Course Objectives: In this training, you will:
▪ The battlefields, actors, technologies & tactics for electronic warfare.
▪ The ethics and consequences of cyber warfare.
▪ How to identify & defend a network against malicious attacks.
▪ Hacktivism, espionage & insider threats.
Cyber Warfare for Practitioners… Offiense and Defensive perspective.
Cyber warfare involves the actions by a nation-state or international organization to attack and attempt to damage another nation’s computers or information networks through, for example, computer viruses or denial-of-service attacks. CCG research provides recommendations to military and civilian decision makers on methods of defending against the damaging effects of cyber warfare on a nation’s digital infrastructure.
Living in an information society opens unprecedented opportunities for hostile rivals to cause disruption, delay, inefficiency, and harm. Social manipulation techniques are evolving beyond disinformation and cyberattacks on infrastructure sites. How can democracies protect themselves?
Presenting architecture and design of systems for security as a primary focus.
Discussion includes the ways and means of proper architecture to ensure the strongest protection of your systems. Standards and design recommendation to harden systems. This will cover Network layouts, system protections and applications. How to provide the best layouts to protect your entire environment.