BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Course Overview
Our 3-day, instructor-led Cyber Warfare For Practitioners Training course is designed for IT professionals such as auditors, managers and security analysts. It will cover:
- The battlefields, participants, tools & techniques of cyber warfare
- The ethics, laws & consequences of cyber warfare
- How computer criminal law may change because of cyber warfare
- How to identify & defend a network against malicious attacks
- Hacktivism, espionage & insider threats
Prior to taking this course, you should have some experience in the IT field. Though not required, it may be helpful to have the CompTIA® Security+ and/or the EC-Council® CEH certifications
Schedule
Cyber Warfare For Practitioners Training
date
location
price
![[image]](https://phoenixts.com/wp-content/themes/phoenixts-com/assets/images/temp/image-9@2x.jpg)
Not seeing a good fit?
Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.
Learn more about custom training
Course Outline
The Cyberwarfare Landscape
- Information as a military asset
- Targets and combatants
- Cyberwarfare, law, and ethics
- Intelligence operations in a connected world
Offensive and Defensive Cyberwarfare
- The evolving threat: from script kiddies to advanced attackers
- Social engineering and cyberwarfare
- Weaponizing cyberspace: a history
- Nonstate actors in cyberwar
- Defense-in-depth strategies
- Cryptography and cyberwar
- Defending endpoints
- Defending networks
- Defending data
The Future of Cyberwarfare
- Cyberwarfare and military doctrine
- Pandora’s box: the future of cyberwarfare
Cyber Warfare for Practitioners Training Labs
- Investigating and responding to security incidents
- Auditing a wireless network
- Using social engineering techniques to plan an attack
- Eliminating threats with a layered security approach
- Performing a post-mortem review of a data breach incident
Cyber Warfare For Practitioners Training FAQs
The Oxford dictionary defines cyber warfare as “the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.”
This course is intended for IT auditors, IT managers, information security analysts, information security managers and systems administrators.
BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!