BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Course Overview
Our 3-day, instructor-led Cyber Warfare For Practitioners Training course is designed for IT professionals such as auditors, managers and security analysts. It will cover:
- The battlefields, participants, tools & techniques of cyber warfare
- The ethics, laws & consequences of cyber warfare
- How computer criminal law may change because of cyber warfare
- How to identify & defend a network against malicious attacks
- Hacktivism, espionage & insider threats
Prior to taking this course, you should have some experience in the IT field. Though not required, it may be helpful to have the CompTIA® Security+ and/or the EC-Council® CEH certifications
Schedule
Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.
Not seeing a good fit?
Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.
Learn more about custom training
Course Outline
The Cyberwarfare Landscape
- Information as a military asset
- Targets and combatants
- Cyberwarfare, law, and ethics
- Intelligence operations in a connected world
Offensive and Defensive Cyberwarfare
- The evolving threat: from script kiddies to advanced attackers
- Social engineering and cyberwarfare
- Weaponizing cyberspace: a history
- Nonstate actors in cyberwar
- Defense-in-depth strategies
- Cryptography and cyberwar
- Defending endpoints
- Defending networks
- Defending data
The Future of Cyberwarfare
- Cyberwarfare and military doctrine
- Pandora’s box: the future of cyberwarfare
Cyber Warfare for Practitioners Training Labs
- Investigating and responding to security incidents
- Auditing a wireless network
- Using social engineering techniques to plan an attack
- Eliminating threats with a layered security approach
- Performing a post-mortem review of a data breach incident
Cyber Warfare For Practitioners Training FAQs
The Oxford dictionary defines cyber warfare as “the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.”
This course is intended for IT auditors, IT managers, information security analysts, information security managers and systems administrators.
BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org