Introduction to Cyber Warfare and Operations Design Training in Romania

311 Flares Filament.io 311 Flares ×

Learn the core set of skills needed for practical and dynamic cyber defense and set the foundation to become a CSFI-DCOE.

This course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, as well as planning, organizing, and integrating cyberspace operations. The course will consist of presentations and exercises that will teach you how to develop a cyber-operations design and bring it to fruition. At the conclusion of the course, you will have a fundamental understanding of how to analyze, plan for, and execute cyberspace operations.

Trainer – Anthony Guess-Johnson
Anthony Guess-Johnson CSFIMr. Anthony Guess-Johnson assists CSFI in regards to fostering and promoting collaboration of cyberspace topics among interested parties.

He has operational experience from serving seventeen years of active duty in the United States Marine Corps to include: two deployments to Iraq, two deployments to Afghanistan, one deployment to the Mediterranean Sea, and six tours in Okinawa Japan.

Serving the Marine Corps Reserve forces, he assists the Marine Corps with personnel training and support to exercises. In his professional capacity he assists the John’s Hopkins University Applied Physics Laboratory with project support and development. In assisting CSFI Mr. Guess-Johnson has taken feedback and lessons learned from CSFI collaboration forums and applied them to contemporary challenges.

He has presented to the George Washington University and multiple conferences addressing challenges within cyberspace operations, the importance of collaboration among interested parties, and recommended approaches to challenges. Mr. Guess-Johnson also assists with the review of CSFI training curriculum, course structure, and the design of collaboration forums.

REGISTER

Course Length: 2 days
Course Date: 19th – 20th October
Bucharest, Romania

What you will learn

  • Cyberspace operations methodologies
  • Integration of cyberspace capabilities
  • The role of Information Assurance in cyberspace operations
  • Training and developing the cyber workforce
  • Designing cyber related organizations

Who needs to attend

  • Anyone interested in the field of cyber warfare/cyber operations
  • Anyone looking to expand a cyber-security career
  • Military commanders
  • Information-operations officers
  • Information security/assurance professionals
  • Cyber-security consultants
  • Cyber planners
  • Military members (J2, J3, J5, J6, J9)
  • Security analysts
  • Network-security engineers
  • Penetration testers
  • Auditors
  • Government officials
  • Security engineers

Prerequisites

There are no prerequisites for this course. Just bring a laptop.

Follow-On Courses

CSFI: Defensive Cyber Operations Engineer (DCOE)

Course Outline

1. Understanding the Cyberspace Environment and Design

  • Cyberspace environment and its characteristics
  • Developing a design approach
  • Planning for cyberspace operation

2. Cyberspace Operational Approaches

  • Foundational approaches that utilize cyberspace capabilities to support organizational missions
  • The pros and cons of the different approaches
    (This module sets the foundation for CSFI Cyberspace Operations Strategist and Planner [CCOSP] advanced course.)

3. Cyberspace Operations

  • Network Operations (NETOPS)
  • Defensive Cyberspace Operations (DCO)
  • Offensive Cyberspace Operations (OCO)
  • Defense and Diversity of Depth network design
  • Operational methodologies to conduct cyberspace operations

4. Cyberspace Integration

  • Design a cyberspace operation and integrate it with a Joint Operations plan
  • Practice the presented methodologies in a practical application exercise

5. Building Cyber Warriors and Warrior Corps

  • The warrior and warrior corps concept as applied to cyber organizations
  • The challenges of training and developing a cyber workforce from senior leadership to the technical workforce

6. Designing Cyber Related Commands

  • Mission statements
  • Essential tasks
  • Organizational structures
  • Tables of organizations

7. Training and Readiness for Cyber Related Commands

  • Mission Essential Tasks (METs)
  • Developing the cyber workforce
  • Plan your own training programs within your organization

8. Final Exercise

  • You will presented with a scenario from which all previous instruction topics and exercises will be used to develop and integrate a cyber plan
  • The exercise will also include a brief Rehearsal of Concept (ROC) and Table Top Exercise (TTX) to exercise and evaluate your developed plan

Comments

Comments are closed.