Compare courses
Register
Georgia Tech Professional Education

Cyber Warfare/electronic Warfare Convergence

This course has no confirmed dates in the future. Subscribe to be notified when it is offered.

Relevant courses

Course format
Starting after
Ending before

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with Georgia Tech Professional Education.

Full disclaimer.

Description

This course will help engineers, designers, and others gain foundational knowledge of the broad implications of cyber warfare and electronic warfare (EW) convergence. Topics will introduce traditional cyberattacks and electronic warfare and cover topics such as infrastructure and communication impacts, attack vectors, and vulnerability analysis. You'll have the benefit of practicing your new skills through demonstrations to later apply them at your organization.

What You Will Learn

  • Foundational knowledge of cyberwarfare, electronic warfare, and their convergence
  • How critical infrastructure and communications systems must adapt to the integration of these domains
  • Network attack techniques and tools for assessing vulnerabilities
  • How attack vectors are identified, down-selected, and exploited using software defined radios

How You Will Benefit

  • Gain foundational knowledge of cyberwarfare, electronic warfare, and the convergence of the two.
  • Identify how critical infrastructure and communications systems must adapt to the integration of these domains.
  • Explore network attack techniques and tools for assessing vulnerabilities.
  • Practice newly learned skills through demonstrations.

Content

INTRODUCTION

  • Cyber warfare
  • Electronic warfare
  • Cyberspace and IT

TARGET ARRAY

  • Integrated air defense system (IADS)/Radar
  • Critical infrastructure

CYBER/EW SYSTEMS

  • Exploitation and attack techniques
  • Basic components and required capabilities

WIRELESS SECURITY

  • Standards
  • Radio frequency (RF) man-in-the-middle attack (MITM)

TEST AND EVALUATION

ELECTRONIC WARFARE (EW)

  • RF fundamentals
  • RF propagation
  • EW

CYBER WARFARE

  • Networking fundamentals
  • Network attacks
  • Critical infrastructure

CYBER EW CONVERGENCE

  • Attack vector identification
  • Vulnerability discovery
  • Exploitation and attack techniques

TOOLS AND APPLICATIONS

  • IADS/Radar
  • RF MITM versus rouge nodes
  • Software-defined radios
  • Binary analysis

Who should attend

This course is designed for engineers, developers, and managers.

Experts

Phil D. West, Georgia Tech Research Institute principal research engineer, has been working on radar-signal processing, radar-target tracking, emitter geolocation and ECM design since 1983. He has published more than 25 technical papers, book chapters, and reports on EW and radar development. He ...
Dr. Wright holds a Ph.D. in Electrical Engineering from the Georgia Institute of Technology and has more than twenty-five years in research and development, most notably in cyber security technologies and concepts. In 2008, Dr. Wright founded a cybersecurity incubator, which led to the formation ...
Concentrates on exploitation and reconstruction of information in the form of signals, communication protocols, and application and embedded binaries. Determines hardware and software vulnerabilities and reconstructs signals to determine overt and covert methods of exploitation. Threat countermea...
Show more