Comms Resilience: Avoid Detection, Resist Attack, Survive Attrition The purpose of resilient communications is to ensure the flow of data regardless of adversarial actions or environmental conditions. Three...
Joint Electromagnetic Spectrum Operations This course equips individuals with the skills to operate within a Joint Electromagnetic Spectrum Operations (JEMSO) Cell or to effectively...
Introduction to 5G / FutureG Use Cases and Capabilities The 5G / FutureG Use Cases and Capabilities course provides a fundamental understanding of 5G networks, use cases, and capabilities, as well...
5G / FutureG Radio Access Network Essentials The 5G / FutureG Radio Access Network Essentials course provides a fundamental understanding of 5G RAN interfaces, waveforms, link budgets...
5G /FutureG Core Network Fundamentals The 5G / FutureG Core Network Fundamentals course provides a fundamental understanding of 5G Core components, interfaces and architecture of...
Digital Forensics Techniques for Embedded Systems Take a systematic approach. In Digital Forensics Techniques for Embedded Systems, you will explore the forensic investigation of the...
Embedded Security Tools and Techniques: Hands-on Assessment Exercises Embedded computing systems are prolific in modern society and increasingly used in applications ranging from consumer products (e.g., mobile...
Cyber Warfare/Electronic Warfare Convergence This course will help engineers, designers, and others gain foundational knowledge of the broad implications of cyber warfare and electronic...
Secure Software Development Learn best practices and techniques for developing software in a way that prevents the inadvertent introduction of security vulnerabilities...
Protecting Your Organization from Insider Threats In today’s information-centric environment, protecting organizational data from deliberate or unintentional disclosure is paramount. While...