Cyberwarfare: Info. Operations in a Connected World

(cyberwarfare) / ISBN : 978-1-61691-722-7
Lessons
Get A Free Trial

Skills You’ll Get

1

Getting Started

2

Information as a Military Asset

  • Optional Video: Cyberwar Overview
  • What is Cyberwarfare?
  • The Evolving Nature of War
  • The Role of Information in Armed Conflict
  • Domains of Warfare
  • Exploring the Cyber domain
  • Information Operations Techniques
  • Lesson Summary
3

Targets and Combatants

  • Traditional Military Targets
  • Cyberwarfare Targets
  • Targets of Information Operations
  • Combatants in Cyberwarfare
  • Comparing Traditional Warfare, Guerrilla Warfare, and Cyberwarfare
  • Lesson Summary
4

Cyberwarfare, Law, and Ethics

  • Kinetic Warfare
  • Cyberwarfare Law
  • Ethics and Cyberwarfare
  • Lesson Summary
5

Intelligence Operations in a Connected World

  • Intelligence Operations
  • Intelligence Disciplines
  • Intelligence Support to Cyberwarfare
  • Case Studies: Media Reporting on Intelligence Activities
  • Lesson Summary
6

The Evolving Threat: From Script Kiddies to Advanced Attackers

  • Optional Video: Zero Days - White Hat and Black Hat Hackers
  • The Changing Threat Model
  • Inside the Advanced Persistent Threat
  • The Cyber Kill Chain®
  • 5.3.1 Common Cybersecurity Vulnerabilities and Industrial Control Systems [PDF]
  • Lesson Summary
7

Social Engineering and Cyberwarfare

  • Humans: The Weak Link
  • Social Engineering
  • Influence as a Weapon
  • Tools of the Social Engineer
  • Defending Against Social Engineering
  • Robin Sage: A Case Study in Social Engineering
  • Lesson Summary
  • Live Lab: Cyber Warfare Using Social Engineering Techniques to Plan an Attack
8

Weaponizing Cyberspace: A History

  • Optional Video: Stuxnet
  • Early Attacks: The 1990s
  • The 2000s: The Worm Turns
  • Stuxnet and the Twenty-First Century
  • Lesson Summary
9

Nonstate Actors in Cyberwar

  • Understanding Nonstate Actors
  • The Roles of Nonstate Actors in Cyberwar
  • Nongovernmental Organizations in Cyberwar
  • Organized Crime
  • Corporations
  • Terrorists and Activists
  • Individuals and the Media
  • Lesson Summary
10

Defense-in-Depth Strategies

  • Defense in Depth
  • Defense-in-Depth Strategies
  • Where and Why Defense in Depth Fails
  • Designing a Modern CND Strategy
  • 9.4.1 Defense In-Depth National Security Agency & Information Assurance Directorate [PDF]
  • 9.4.2 NIST Supply Chain Risk Mgmt Practices Sec 1-4- 2 and Ch 2 [PDF]
  • Lesson Summary
  • Live Lab: Cyberwarfare Eliminating Threats with a Layered Security Approach
  • Live Lab: Performing a Web Site/Database Attack by Exploiting Identified Vulnerabilities
11

Cryptography and Cyberwar

  • An Introduction to Cryptography
  • Cryptography in Cyberwar
  • Attacking Cryptography
  • Defeating Attacks on Cryptographic Systems
  • Weaponizing Cryptography
  • The Future of Cryptography in Cyberwar
  • Lesson Summary
  • Live Lab: Cyberwarfare Identifying and Removing Malware on a Windows System
12

Defending Endpoints

  • Cyberwarfare Endpoints
  • Types of Endpoints
  • Attacking Endpoints
  • Protecting Endpoints
  • Lesson Summary
13

Defending Networks

  • Network Defense in Depth
  • Mission Assurance
  • Network Security Design
  • Network Defense Technologies
  • Active Defense
  • 12.5.1 NIST Guide to Industrial Control System (ICS) Security [PDF]
  • Lesson Summary
14

Defending Data

  • Data Classification
  • Data Loss and Prevention
  • Data Integrity and Availability
  • Data Retention and Disposal
  • Data Loss Response
  • Lesson Summary
  • Live Lab: Cyberwarfare Performing a Post-Mortem Review of a Data Breach Incident
15

Cyberwarfare and Military Doctrine

  • Military Doctrine
  • Organizing for Cyber Operations
  • Five Pillars of Cyberwarfare
  • Lesson Summary
16

Pandora's Box: The Future of Cyberwarfare

  • Optional Video: Pandora's Box
  • Optional Video: DefCon
  • The Future of Cyberwar
  • Blurred Boundaries: Cyberwar and Nonstate Actors
  • International Law and Cyberwarfare
  • Networks Everywhere: Cyberwar in a Highly Connected World
  • Cyberwar and Infrastructure
  • Advanced Tools and Training
  • The Future of Defensive Cyberwar
  • Lesson Summary
A

Appendix

  • Standard Acronyms

Cyberwarfare: Info. Operations in a Connected World

$107.00

Buy Now
scroll to top