NOW ON-DEMAND! Learn from your computer, phone, or tablet! Anywhere, anytime! Get your certificate from the leaders in cyberspace operations planning training.
Introduction to Cyber Warfare and Operations Design (ICWOD)
Learn the core set of skills needed to design and plan for cyberspace operations at all levels of the planning spectrum.
This course provides a basic understanding of full-spectrum cyberspace operations; the complexities of the cyberspace environment; and planning, organizing, and integrating cyber ops. The course consists of presentations and exercises that teach students how to design a cyberspace operations plan and bring it to fruition. Presented with an international conflict scenario, students are guided through a series of cascading exercises for conceptual, functional, and detailed planning. Following the design concept for problem framing students utilize the commander’s intent to plan toward the desired end state. In the course conclusion, students will have an appreciation for the planning process and have a fundamental understanding of how to plan for cyberspace operations.
PRICING: $1,795.00/per student - special group discounts may apply.
A BEAUTIFUL ICWOD CERTIFICATE OF COMPLETION WITH SECURITY FEATURES WILL BE ISSUED TO STUDENTS AFTER THE SUCCESSFUL COMPLETION OF THIS COURSE!
This course is endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.
Capitol Technology University is a National Center of Academic Excellence
REGISTER
WATCH THE VIDEO! Former Office of Naval Research (ONR) Science Advisor talks about the rigorous CSFI CyberOps training course that will help you succeed in your cyber career!
IS THIS THE RIGHT COURSE?
Developed exclusively for the Cyber Security Forum Initiative (CSFI) by professionals with experience in military cyberspace operations, this course provides an
introduction to cyber operations in the context of cyber warfare and the accompanying planning process. While this course includes a military scenario and doctrine,
the concepts learned can be applied to virtually any organization with a cyber environment.
CSFI is highly invested in protecting American national security in cyberspace and is proud to provide cyberspace operations training to American entities, as well
as foreign allies and partners in support of interoperability.
While not a prerequisite, students of this course would benefit by having a basic understanding of cyber fundamentals.
WHO SHOULD ATTEND
- Anyone interested in the field of cyber warfare/cyber operations
- Anyone looking to expand a cyber-security career
- Military Commanders
- Information-Operations Officers
- Information Security/Assurance Professionals
- Cyber-Security Consultants
- Cyber Planners
- Military Members (J2, J3, J5, J6, J9)
- Security Analysts
- Network-Security Engineers
- Penetration Testers
- Auditors
- Government Officials
- Security Engineers
WHAT YOU WILL LEARN
- Understanding the Cyberspace Environment and Design
- Cyberspace Strategies
- Cyberspace Operations Integration
- Building Cyber Warriors and Cyber Corps
- Designing Cyber-Related Commands
- Training and Readiness for Cyber Operations
- Rehearsal of Concept (ROC) Drill
- Tabletop Exercise (TTX)
COURSE OUTLINE
- Understanding the Cyberspace Environment and Design
- Defining Cyberspace
- Design
- Environmental Frame
- Layers of Cyberspace
- OSI Model
- Cyberpsace and the Warfighting Functions and the Elements of Combat Power
- Problem Framing
- Operational Approach
- Planning Power Words
- Cyberspace Strategies
- Operating Networks
- Information Assurance
- Defending Networks
- Network Security
- Proactive Defense/Hunting
- Intelligence-Driven CND
- Intelligence-Driven CND Case Study
- Cyberpsace Operational Methodologies
- Warfighting Domain
- Enabling Operation
- Supporting Operation
- Cyberspace Operations
- Defining Cyberspace Operations
- Network Operations (NetOps)
- Defensive Cyberspace Operations (DCO)
- Offensive Cyberspace Operations (OCO)
- Operations Models
- Westphalian Model
- Global Commons Model
- Tallinn Manual
- Operational Methodologies
- Cyberspace Operations Integration
- Intelligence-Driven Cyberspace Operations
- Intent Behind Cyberspace Operations
- Cyberspace Operations Fusion
- Cyberspace Operations as a Supporting Function
- Cyber Unity of Effort Example
- Cyber Integration into Joint Operations, Example Scenario
- Building Cyber Warriors and Cyber Corps
- Warrior and Warrior Corps Concept
- Cyber Warrior and Cyber Corps Concept
- Posturing the Cyber Workforce
- Designing Cyber-Related Commands
- Understanding the Operating Environment
- Levels of Planning
- Conceptual
- Functional
- Detailed
- Tasks to Functions Alignment
- Building Task Organizations
- Training and Readiness for Cyberspace Operations
- Readiness Concept
- Mission Essential Tasks (METs)
- Subordinate Tasks/Battle Tasks
- Training for Unit Operations
- Exercise Planning
- Sustaining Readiness
- Rehearsal of Concept (ROC) Drill
- Tabletop Exercise (TTX)
LABS OUTLINE
- Exercise 1: Problem Framing and Operational Design
- Exercise 2: Strategy Development
- Exercise 3: Cyberspace Operations Development
- Exercise 4: Cyberspace Operations Integration
- Exercise 5: Command Design
- Exercise 6: Mission Essential Task Development
- Rehearsal of Concept (ROC) Drill
- Tabletop Exercise (TTX)
- Capstone Report
PREREQUISITES
Developed exclusively for the Cyber Security Forum Initiative (CSFI) by professionals with experience in military cyberspace operations,
this course provides an introduction to cyber operations in the context of cyber warfare and the accompanying planning process. While this
course includes a military scenario and doctrine, the concepts learned can be applied to virtually any organization with a cyber environment.
CSFI is highly invested in protecting American national security in cyberspace and is proud to provide cyberspace operations training to
American entities, as well as foreign allies and partners in support of interoperability.
While not a prerequisite, students of this course would benefit by having a basic understanding of cyber fundamentals.
TESTIMONIALS FROM AMERICAN NATIONAL SECURITY LEADERS
Michael Groen
LtGen. (Ret.), USMC
Former Director of the Joint Artificial Intelligence Center, DOD, former Deputy Chief of Computer Network Operations of the National Security Agency (NSA)
CSFI Advisory Director
“ARE YOU ON THE RIGHT COURSE? Check out CSFI's Operations Design course that puts Cyber Operations (DCO, OCO) into a contingency context. Thought-provoking content. “
John Toolan
LtGen. (Ret.), USMC
CSFI Advisory Director
"The reputation of this organization [CSFI], particularly in the area of cyber and the information environment is stellar."
Mark Kelton
CSFI Advisory Director
Former Deputy Director of the National Clandestine Service for Counterintelligence (DDNCS/CI) - CIA, Adjunct Assistant Professor in the Security Studies
Program of the Edmund A. Walsh School of Foreign Service, Georgetown University.
"The Cyber Security Forum Initiative (CSFI) is unique in its mission of maintaining and furthering those advantages by
fostering Cyber awareness and collaboration among the U.S. government, military, and commercial sectors, as well as with international partners. CSFI is
prescient not only in its work in defeating current Cyber threats but also in anticipating future challenges."