Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Introduction to Cyber Warfare and Operations Design (ICWOD)

Learn the core set of skills needed to design and plan for cyberspace operations at all levels of the planning spectrum.

This course provides a basic understanding of full-spectrum cyberspace operations; the complexities of the cyberspace environment; and planning, organizing, and integrating cyber ops. The course consists of presentations and exercises that teach students how to design a cyberspace operations plan and bring it to fruition. Presented with an international conflict scenario, students are guided through a series of cascading exercises for conceptual, functional, and detailed planning. Following the design concept for problem framing students utilize the commander’s intent to plan toward the desired end state. At course conclusion, students will have an appreciation for the planning process and have a fundamental understanding of how to plan for and cyberspace operations.

This course in endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.

GK# 9719
Vendor Credits:
No matching courses available.
Start learning as soon as today! Click Add To Cart to continue shopping or Buy Now to check out immediately.
Access Period:
Scheduling a custom training event for your team is fast and easy! Click here to get started.

Is This The Right Course?

Developed exclusively for the Cyber Security Forum Initiative (CSFI) by professionals with experience in military cyberspace operations, this course provides an introduction to cyber operations in the context of cyber warfare and the accompanying planning process. While this course includes a military scenario and doctrine, the concepts learned can be applied to virtually any organization with a cyber environment.
CSFI is highly invested in protecting American national security in cyberspace and is proud to provide cyberspace operations training to American entities, as well as foreign allies and partners in support of interoperability.

While not a prerequisite, students of this course would benefit by having a basic understanding of cyber fundamentals.

Who Should Attend?

  • Anyone interested in the field of cyber warfare/cyber operations
  • Anyone looking to expand a cyber-security career
  • Military commanders
  • Information-operations officers
  • Information security/assurance professionals
  • Cyber-security consultants
  • Cyber planners
  • Military members (J2, J3, J5, J6, J9)
  • Security analysts
  • Network-security engineers
  • Penetration testers
  • Auditors
  • Government officials
  • Security engineers

What You'll Learn

  • Understanding the Cyberspace Environment and Design
  • Cyberspace Strategies
  • Cyberspace Operations
  • Cyberspace Operations Integration
  • Building Cyber Warriors and Cyber Corps
  • Designing Cyber Related Commands
  • Training and Readiness for Cyber Operations
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)

Course Outline

  • Understanding the Cyberspace Environment and Design
    • Defining Cyberspace
    • Design
    • Environmental Frame
      • Layers of Cyberspace
      • OSI Model
      • Cyberspace and the Warfighting Functions and the Elements of Combat Power
    • Problem Framing
    • Operational Approach
    • Planning Power Words
  • Cyberspace Strategies
    • Operating Networks
      • Information Assurance
    • Defending Networks
      • Network Security
      • Proactive Defense/Hunting
      • Intelligence Driven CND
      • Intelligence Driven CND Case Study
    • Cyberspace Operational Methodologies
      • Warfighting Domain
      • Enabling Operation
      • Supporting Operation
  • Cyberspace Operations
    • Defining Cyberspace Operations
      • Network Operations (NetOps)
      • Defensive Cyberspace Operations (DCO)
      • Offensive Cyberspace Operations (OCO)
    • Operations Models
      • Westphalian Model
      • Global Commons Model
      • Tallinn Manual
      • Operational Methodologies
  • Cyberspace Operations Integration
    • Intelligence-Driven Cyberspace Operations
    • Intent Behind Cyberspace Operations
    • Cyberspace Operations Fusion
    • Cyberspace Operations as a Supporting Function
    • Cyber Unity of Effort Example
    • Cyber Integration into Joint Operations, Example Scenario
  • Building Cyber Warriors and Cyber Corps
    • Warrior and Warrior Corps Concept
    • Cyber Warrior and Cyber Corps Concept
    • Posturing the Cyber Workforce
  • Designing Cyber Related Commands
    • Understanding the Operating Environment
    • Levels of Planning
      • Conceptual
      • Functional
      • Detailed
    • Tasks to Functions Alignment
    • Building Task Organizations
  • Training and Readiness for Cyberspace Operations
    • Readiness Concept
    • Mission Essential Tasks (METs)
      • Subordinate Tasks/Battle Tasks
    • Training for Unit Operations
    • Exercise Planning
    • Sustaining Readiness
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)

Labs Outline

  • Exercise 1: Problem Framing and Operational Design
  • Exercise 2: Strategy Development
  • Exercise 3: Cyberspace Operations Development
  • Exercise 4: Cyberspace Operations Integration
  • Exercise 5: Command Design
  • Exercise 6: Mission Essential Task Development
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)
  • Capstone Report

Prerequisites

Developed exclusively for the Cyber Security Forum Initiative (CSFI) by professionals with experience in military cyberspace operations, this course provides an introduction to cyber operations in the context of cyber warfare and the accompanying planning process. While this course includes a military scenario and doctrine, the concepts learned can be applied to virtually any organization with a cyber environment.
CSFI is highly invested in protecting American national security in cyberspace and is proud to provide cyberspace operations training to American entities, as well as foreign allies and partners in support of interoperability.

While not a prerequisite, students of this course would benefit by having a basic understanding of cyber fundamentals.

Follow-On Courses