[Infowarrior] - Computer Network Exploitation Course

Richard Forno rforno at infowarrior.org
Mon Apr 14 14:33:34 UTC 2008


(Yes, here's a rare piece of commercial self-promotion........-rick)


Computer Network Exploitation Course

https://www.myaoc.org/EWEB/dynamicpage.aspx?webcode=05_06_08_Comp
Alexandria, VA
Dates: May 6-9, 2008
Classification: Unclassified
Instructors: Richard Forno and Rob Floodeen
Location: AOC Headquarters, Alexandria, VA
Registration Fee: Members $1,650; Non-Members $1,735

Course Description 

Today, Electronic Warfare via CNE, can operate in the dimension of
Cyberspace conducting many of the traditional EP, ES, and EA functions
associated with Electronic Warfare, and at the same time, reduce the risk to
human life and equipment and conduct operations at greater speeds.  The goal
of this course is to introduce topics and theory that can be built upon for
actual implementation of CNE in support of an EW role for Information
Operations (IO).  Attendees will learn what IO and specifically CNE is and
examples of it at work.  They will spend time with exercises and role play
activities geared towards team management of CNE technicians.  They will be
exposed to EW concepts and overlapping points of interest with CNE.  The
Attendees will also learn best practices for management of CNE Teams,
building an operations center, and creating an operations methodology. The
instructor will also lead the class though a development exercise where they
develop a web-front end with database backend to fully examine concepts
behind storing and managing assets, and setting up formal and informal
information exchanges by using covert and encrypted tunnels.

Who Should Attend

Government and contract EW, analysts, operators, project managers, and
executives who work in any way with IO, CNO, or supporting elements, or
those persons recently or about to be thrust into a supporting position.

Course Outline

Day 1: Intro to CNE

·         Introduction to Information Operations
·         Introduction to Computer Network Exploitation
    o        Collect, Monitor, Falsify, Deconfliction
    o        Virtual verses Physical capabilities
    o        Introduction to LANs, WANs, and System Networking
    o        Battlespace
        §         Preparing
        §         Shaping
        §         Executing
·         Common Tools used to conduct CNE
    o        Covert C2 Mechanisms and Examples
        §         Ingress
        §         Exfiltration
        §         Manipulation
    o        Social engineering verses virtual or electronic data
exploitation
·         Exercises in Deploying the tool set

Day 2: Electronic Warfare correlation with Network Exploitation
·         Mapping EW to CNE
·         Exercise in determining when to Monitor versus jam
·         Enabling EW with Computer Network Exploitation techniques
·         Lab working with wireless communications
·         Identifying Targets and Target Acquisition
    o        Applying high-cost/value assets verses low-cost high-speed
electrons

  Day 3: Management of Network Exploitation Operations
·         How does the Internet Really work
·         Formalizing Operations Methodology
·         Building an Operation Center
    o        Internal Resource Prioritization
    o        Developing the team
    o        Developing the tools
·         Data management - operations, reuse, and recovery
·         Exercise: Instructor lead development of a database for
collections management
·         Implement Operations

Course Materials

Course materials include the text developed by instructors at the JC2IW
School of the U.S. Joint Forces Staff College and IO experts from several
countries (IO: Warfare and the Hard Reality of Soft Power - ISBN
1574886991), hardcopy of course slides and soft pdfs, and over xxx pages of
handouts (list of products used during the course, DataBase and Front-end
designed during the course to capture, store, and process received
information, CNE Planning and Management checklists, and more).  




More information about the Infowarrior mailing list