This course introduces methods for attacking and compromising various systems including authentication systems, passwords, networks, computers, people and peripheral devices (IoT). Students will develop skills necessary to participate in Red Team ethical hacking exercises and competitions. Prerequisite(s): IST 166 and CYB 110 or instructor approval
Explain the importance of information as a military asset.
Describe the targets and combatants of cyberwarfare.
Explain the role of law and ethics in cyberwarfare.
Describe intelligence operations in cyberwarfare.
Describe cyberwarfare attackers and the evolution of cyberwarfare techniques.
Describe the concept of defense-in-depth and various defense-in-depth strategies.
Explain how cryptography is used in cyberwar.
Explain how to attack/defend endpoints, networks, and data.
Explain how military doctrine guides the conduct of warfare.
Summarize what cyberwarfare may be like in the future.
Describe ethical hacking skills, techniques and tools.