OPERATING IN A CYBER ENVIRONMENT

The Aim of the Course

  • This course aims to prepare delegates for providing operational output
    in a contested, degraded and operationally limited cyber environment.
    Students will learn using a combination of both theory and practical study.

The Benefits of this Training Course

  • Students will gain an understanding of the military applications of the
    cyber environment. Participants will be taught how to assess the likely
    targets for enemy attacks through and against cyberspace, and how to
    minimise the likelihood of a cyber-attack succeeding. On completion of
    the course, students will know how to mitigate the operational impact of  a successful cyber-attack

Who Should Study on this Course?

  • This course is aimed at personnel who use and/or manage high-end
    military platforms which rely on computers or data to deliver operational output.

Course Content

Module 1 :

Cyber Concepts and Doctrine

Module 2 :

Threat Actors in Cyberspace

Module 3 :

Understanding Cyber Attacks

Module 4 :

Effects in and Through Cyberspace

Module 5 :

Understanding Cyber Defence

Module 6 :

Vulnerabilities and Controls

Module 7 :

Assessing and Prioritising Cyber Risk

Module 8 :

Capstone Exercise

Course Length

5 Days (25 Hrs )

Scroll to Top