
The course provides hands on laboratory exploration of adversarial cyber threats to DOD networks and weapon systems. No previous experience in cybersecurity is necessary. Students will learn and execute (in the lab environment) basic offensive cyber techniques, develop system requirements to defeat the threats, implement countermeasures and assess countermeasures effectiveness. Two days are spent on enterprise network attacks and security countermeasures and one day is spent working with an unmanned aerial system simulator which is representative of currently fielded DOD unmanned weapon systems. The inclusion of offensive techniques training for DoD weapon systems differentiates this workshop from similar training provided in the commercial sector. Critical Behaviors: Upon completion of this workshop the student will in their work environment, be able to: 1. Write system cybersecurity performance requirements from the perspective of defeating adversarial attacks. 2. Provide subject matter expertise at system design reviews regarding architectures and designs that are necessary to defeat cyber attacks on a system. 3. Assume a leadership role in developing and executing cooperative and adversarial cybersecurity test and evaluation plans and procedures. 4. Identify exploitable weaknesses in operating systems and software code using COTS tools across multiple computing platforms and devices. 5. Train program office personnel on cyber attack vectors including removable media, insider threats, social engineering, network and wireless access points.
- Teacher: Anthony Scotti

The workshop introduces several methods to help guide the implementation of the core cybersecurity principles across the DoD acquisition lifecycle. The workshop will reinforce the importance of balancing People, Process, and Technology, which are critical to designing and maintaining cyber resilient systems. Participants will be introduced to foundational knowledge of cybersecurity as it relates to the DoD Acquisition Lifecycle. Students will learn how cybersecurity principles apply to their career fields. The case studies in the workshop will allow participants to explore cybersecurity integration and risk management issues similar to the ones that they will likely face in their workplaces. The workshop is tailorable to the specific customer needs.
- Teacher: Mary Jane Blystone
- Teacher: Anthony Scotti

The JDN is comprised of multiple interconnected data networks across all the warfighting domains that link command and control systems across the United States Armed Forces. It provides near real-time, fused operational information to facilitate situational awareness (across the air, land, maritime, special, intelligence, space, and cyber domains) and enhances decision-making. The purpose of this module is to familiarize the user with some of the terminology and concepts of JDN operations. This module describes the mission, background, data management, and data sources of JDN operations and focuses on the relationship between the CTP and the COP. This module covers the roles and responsibilities of the JDN Operations Officer (JDNO).
- Teacher: Teacher Account
- Teacher: Mary Jane Blystone
- Teacher: Anthony Scotti