EC3760 Information Operations Systems

This course examines the Network-centric Environment that is the focus of the Information Operations (IO) infrastructure with emphasis on current and future implementation models. A Signals Intelligence (SIGINT) approach is taken in which the adversary's computer network system architecture is examined and evaluated for the purpose of exploitation, protection, and/or attack. A thorough review of the fundamentals of communications, computer networks, and advanced digital technologies is discussed. This course works closely with the Department of Defense to reinforce realistic approaches for solving critical IO issues within the community. Requires U.S. citizenship and TOP SECRET clearance with eligibility for SCI access.

Prerequisite

EC2700 or Consent of Instructor

Lecture Hours

3

Lab Hours

2

Security Clearance Required

  • Top Secret SCI

Course Learning Outcomes

·       The student will describe a layered defense approach to computer network security.

·       The student will describe a variety of hierarchical computer network attack strategies.

·       The student will identify Department of Defense components involved in Information Operations (IO) and Computer Network Operations (CNO).

·       The student will address the importance of SIGINT in executing IO and CNO.

·       The student will demonstrate a working knowledge of the current tools used for offensive and defensive computer network operations.

·       The student will demonstrate a detailed understanding of the topology of a network-centric environment.

·       The student will identify communications industry standards related to network-centric environments.

·       The student will differentiate between wide area, metropolitan area, and local area networks and discuss hardware and communications issues associated with each.

·       The student will be able to discuss the concepts of internetworking and layered architectures.

·       The student will identify the components of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture.

·       Given a TCP/IP protocol, students will identify the dependencies the protocols on other underlying protocols.