Course Details
Lesson # | Main Topic | Details |
Lesson #1 | Basic Concepts of Information Warfare I |
- Introduction to the module. - Information’s role in Warfare - The forms of Information Warfare. - Information Warfare and Information Operations - A functional taxonomy of Information Warfare |
Lesson #2 | Basic Concepts of Information Warfare II |
- Data, Information and Knowledge- Intelligence - IW in the Military Discipline - A Taxonomy of Military Operations for IW |
Case Study #1 |
The Eligible Receiver Exercise |
|
Lesson #3 | Information Warfare and Related Disciplines I |
- Cyberspace and superiority of information - Effect-based Operations (EBO) - OODA Loop - C4ISR |
Lesson #4 | Information Warfare and Related Disciplines II |
- Network Centric Warfare (NCW) - Cyberwar - Netwar - Knowledge Management (KM) |
Case Study #2 | The Solar Sunrise Attack | |
Lesson #5 | Information Warfare and the Military |
- Command and Control Warfare (C2W) - Taxonomy of C2W Functional Elements and Supporting Disciplines - The four basic IO/IW techniques |
Case Study #3 | Operation Ivy Bells | |
Lesson #6 | C2W Main Components | - A short description of Physical Destruction, EW, OPSEC, PSYOPS, MILDEC and Intelligence |
Case Study #4 | The Moonlight Maze Attack | |
Lesson #7 | Offensive Information Operations I |
- Fundamental Elements of Information Attack - The Weapons of Information Warfare - Network Attack Tactics - C2W Attack Tactics |
Lesson #8 | Offensive Information Operations II |
- IW Targeting and Weaponeering - Intelligence and Targeting - Information Weapons |
Case Study #5 | The Stuxnet virus | |
Lesson #9 | Defensive Information Operations I |
- Fundamental Elements of Information Assurance - Authentication and Access Control - Secure Access Systems |
Lesson #10 | Defensive Information Operations II |
- Cryptography - Encryption - Digital Signatures - Survivable Information Structures |
Case Study #6 | The McKinnon Case |