Digital Radio Frequency Memories (DRFM)
Digital Radio Frequency Memories Training (DRFM) Course Description
This three-day Digital Radio Frequency Memories Training (DRFM) is intended for operational leaders and programmatic staff involved in the planning, analysis, or testing of Cyber Warfare and Network-Centric systems. The course will provide perspective on emerging policy, doctrine, strategy, and operational constraints affecting the development of cyber warfare systems. This knowledge will greatly enhance participants’ ability to develop operational systems and concepts that will produce integrated, controlled, and effective cyber effects at each warfare level.
This course is appropriate for both new and experience people working in cyber security. The value of this course is to help engineers & scientists understand how their senior customers view cyber security & enable them to speak broadly on the topic with those customers and to understand different conops. The course is not detailed in programming techniques and tools. Those wanting that material should take one of the Certified Ethical Hacker classes.
• What are the relationships between cyber warfare, information assurance, information operations, and network-centric warfare?
• How can a cyber warfare capability enable freedom of action in cyberspace?
• What are legal constraints on cyber warfare?
• How can cyber capabilities meet standards for weaponization?
• How should cyber capabilities be integrated with military exercises?
• How can military and civilian cyberspace organizations prepare and maintain their workforce to play effective roles in cyberspace?
• What is the Comprehensive National Cybersecurity Initiative (CNCI)?
With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.
Global Internet Governance
A Cyber Power Framework
Global Supply Chain & Outsourcing Issues
Critical Infrastructure Issues
U.S. Cyberspace Doctrine and Strategy.
Cyberspace as a Warfare Domain.
U.S. Organizational Constructs in Cyber Warfare.
Legal Considerations for Cyber Warfare.
Operational Theory of Cyber Warfare.
Operational and Tactical Maneuver in Cyberspace – Stack Positioning
Capability Development & Weaponization.
Cyber Warfare Training and Exercise Requirements.
Command & Control for Cyber Warfare.
Cyber War Case Study
Human Capital in Cybersecurity
Survey of International Cyber Warfare Doctrine & Capabilities.
Large-Scale Cybersecurity Mechanisms
Social Considerations in Cybersecurity – Culture & the Human Interface
Cybersecurity, Civil Liberties, & Freedom Around the World
Non-State Actor Trends – Cyber Crime, Cyber Terrorism, Hactivism
Homeland Security Case Study / Industrial Espionage Case Study
Whether you are looking for general information or have a specific question, we want to help
Request More Information