OPERATING IN A CYBER ENVIRONMENT
The Aim of the Course
- This course aims to prepare delegates for providing operational output
in a contested, degraded and operationally limited cyber environment.
Students will learn using a combination of both theory and practical study.
The Benefits of this Training Course
Students will gain an understanding of the military applications of the
cyber environment. Participants will be taught how to assess the likely
targets for enemy attacks through and against cyberspace, and how to
minimise the likelihood of a cyber-attack succeeding. On completion of
the course, students will know how to mitigate the operational impact of a successful cyber-attack
Who Should Study on this Course?
This course is aimed at personnel who use and/or manage high-end
military platforms which rely on computers or data to deliver operational output.
Course Content
Module 1 :
Cyber Concepts and Doctrine
Module 2 :
Threat Actors in Cyberspace
Module 3 :
Understanding Cyber Attacks
Module 4 :
Effects in and Through Cyberspace
Module 5 :
Understanding Cyber Defence
Module 6 :
Vulnerabilities and Controls
Module 7 :
Assessing and Prioritising Cyber Risk
Module 8 :
Capstone Exercise

Course Length
5 Days (25 Hrs )
