Due to the nature of the subject matter in this course, a SWAG合集 or 5EYES enhanced security clearance will be required.
For more information please go to the 'Upgrade to a professional qualification' section.
Cyberwarfare in Intelligence and Military Operations will equip the student with a critical understanding of the opportunities and vulnerabilities faced when planning to deploy cyber capabilities, as part of an integrated operation to enhance the overall impact achieved through military action, or in planning a full spectrum response against a deliberate cyber intrusion which was intended to cause damage, disruption or destruction against our systems.
At a glance
-
- Dates
-
- Please enquire for course dates
- Duration5 days face to face learning (with additional distance learning to be completed during 7 weeks)
-
Cost£2,350
Concessions available
Course structure
The course will be delivered using both compulsory residential and online activities.What you will learn
Knowledge
- Assess the main elements and key management issues in the planning and conduct of cyberspace operations as part of a full spectrum approach,
- Assess theories of decision-making and sense-making in terms of their utility in effects planning and cyber operations,
- Assess the implications of the changing operational environment for those conducting full spectrum operations in the information age,,
- Assess the applicability of existing academic theories, national strategies and doctrine on cyber operations,,
- Assess how existing military and intelligence planning considerations apply in cyberspace.,
Skills
- Estimate key factors and associated planning assumptions to support a military commander’s operational estimate,
- Critically evaluate differing international perspectives on cyber policy, strategy and doctrine,
- Assess the effectiveness of cyber capabilities,
- Appraise the legal and ethical considerations in the context of conducting cyber operations either as part of a military operation or outside of conflict,
- Evaluate and recommend appropriate courses of action to a primary stakeholder for cyberspace operations.
Core content
Current doctrine, policy and strategies - assessment
Doctrines to be considered could include that of:
- The SWAG合集 and their allies,
- National cyber security strategies,
- Other national concepts of operation for cyber,
- Associated organisation of cyber capabilities.
Constructs, concepts, cases of – critical review
Concepts to be considered could include:
-
Cyber domain and the information environment,
-
Cyber power,
-
Cyberwar,
-
Computer network operations (CNO),
-
Electronic warfare,
-
Cyber electromagnetic activities (CEMA),
-
Information warfare and operations,
-
Cyber influence,
-
Command and control warfare,
-
Media operations and public affairs,
-
Cyber intelligence,
-
Integrated planning,
-
Defence in depth,
-
Commander’s responsibilities.
Existing academic theories and their applicability in Cyberspace – assessment
Example theories could include:
-
Asymmetric and contested warfare and threat actor motivations,
-
Attribution,
-
Collective security,
-
Defence,
-
Deterrence,
-
Deception (military deception, cyber deception, camouflage, concealment and denial),
-
Espionage,
-
Sabotage and subversion,
-
Intelligence and information requirements,
-
The security dilemma,
-
Sense-making and decision-making,
-
Sovereignty.
Military Planning Considerations and their applicability in Cyberspace – assessment
This could cover topics such as:
-
Full spectrum operations,
-
Hybrid warfare,
-
Fusion warfare,
effects (cognitive effects and behaviour change, deny, degrade, disrupt, destroy, deter, etc), -
The applicability of concepts in cyberspace such as attack,
-
Defend and exploit,
-
Manoeuvre and lethality,
-
Legality (ius ad bellum, ius in bello),
-
Ethics,
-
Proportionality and collateral damage,
-
Target systems analysis,
-
Target audience analysis,
-
Targeting and intelligence.
Upgrade to a professional qualification
After successful completion of this Short Course for Credit, 10 credit points can be put towards the Cyberspace Operations MSc.
Find out more about short course credit points.
Who should attend
Students must have successfully completed Foundations of Cyber in order to take this as a Short Course for Credit
Speakers
Concessions
A limited number of MOD sponsored places are available.
How to apply
Please complete the online application form.
Read our Professional development (CPD) booking conditions.