This course examines threat characteristics to derive signature vulnerabilities, suppression strategies and priorities. We explore signature-generation mechanisms and modeling techniques, as well as special types of challenges posed by a low observable (LO) platform requirements. We then investigate the survivability impact of signature suppression and the value of synergistic techniques with jammers and decoys.
Partner with Georgia Tech to hire a veteran. As a partner, the Georgia Tech program will train military members in areas that directly translate to their job duties.
Georgia Tech Professional Education allows working professionals and industry partners to access the expertise of a world-renowned technological research university. As an academic division of the Georgia Institute of Technology, we embrace the Georgia Tech values of integrity, excellence, impact, and innovation. These values drive every aspect of our programs.