Cyber Warfare/Electromagnetic Warfare Convergence

  • Overview
  • Course Content
  • Requirements & Materials
Overview

Cyber Warfare/Electromagnetic Warfare Convergence

Course Description

This course will help engineers, designers, and others gain foundational knowledge of the broad implications of cyber warfare and electronic warfare (EW) convergence. Topics will introduce traditional cyber attacks and electronic warfare and cover topics such as infrastructure and communication impacts, attack vectors, and vulnerability analysis. You'll have the benefit of practicing your new skills through demonstrations to later apply them at your organization.

Course Content

CYBER WARFARE (CW) AND ELECTRONIC WARFARE (EW) OVERVIEW

CYBER VIRTUALIZATION AND SPECIAL TOPICS

  • 7 Layer Model
  • Virtualization
  • Cyber-Physical Systems

RF FUNDAMENTALS

  • Radar range equations, waveforms, measurements, and antennas
  • Communications waveforms and antennas

EXAMPLE ATTACKS ON C2 SYSTEMS

TARGET ARRAY & CYBER EW TECHNIQUES

  • Modes of Cyber/EW techniques
  • Cyber/EW operational view
  • Continuum or taxonomy of EW/Cyber techniques

OVERVIEW OF THREATS & EXPLOITATION

OVERVIEW OF DEFENSIVE TECHNOLOGIES

ATTACK TREE AND RISK ANALYSIS

  • Relationship of risks to mission
  • Developing layered attack schemes

NETWORKING AND NETWORK ATTACKS

  • Networking concepts
  • Address Resolution Protocol (ARP) and Domain Name System (DNS) Poisoning

RF PROPAGATION AND ACCESS EXAMPLES

  • Comm signal propagation and losses
  • Scenarios

WORKSHOP - CYBER UAV (UNMANNED AIRCRAFT VEHICLES)

TEST AND EVALUATION FOR CYBER/EW CAPABILITIES

  • Test approaches
  • Measures and metrics
  • Facilities and ranges

MODELING AND SIMULATION (M&S)

  • General uses of cyber M&S
  • Hierarchy of M&S

CYBER EW TECHNIQUES FOR RF COMMUNICATIONS

  • Digital Communications
  • Demos

CYBER EW VULNERABILITY ASSESSMENT

  • Common attack vectors
  • Hardware and firmware analysis

EXPLOITS TARGETING PROTOCOL AND SOFTWARE VULNERABILITIES

  • Exploiting protocols
  • AIS transponder quicklook
Requirements & Materials

Important Information

This course requires completion of an access eligibility form. Please make sure you read the Course Restrictions section below before registering for this course. 

Materials

Provided

  • Course presentation slides

Course Restrictions

This course is restricted to US citizens who are industrial and/or government employees and complete the Access Eligibility Form. Eligibility questions should be directed to 404-407-6661. Attendees must fax the Access Eligibility Form to 404-407-8691 or RShelp@gtri.gatech.edu

Session Details

  • Special Discounts: Georgia Tech Research Institute (GTRI) employees are eligible to receive a discount.  If you are a GTRI employee, please go to the Organizational Development website and look for the coupon code under GT Professional Development. Review coupon instructions for more information.

Who Should Attend

This course is designed for engineers, developers, and managers.

Defense tech professionals attending a short course

What You Will Learn

  • Foundational knowledge of cyberwarfare, electronic warfare, and their convergence
  • How critical infrastructure and communications systems must adapt to the integration of these domains
  • Network attack techniques and tools for assessing vulnerabilities
  • How attack vectors are identified, down-selected, and exploited using software defined radios
Defense tech professionals attending a short course

How You Will Benefit

  • Gain foundational knowledge of cyberwarfare, electronic warfare, and the convergence of the two.
  • Identify how critical infrastructure and communications systems must adapt to the integration of these domains.
  • Explore network attack techniques and tools for assessing vulnerabilities.
  • Practice newly learned skills through demonstrations.
  • Taught by Experts in the Field icon
    Taught by Experts in the Field
  • Grow Your Professional Network icon
    Grow Your Professional Network

The course schedule was well-structured with a mix of lectures, class discussions, and hands-on exercises led by knowledgeable and engaging instructors.

- Abe Kani
President

TRAIN AT YOUR LOCATION

We enable employers to provide specialized, on-location training on their own timetables. Our world-renowned experts can create unique content that meets your employees' specific needs. We also have the ability to deliver courses via web conferencing or on-demand online videos. For 15 or more students, it is more cost-effective for us to come to you.

  • Save Money
  • Flexible Schedule
  • Group Training
  • Customize Content
  • On-Site Training
  • Earn a Certificate
Learn More