This course introduces how digital forensics tools and techniques can be applied in electronic warfare. Electronic warfare (not to be confused with cyber warfare) has been a staple in modern day warfare, especially since World War II, and it has continued to evolve with more technological advancements. Digital forensics provides an avenue for improved capabilities in such warfare to ensure superiority in the electromagnetic spectrum in order to have an upper hand over adversaries.

The increased risk of terrorist activity and hybrid warfare utilization of the electromagnetic spectrum also puts civilians and businesses at risk; hence basic knowledge and awareness of electronic warfare also helps individuals and organizations improve their readiness and protection. Electronic footprints can be analyzed to determine what kind of threat actor they are exposed to, for taking proper and adequate remedial action.

Why THIS course? 

Digital forensics plays an integral part in electronic warfare. It has become increasingly important in an era where cyber threats can originate from numerous sources. Understanding the intricacies of these threats and how to counteract them is a valuable skill in the present digital landscape. While this course focuses on the application of digital forensics in electronic warfare, an understanding of this topic will also enhance the understanding of digital forensics in general, as the principles often remain the same.

Why NOW? 

With the escalating risks in the digital world, it is essential to acquire the skills and knowledge to tackle these threats. Digital forensics in electronic warfare is a rapidly evolving field, and staying abreast of the latest techniques is crucial. The fundamental concepts, however, remain consistent. Therefore, it is best to learn these skills now to be prepared for the future challenges.

Who is this course for?

  • Information Security Practitioners
  • Incident Responders
  • Digital Forensic analysts

Course benefits:

What skills will you gain?

  • Basic electronic warfare concepts
  • Compare and contrast military and civilian use of digital forensics
  • How to apply digital forensics in warfare and intelligence

What will you learn about? 

  • The basics of electronic warfare
  • Historical development of electronic warfare
  • Military applications of digital forensics
  • Application of digital forensics in warfare

What tools will you use?

  • Various digital forensics tools in the context of electronic warfare

COURSE PREREQUISITES

COURSE IS SELF-PACED, AVAILABLE ON DEMAND

DURATION: 18 hours

CPE POINTS: On completion you get a certificate granting you 18 CPE points.

The course starts on the 1st of July.

Course format: 

  • Self-paced
  • Pre-recorded
  • Accessible even after you finish the course
  • No preset deadlines
  • Materials are video, labs, and text
  • All videos captioned

What should you know before you join?

  • Basic information systems knowledge
  • Basic cyber security knowledge
  • Basic digital forensics knowledge

What will you need?

  • PC, tablet, smartphone
  • Internet connection

Your instructor: Dauda Sule

Profile photo of Mahmoud SoheemDauda Sule is a lecturer in the Department of Cybersecurity at the Air Force Institute of Technology (AFIT) in Kaduna. Previously, he served as a marketing director at GGL Risk and Strategic Consulting, a training and consulting company offering training and seminars on information management and security, control, finance, fraud prevention, and anti-money laundering.

 


COURSE SYLLABUS


Module 0: Introduction to Electronic Warfare

The module will introduce students to the concept of electronic warfare beginning with an introduction to the electromagnetic spectrum. There is a need to understand what the electromagnetic spectrum entails to get a better understanding of electronic warfare and its application. The components and tenets of electronic warfare will also be highlighted.

How electronic warfare relates to information warfare, psychological warfare and cyber warfare will be discussed.

  • Introduction to the electromagnetic spectrum (EMS)
  • What is electronic warfare?
  • Components of electronic warfare
  • Comparison: Electronic warfare, cyber warfare, information warfare, psychological warfare

 

Module Workload Suggested Module Time: 3 hours


Module 1: Notable Milestones in the Development of Electronic Warfare

This module briefly describes some notable historical milestones in the development of electronic warfare. It helps to better understand and appreciate electronic warfare and know how far the world has come in terms of that.

 

2.1 Introduction
2.2 The US Civil War
2.3 The Russo-Japanese War
2.4 World War I
2.5 World War II
2.6 The Vietnam War
2.7 The Arab-Israeli Wars
2.8 US Military from ‘80s to Second Gulf War
2.9 Stuxnet
2.10 Israeli Response to Hamas Hacking Unit 2019
2.11 US Patrol Aircraft over Philippine Sea 2020
2.12 Suspected Russian Attacks 2014 to date
2.13 Future Trends

Quizzes will be administered at the end of each topic to help students gain maximum comprehension.

Module Workload Suggested Module Time: 3 hours


Module 2: A Look at Air Force Radar Systems

The module takes an introductory look at radar systems, especially, focusing on Air warfare. It provides a brief insight as to how radar is used for tracking and detection.

  • 3.1 What is Radar?
  • 3.2 Active Radar Countermeasures
  • 3.3 Integrated Air Defense Systems
  • 3.4 Ground-Control Interception
  • 3.5 Acquisition Radars
  • 3.6 Target Tracking Radars
  • 3.7 Airborne Interception Radars

Quizzes will be administered at the end of each topic to help students gain maximum comprehension.
The quizzes will be multiple choice and the pass mark would typically be 75%.

Module Workload Suggested Module Time: 3 hours


Module 3: Military Application of Digital Forensics

This module looks at how digital forensics is used by the military and how it differs from civil uses. The component (electronic support) of electronic warfare where and how digital forensics comes into play in the electronic support is discussed..

  • 4.1 Civil Digital Forensics vs. Military Digital Forensics
  • 4.2 Digital Forensics for Electronic Support
  • 4.3 Digital Investigations during warfare
  • 4.4 Digital Forensics and Security Intelligence
  • 4.5 Summary

Quizzes will be administered at the end of each topic to help students gain maximum comprehension.
The quizzes will be multiple choice and the pass mark would typically be 75%.

Module Workload Suggested Module Time: 3 hours


Module 4: Investigating Incidents on Critical Infrastructure: Industrial Control Systems (ICS)

This module looks at how digital forensics aids securing of critical infrastructure specifically in the light of industrial control systems (ICS) which can be achieved by investigating events and incidents in order to unravel what happened to mitigate future occurrence.

 

4.1 Information Technology vs. Operational Technology
4.2 Industrial Control Systems (ICS)
4.3 Digital Investigations in ICS
4.4 Summary

Quizzes will be administered at the end of each topic to help students gain maximum comprehension.

The quizzes will be multiple choice and the pass mark would typically be 75%.

Module Workload Suggested Module Time: 3 hours


Final exam:

The final exam will test the technical and theoretical details regarding browser artifacts.

 


Contact:

If you have any questions, please contact us at [email protected].

 

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023