Information Operations Systems

Course #EC3760

Est.imated Completion Time: 3 months


This course examines the Network-centric Environment that is the focus of the Information Operations (IO) infrastructure with emphasis on current and future implementation models. A Signals Intelligence (SIGINT) approach is taken in which the adversary's computer network system architecture is examined and evaluated for the purpose of exploitation, protection, and/or attack. A thorough review of the fundamentals of communications, computer networks, and advanced digital technologies is discussed. This course works closely with the Department of Defense to reinforce realistic approaches for solving critical IO issues within the community. Requires U.S. citizenship and TOP SECRET clearance with eligibility for SCI access.

Security clearance: TS/SCI

Included in degrees & certificates

  • 227
  • 288


The following are eligible for this offering:

  • Naval Officers
  • Naval Enlisted
  • Non-Naval Officers
  • Non-Naval Enlisted
  • DON Civilians
  • DOD Civilians
  • Defense Contractors
  • Non-DOD Federal Employees
  • State and Local Government Employees
  • US Civilians


  • EC2700

Learning Outcomes

·       The student will describe a layered defense approach to computer network security.

·       The student will describe a variety of hierarchical computer network attack strategies.

·       The student will identify Department of Defense components involved in Information Operations (IO) and Computer Network Operations (CNO).

·       The student will address the importance of SIGINT in executing IO and CNO.

·       The student will demonstrate a working knowledge of the current tools used for offensive and defensive computer network operations.

·       The student will demonstrate a detailed understanding of the topology of a network-centric environment.

·       The student will identify communications industry standards related to network-centric environments.

·       The student will differentiate between wide area, metropolitan area, and local area networks and discuss hardware and communications issues associated with each.

·       The student will be able to discuss the concepts of internetworking and layered architectures.

·       The student will identify the components of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture.

·       Given a TCP/IP protocol, students will identify the dependencies the protocols on other underlying protocols.

Offerings database access
Asset Publisher

Application Deadlines

  •  08 Jul 2024

    Fall Quarter applications due

Asset Publisher

Academic Calendar

No upcoming events.