eForensics for eWarfare
Published 7/2025
Duration: 6h 37m | .MP4 1280x720 30 fps(r) xx| AAC, 44100 Hz, 2ch | 7.72 GB
Genre: eLearning | Language: English
Published 7/2025
Duration: 6h 37m | .MP4 1280x720 30 fps(r) xx| AAC, 44100 Hz, 2ch | 7.72 GB
Genre: eLearning | Language: English
Investigations, Threat Detection and Reconnaissance in the Electromagnetic Spectrum
What you'll learn
- Explain what the electronic warfare means
- Identify the regions of the electronic spectrum
- Differentiate between civilian and military use of digital forensics in terms of main objective
- Identify where digital forensics can be applied for military and national security issues
Requirements
- No military experience or knowledge required
- Basic knowledge of information systems
- Basic understanding of cyber security
- Basic understanding of digital forensics
Description
This course introduces how digital forensics tools and techniques can be applied in electronic warfare. Electronic warfare (which is not to be confused with cyber warfare) has been a staple in modern day warfare, especially since World War II, and it has continued to evolve with more technological advancements. Digital forensics provides an avenue for improved capabilities in such warfare to ensure superiority in the electromagnetic spectrum in order to have an upper hand over adversaries.
There has been increased risk of terrorist activity and hybrid warfare, which would involve utilization the electromagnetic spectrum; this puts civilians and businesses at risk; hence basic knowledge and awareness of electronic warfare also helps individuals and organizations improve their readiness and protection. Electronic footprints can be analyzed to determine what kind of threat actor they are exposed to, for taking proper and adequate remedial response and action.
The course begins with an introduction to the concept of electronic warfare and highlight of some historical milestones in its development. Then moves to how digital forensics can aid in electronic warfare, indicating where, when and how it is applicable. Some real case examples of where digital forensics was applied in warfare are mentioned in addition to suggestions on potential applications.
Who this course is for:
- Cyber security learners and experts
- Military personnel
- Digital forensics investigators
- Beginners in critical infrastructure protection and security
- Everyone in general
More Info