Cyber Security & Cyber Warfare
- Introduction to Cybersecurity
- Information Security Fundamentals
- Confidentiality, Integrity, Availability
- Disclosure, Deception, Disruption, Usurpation
- Security Policies vs. Mechanisms
- Trust and Assurance
- Cyber Systems and Security
- Systems and Networks; Hardware and Software
- Protocol vs. Platform Attacks
- Attack and Exploitation Tools
- Defensive Tools
- Critical Infrastructure and Key Resources (CIKR)
- Industrial Control Systems
- Supervisory Control and Data Acquisition (SCADA) Systems
- Security of Embedded Control Systems
- Case Studies in Power, Stuxnet
- Business as Critical Infrastructure
- Financial Institutions
- Intellectual Property Theft
- Internet Robustness and Survivability
- BGP Routing Infrastructure
- Economic and Political Aspects of Internet Governance
- Internet Availability and the World Economy
- Impact and Risk of New Technologies
- Smartgrid
- Intelligent Transportation
- Cloud Computing
- Military Aspects of Cyber
- Cyber as a Warfare Domain
- Cyber as a Weapon System
- Cyber Kill Chain
- Net-Centric Warfare
- Impact of Cyber on Military Operations
- Command and Control
- Mission Planning and Execution
- Impact of Availability on Mission Success
- Cyber Strategy and Tactics
- Computer Network Operations
- Computer Network Defense
- Computer Network Exploitation
- Computer Network Attack
- Electronic Warfare and Information Operations:
- Electronic Attack
- Electronic Protection
- Electronic Support
- Case Studies: US and India
- Military Cyber Doctrine
- Rules of Engagement
- Proportional Response
- Collateral Damage
- Impact on Foreign Policy
- Case Studies: China and Google; Russia and Georgia; Estonia
- Wrap-up
- Course Recap and Q/A
- Evaluations