Cyber Warfare For Practitioners Training

This course addresses the techniques and approaches for defending against espionage, hacktivism, insider threats, and non-state actors such as organized criminals and terrorists.

Course Overview

Our 3-day, instructor-led Cyber Warfare For Practitioners Training course is designed for IT professionals such as auditors, managers and security analysts. It will cover:

  • The battlefields, participants, tools & techniques of cyber warfare
  • The ethics, laws & consequences of cyber warfare
  • How computer criminal law may change because of cyber warfare
  • How to identify & defend a network against malicious attacks
  • Hacktivism, espionage & insider threats

Prior to taking this course, you should have some experience in the IT field. Though not required, it may be helpful to have the CompTIA® Security+ and/or the EC-Council® CEH certifications


Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 240-667-7757.


Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Outline

The Cyberwarfare Landscape

  • Information as a military asset  
  • Targets and combatants  
  • Cyberwarfare, law, and ethics 
  • Intelligence operations in a connected world  

Offensive and Defensive Cyberwarfare

  • The evolving threat: from script kiddies to advanced attackers  
  • Social engineering and cyberwarfare  
  • Weaponizing cyberspace: a history  
  • Nonstate actors in cyberwar   
  • Defense-in-depth strategies  
  • Cryptography and cyberwar  
  • Defending endpoints  
  • Defending networks  
  • Defending data  

The Future of Cyberwarfare

  • Cyberwarfare and military doctrine
  • Pandora’s box: the future of cyberwarfare

Cyber Warfare for Practitioners Training Labs

  • Investigating and responding to security incidents
  • Auditing a wireless network
  • Using social engineering techniques to plan an attack
  • Eliminating threats with a layered security approach
  • Performing a post-mortem review of a data breach incident

Cyber Warfare For Practitioners Training FAQs

What is cyber warfare?

The Oxford dictionary defines cyber warfare as “the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.”

Who should enroll in Cyber Warfare for Practitioners Training?

This course is intended for IT auditors, IT managers, information security analysts, information security managers and systems administrators.

Subscribe now

Get new class alerts, promotions, and blog posts