cyber-security consultants
- Cyber planners
- Military members (J2, J3, J5, J6, J9)
- Security analysts
- Network-security engineers
- Penetration testers
- Auditors
- Government officials
- Security engineers
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this Introduction to Cyber Warfare and Operations Design Training (ICWOD) course are:
- Developed exclusively for the Cyber Security Forum Initiative (CSFI) by professionals with experience in military cyberspace operations, this course provides an introduction to cyber operations in the context of cyber warfare and the accompanying planning process. While this course includes a military scenario and doctrine, the concepts learned can be applied to virtually any organization with a cyber environment.
CSFI is highly invested in protecting American national security in cyberspace and is proud to provide cyberspace operations training to American entities, as well as foreign allies and partners in support of interoperability. - While not a prerequisite, students of this course would benefit by having a basic understanding of cyber fundamentals.
COURSE SYLLABUS
Understanding the Cyberspace Environment and Design
-
- Defining Cyberspace
- Design
- Environmental Frame
- Layers of Cyberspace
- OSI Model
- Cyberspace and the Warfighting Functions and the Elements of Combat Power
- Introduction to Cyber Warfare and Operations Design Training (ICWOD)
- Problem Framing
- Operational Approach
- Planning Power Words
Cyberspace Strategies
-
- Operating Networks
- Information Assurance
- Defending Networks
- Network Security
- Proactive Defense/Hunting
- Intelligence Driven CND
- Intelligence-Driven CND Case Study
- Cyberspace Operational Methodologies
- Warfighting Domain
- Enabling Operation
- Supporting Operation
- Operating Networks
Cyberspace Operations
-
- Defining Cyberspace Operations
- Network Operations (NetOps)
- Defensive Cyberspace Operations (DCO)
- Offensive Cyberspace Operations (OCO)
- Operations Models
- Westphalian Model
- Global Commons Model
- Tallinn Manual
- Operational Methodologies
- Defining Cyberspace Operations
Cyberspace Operations Integration
-
- Intelligence-Driven Cyberspace Operations
- Intent Behind Cyberspace Operations
- Cyberspace Operations Fusion
- Cyberspace Operations as a Supporting Function
- Cyber Unity of Effort Example
- Cyber Integration into Joint Operations, Example Scenario
- Introduction to Cyber Warfare and Operations Design Training (ICWOD)
Building Cyber Warriors and Cyber Corps
-
- Warrior and Warrior Corps Concept
- Cyber Warrior and Cyber Corps Concept
- Posturing the Cyber Workforce
Designing Cyber-Related Commands
-
- Understanding the Operating Environment
- Levels of Planning
- Conceptual
- Functional
- Detailed
- Tasks to Functions Alignment
- Building Task Organizations
Training and Readiness for Cyberspace Operations
-
- Readiness Concept
- Mission Essential Tasks (METs)
- Subordinate Tasks/Battle Tasks
- Training for Unit Operations
- Exercise Planning
- Sustaining Readiness
- Rehearsal of Concept (ROC) Drill
- Tabletop Exercise (TTX)
LABS
- Exercise 1: Problem Framing and Operational Design
- Exercise 2: Strategy Development
- Exercise 3: Cyberspace Operations Development
- Exercise 4: Cyberspace Operations Integration
- Exercise 5: Command Design
- Exercise 6: Mission Essential Task Development
- Rehearsal of Concept (ROC) Drill
- Tabletop Exercise (TTX)
- Capstone Report