• Classroom
  • Online, Instructor-Led
Course Description

This course provides intensive hands-on experience building, configuring and utilizing single board computers (SBCs) like the Raspberry Pi (and others) for use in Electronic Warfare (EW) scenarios. Once completed, students will be able to implement a large variety of various SBC setups to achieve their specific use cases. This course is designed to be customizable for your needs, with an emphasis on edge-case, non-standard, implementations that are required by EW operator Tactics, Techniques and Procedures (TTP).

Learning Objectives

TCP/IP fundamentals & review (as necessary based on prior experience) Network traffic routing (and dealing with edge-case routing scenarios) Configuring Linux OS’, specifically Kali; this includes many of the built-in tools offered by Kali as well as using the underlying OS to achieve different security objectives (iptables & firewall configuration, NAT, service configuration, kernel event monitoring, etc.) Analysis & exploitation of 802.11 Wireless LANs Network analysis and evaluation to identify targets & potential attack vectors Leveraging advanced SSH techniques and modern VPN technologies for a wide variety of connection scenarios Scripting repetitive tasks and creating custom tools using shell scripting (bash, zsh) and Python3 Bluetooth Sniffing, Monitoring & Attack techniques Integrating different wireless methods (Bluetooth, 802.11, LTE) into specific use-case scenarios

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Cyber Investigation
  • Digital Forensics
  • Exploitation Analysis
  • Network Services
  • Risk Management
  • Software Development
  • Test and Evaluation
  • Threat Analysis
  • Training, Education, and Awareness
  • Vulnerability Assessment and Management