Cyber Warfare

Course #EC4765

Start Starts: not available

Clock Est. completion in 3 months

Location pin Offered through Distance Learning

Avg. tuition cost per course: See tuition Info For specific tuition costs of each program or contact information, please contact the NPS Tuition office at tuition@nps.edu .

Learn more about Service Obligation Info Officers accepting orders to a Graduate Education Program (GEP) are obligated to serve on active duty after completion.

Questions? Reach out directly:

NPS Online Student Support

online@nps.edu

Email
Offerings database access

Overview

Cyber warfare explored from an electrical engineering perspective. Historical examples of military cyber warfare operations are reviewed. Rudimentary denial-of-service techniques are initially discussed and progress to intelligent waveform-specific forms of computer network attack (CNA). The effect of communications signaling manipulation is analyzed in examples involving mobile wireless networks such as Global Systems Mobile (GSM), and the IEEE 802.11 and 802.16 standards. Extension of cyber warfare concepts to large scale systems is presented to include concepts in distributed denial of service attacks, distributed storage, distributed sensor coordination, and information exfiltration.

Included in Degrees & Certificates

  • 288

Prerequisites

  • EC3760

Learning Outcomes

  • The student will be able to cite historical examples of cyber warfare, describe their underlying mechanics, and discuss their effectiveness.
  • Given a pre-defined communications system, the student will be able to determine efficient techniques for denying service to the system through analysis of the system's control mechanisms.
  • The student will be able to describe techniques for communications signaling and discuss the effects of inserting signaling variations into the system.
  • The student will be able to discuss large scale systems for cyber warfare and suggest methods for extending their capabilities.
  • The student will be able to describe the mechanics of classified large-scale sensors.
  • The student will be able to list operational techniques for information exfiltration.
  • The student will describe unique warfare capabilities of software-defined radios.