×
Phoenix TS

Cyber Warfare For Practitioners Training

This course addresses the techniques and approaches for defending against espionage, hacktivism, insider threats, and non-state actors such as organized criminals and terrorists.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Course Overview

Our 3-day, instructor-led Cyber Warfare For Practitioners Training course is designed for IT professionals such as auditors, managers and security analysts. It will cover:

  • The battlefields, participants, tools & techniques of cyber warfare
  • The ethics, laws & consequences of cyber warfare
  • How computer criminal law may change because of cyber warfare
  • How to identify & defend a network against malicious attacks
  • Hacktivism, espionage & insider threats

Prior to taking this course, you should have some experience in the IT field. Though not required, it may be helpful to have the CompTIA® Security+ and/or the EC-Council® CEH certifications

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.

[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Outline

The Cyberwarfare Landscape

  • Information as a military asset  
  • Targets and combatants  
  • Cyberwarfare, law, and ethics 
  • Intelligence operations in a connected world  

Offensive and Defensive Cyberwarfare

  • The evolving threat: from script kiddies to advanced attackers  
  • Social engineering and cyberwarfare  
  • Weaponizing cyberspace: a history  
  • Nonstate actors in cyberwar   
  • Defense-in-depth strategies  
  • Cryptography and cyberwar  
  • Defending endpoints  
  • Defending networks  
  • Defending data  

The Future of Cyberwarfare

  • Cyberwarfare and military doctrine
  • Pandora’s box: the future of cyberwarfare

Cyber Warfare for Practitioners Training Labs

  • Investigating and responding to security incidents
  • Auditing a wireless network
  • Using social engineering techniques to plan an attack
  • Eliminating threats with a layered security approach
  • Performing a post-mortem review of a data breach incident

Cyber Warfare For Practitioners Training FAQs

What is cyber warfare?

The Oxford dictionary defines cyber warfare as “the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.”

Who should enroll in Cyber Warfare for Practitioners Training?

This course is intended for IT auditors, IT managers, information security analysts, information security managers and systems administrators.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name(Required)