Lunesys’ Training Workshop on Fundamentals of Cyber Warfare

This course is intended for technical and programmatic staff involved in the development, analysis, or testing of Information Assurance, Network Warfare, Network-Centric, and NetOPs systems. The course will provide perspective on emerging policy, doctrine, strategy, and operational constraints affecting the development of cyber warfare systems. This knowledge will greatly enhance participants’ ability to develop operational systems and concepts that will produce integrated, controlled, and effective cyber effects at each warfare level.

What You Will Learn:

  • What are the relationships between Cyber Warfare, Information Assurance, Information Operations, and Network-Centric Warfare?
  • How can a cyber warfare capability enable freedom of action in cyberspace?
  • What are legal constraints on cyber warfare?
  • How can cyber capabilities meet standards for weaponization?
  • How should cyber capabilities be integrated with military exercises?
  • How can military and civilian cyberspace organizations prepare and maintain their workforce to play effective roles in cyberspace?
  • What is the Comprehensive National Cyber-security Initiative?

From this course you will obtain in-depth knowledge and awareness of the cyberspace domain, its functional characteristics, and its organizational inter-relationships enabling your organization to make meaningful contributions in the domain of cyber warfare through technical consultation, systems development, and operational test & evaluation.

Course Outline:

  • Cyberspace as a Warfare Domain.
  • Domain terms of reference.
  • Comparison of operational missions conducted through cyberspace.
  • Operational history of cyber warfare.
  • Stack Positioning as a Maneuver Analog.
  • Exploring the space where tangible cyber warfare maneuver really happens.
  • Extend the network stack concept to other elements of cyberspace.
  • Understand the advantage gained through proficient cyberspace navigation.
  • Organizational Constructs in Cyber Warfare.
  • Inter-relationships between traditional and emerging warfare, intelligence, and systems policy authorities.
  • Cyberspace Doctrine and Strategy.
  • National Military Strategy for Cyberspace Operations.
  • Comprehensive National Cybersecurity Initiative.
  • Developing a framework for a full spectrum cyberspace capabilities.
  • Legal Considerations for Cyber Warfare.
  • Overview of local and international laws for cyberspace.
  • Understanding the international Law of Armed Conflict to cyber warfare.
  • Decision frameworks and metaphors for making legal choices in uncharted territory.
  • Operational Theory of Cyber Warfare.
  • Planning and achieving cyber effects.
  • Understanding policy implications and operational risks in cyber warfare.
  • Developing a cyber deterrence strategy.
  • Cyber Warfare Training and Exercise Requirements.
  • Understanding of the depth of technical proficiency and operational savvy required to develop, maintain, and exercise integrated cyber warfare capabilities.
  • Cyber Weaponization. Cyber weapons taxonomy. Weapon-target interplay. Test and Evaluation Standards. Observable effects.
  • Survey of International Cyber Warfare Capabilities. Open source exploration of cyber warfare trends in Pakistan, India, Russia, USA and China.

Lunesys’ Other Training Workshops

Ethical Hacking

Ethical Hacking / Penetration Testing Training Workshop

Penetration Testing

The control of information is something the elite always does… Information, knowledge, is power.” – Tom Clancy

Computer Forensics Investigator

The incident was not the end of the world. We can backtrack!

Learn to uncover and interprete electronic data

How to conduct forensically sound computer examinations with forensic recovery techniques

CISSP Boot Camp

Credential demonstrates that an IT professional understands full range of security for the automated information system.

Certified Information System Security Professional (CISSP)

Our CISSP boot camp course ensures that you can review the CBK in-depth and prepare for the certification exam.

Enterprise Security Awareness for IT Users

Information Technology professionals are typically in need of on-target security knowledge that they can directly apply to their everyday work.

A Must-Have Training for Every IT User of your Organization

LuneSys’ Enterprise Security Awareness Training for IT Professionals utilizes lectures with hands-on lab work to ensure practical knowledge transfer.

Why Choose Lunesys

      • We are not a jack-of-all-trades involved in every sort of business and training;
      • We are focused on information security management purely, which rally us round understanding and facilitating the clients’ specific need;
      • We have an extensive range of highly qualified trainers, a comprehensive range of professional public training courses, enabling the potential participants to hit upon and sign up for exactly the training they need, in their most suitable time span;
      • We don’t only provide trainings but also offer the implementation of the theories, which gives us an edge to assist the participants later in their practical epochs;
      • The most reasonable price is another advantage we offer;
      • Our previous clients’ great satisfaction and highly-rating testimonials are our honor.