Cyberspace Operations – Homeland Defense and Security
Interested in attending? Have a suggestion about running this course near you?
Register your interest now
Want to run this event on-site? Enquire about running this event in-house
This two-day, non-technical cyberspace course is designed for leaders and personnel that team with Department of Defense (DoD) cyberspace organizations. The course will focus on analysis of vulnerabilities and threats to the U.S. Critical Infrastructure; whole of government cyberspace responses to threats; and protection and defense of the homeland.
The national and economic security of the United States depends on the reliable functioning of Critical Infrastructure. The DoD works with its interagency partners [Department of Homeland Security (DHS), Department of Justice (DOJ), the Intelligence Community (IC), and others], state and local governments, and the private sector to deter and if necessary, defeat cyberattacks on the U.S. homeland and U.S. interests.
Attendees will develop a better understanding of DoD's homeland defense and security cyberspace operations, as well as the roles and responsibilities of other national level actors (DHS, DOJ, the IC, and others). Technical and tactical cyberspace experts can benefit from this course by understanding how National policies and strategies guide their activities. Attendees will receive copies of the presentation along with some relevant white papers.
- Terminology, definitions, and descriptions.
Protecting the Nation – Cyberspace Policies and Strategies:
- National and Defense Cyberspace Strategies
- National Cyber Incident Response Plan
DHS – Roles and Responsibilities:
- DHS Cybersecurity Strategy
- Cybersecurity and Infrastructure Security Agency
DOJ – Roles and Responsibilities:
- FBI Cyber Strategy
- Cyber Digital Task Forc
Intelligence Community (IC) – Roles and Responsibilities:
- Domestic Approach to National Intelligence
- Cyber Threat Intelligence Center
DoD - Defending the Nation against Cyber Attacks:
- Defense Support to Cyber Incident Response (DSCIR)
- National Guard contributions
Case Study – Contested Deployment:
- Analyze "Significant Cyber Incidents" that impact the deployment of forces from the homeland
- Evaluate the effectiveness of coordinated actions of DHS, DOJ, DoD, the IC, and the Private Sector
Ben Leitzel [pronounced “light-zul”] (Colonel, USAF Retired) recently retired from the United States Army War College where he was an Assistant Professor, Chief of the Cyberspace Division, and Chair of the Cyberspace Working Group. He entered the Air Force in 1982 after he graduated from Parks College of Saint Louis University with a degree in Aeronautical Administration. He is a graduate of Navigator Training, Electronic Warfare Officer Training, Squadron Officer School, Air Command and Staff College, and the Air War College.
Prior to his arrival at the Army War College, he was assigned to the Joint Forces Staff College, where he instructed and was chief of the Joint Planning Orientation Division. Previous non-command assignments include service as a US European Command J-5 Staff Officer, 28th Operations Support Squadron Operations Officer, B-1B Weapon Systems Officer, and B-52 Electronic Warfare Officer.
He commanded Detachment 1, Air Combat Command Training Support Squadron at Luke Air Force Base, Arizona. He is an experienced combat aviator and was hand-picked to fly the first B-1 combat mission during Operation ALLIED FORCE, flying a total of 16 combat sorties. His crew earned Eighth Air Force’s General Ira C. Eaker Award for outstanding airmanship. While assigned to the Army War College, he deployed to Afghanistan as the NATO ISAF Director of Air Plans.
After retiring from active duty, he continued to support professional military education as an Assistant Professor at the Saudi War College and U.S. Army War College.
Mr. Leitzel holds a Master’s Degree in Aviation Management from Embry-Riddle Aeronautical University. His awards and decorations include the Legion of Merit, Distinguished Flying Cross, Defense Meritorious Service Medal with 1 Oak Leaf Cluster, Air Medal with 3 Oak Leaf Clusters, Operation Enduring Freedom and Kosovo Campaign Medals, and the NATO Medal.
What You Will Learn:
- Taxonomy: Joint and Interagency cyberspace terminology to understand and communicate with DoD cyberspace personnel.
- Whole-of-government responses to significant cyber incidents in the homeland.
- National Cyber Security Policies and Strategies.
- DoD Support to Cyber Incident Response.
- DHS roles and responsibilities.
- DOJ roles and responsibilities
Intelligence Community support for homeland defense and security operations
REGISTRATION: There is no obligation or payment required to enter the Registration for an actively scheduled course. We understand that you may need approvals but please register as early as possible or contact us so we know of your interest in this course offering.
SCHEDULING: If this course is not on the current schedule of open enrollment courses and you are interested in attending this or another course as an open enrollment, please contact us at (410)956-8805 or email@example.com. Please indicate the course name, number of students who wish to participate. and a preferred time frame. ATI typically schedules open enrollment courses with a 3-5 month lead-time. To express your interest in an open enrollment course not on our current schedule, please email us at firstname.lastname@example.org.
For on-site pricing, you can use the request an on-site quote form, call us at (410)956-8805, or email us at email@example.com.
|Radar Systems Fundamentals||Register interest|
|Cybersecurity Foundations course - Free short session||Register interest|
|Naval Weapons Principles||Register interest|
|Structural Design and Analysis for Aerospace Engineers (SDA)||28 Nov|