Drone Cyber Security Course - Cyber Aspects of LIAS and Counter-UAS
top of page

Course Description

Drones have revolutionized the way military operations are conducted. They have become important tools for intelligence, surveillance, and reconnaissance (ISR) missions, as well as for delivering supplies and engaging in combat. However, drones are also vulnerable to cyber-attacks, which can compromise their operations and put military personnel and equipment at risk.

 

In this course, we will delve deeply into the cyber security challenges and solutions specific to military drone operations. Our instructors, who are experts in both cyber security and military operations, will share their knowledge and experience to help you better understand the threats to drone cyber security and how to mitigate them.

 

We will cover topics such as drone architecture, communication protocols, and data encryption. You will learn about the various types of drone cyber attacks, including jamming, hijacking, and data exfiltration, and how to detect and intercept them. We will also explore the use of counter-drone technologies, such as jammers and lasers, and discuss their effectiveness and limitations.

 

Through case studies and practical exercises, you will gain hands-on experience in securing military drone operations against cyber threats. You will learn how to conduct vulnerability assessments, design secure communication networks, and develop contingency plans for cyber attacks.

 

By the end of this course, you will have a comprehensive understanding of the UAS cyber security challenges and solutions specific to military drone operations. You will be equipped with the knowledge and skills necessary to detect, prevent, and mitigate cyber-attacks against drones, ensuring the safety and success of your military operations.


Who should take this UAS Cyber Security training?

Our Cyber-Aspects of LIAS (Low-Intensity Air Support) and Counter-UAS (Unmanned Aerial Systems) course is designed for Cyber Professionals working in military organizations, defense contractors, and other government agencies involved in drone operations. It is also relevant for cyber security professionals seeking to expand their knowledge in this field.

 

By taking this course, Cyber Professionals will gain a comprehensive understanding of the cyber security challenges and solutions specific to military drone operations. They will be equipped with the knowledge and skills necessary to detect, prevent, and mitigate cyber-attacks against drones, ensuring the safety and success of military operations.

 

Specifically, students will benefit from the following:

 

  • In-depth understanding of drone architecture, communication protocols, and vulnerabilities, and how to design secure communication networks that prevent cyber-attacks.

  • Knowledge about various types of drone cyber-attacks, including jamming, hijacking, and data exfiltration, and how to detect and intercept them.

  • Practical experience in conducting vulnerability assessments and developing contingency plans for cyber-attacks.

  • Practical counter UAS avoidance techniques and tactics using everyday materials and common equipment.

  • Understanding of counter-drone technologies such as jammers and lasers, and their effectiveness and limitations.

  • Exploitation techniques

 

Investing in this course will provide Cyber Professionals with the latest tools and knowledge necessary to secure drone operations against cyber threats, increasing operational effectiveness and safety. They will be better equipped to protect sensitive data, prevent drone hijacking, and ensure the successful completion of military missions.


Learning Objectives

Upon completion of this course, students will be able to:

 

  • Describe the architecture of military drones and their communication protocols, including the vulnerabilities and potential cyber security risks associated with these systems. 

  • Explain the various types of drone cyber-attacks and tactics used by cyber criminals to compromise drone operations. 

  • Develop and implement security measures to prevent cyber-attacks against drone operations, including secure communication networks, encryption techniques, and secure drone software. 

  • Conduct vulnerability assessments and penetration testing to identify potential security vulnerabilities in drone systems and develop strategies to mitigate them. 

  • Identify and evaluate counter-drone technologies, such as jammers and lasers, and their effectiveness and limitations. 

  • Apply the latest tools and techniques in drone cyber security to secure military drone operations, enhance operational effectiveness, and ensure the safety of military personnel and equipment.

 

Prerequisites:

  • Basic knowledge of computer systems and networks, including TCP/IP protocols, operating systems, and programming languages such as Python.

  • Cyber security fundamentals, including encryption, authentication, and access control.

  • Network architecture and protocols, including TCP/IP, DNS, and routing.

  • Operating systems and applications, including Windows, Linux, and mobile devices.

Required Hardware/Software

Students are expected to bring their own laptops to the car hacking training. The laptops are required to run a 30GB virtual machine but will not perform any intensive computation. A recommended hardware configuration would have the following:

  • 50 GB of free hard disk space

  • 16 GB of RAM

  • 4 Processor cores

  • VMWare or Virtual Box to import an ova file

 

Example Course Schedule:

Day 1:

  • Introduction to military drone operations and cyber security challenges

  • Overview of drone architecture and communication protocols

  • Understanding drone cyber-attacks and tactics used by cyber criminals

  • Security measures for drone operations, including secure communication networks and encryption techniques

  • Vulnerability assessments and penetration testing of drone systems

 

Day 2:

  • Compliance with regulations and standards

  • Case studies of drone operations and cyber security incidents

  • Counter-drone technologies and their effectiveness and limitations

  • Evaluation of jammers, lasers, and other counter-drone measures

 

Day 3:

  • Strategies for detecting and tracking drones

  • Understanding drone flight behavior and patterns

  • Developing contingency plans for cyber-attacks

  • Incident response procedures and recovery strategies

  • Backup and restore operations

  • Practical exercises in incident response and recovery

 

Day 4:

  • Practical exercises in securing drones against cyber-attacks

  • Designing secure communication networks and implementing encryption techniques

  • Advanced cyber security techniques for drone operations

  • Exploiting drone vulnerabilities and developing strategies to defend against them

 

Day 5:

  • Final project: Development of a comprehensive cyber security plan for military drone operations

  • Presentation of final project to the instructor and peers, with feedback and discussion.

  • Wrap-up and review of key concepts and takeaways from the course.

  • Q&A session with the instructor to address any remaining questions or concerns.

  • Course evaluation and feedback.

 

Throughout the course, students will have access to expert instructors who will provide guidance, answer questions, and facilitate learning. Practical exercises and case studies will be used to reinforce key concepts and provide hands-on experience in securing drone operations against cyber threats.

 

By the end of the course, students will have a comprehensive understanding of the cyber security challenges and solutions specific to military drone operations. They will be equipped with the knowledge and skills necessary to detect, prevent, and mitigate cyber-attacks against drones, ensuring the safety and success of military operations.

About Boston Cybernetics Institute

Boston Cybernetics Institute, PBC was created by former MIT Lincoln Lab cybersecurity researchers to give meaningful niche cyber instruction to a new generation of cybersecurity professionals.

 

We avoid the normal style of teaching with PowerPoint and lectures, opting to provide instead real-life engaging instruction that takes place in a customized environment. We have given our style of instruction to multiple DoD agencies, US commercial companies, and international companies.

BCI_LOGO_FINAL_Seal_Black-MOD2.png

Instructors at Boston Cybernetics Institute

Jeremy Blackthorne.png

Jeremy Blackthorne

President of the Boston Cybernetics Institute

Jeremy Blackthorne is a Lead Instructor at the Boston Cybernetics Institute (BCI). Before BCI, he was a researcher in the Cyber System Assessments group at MIT Lincoln Laboratory. Blackthorne is the co-creator and instructor for the Rensselaer Polytechnic Institute (RPI) courses: Modern Binary Exploitation, Spring 2015 and Malware Analysis, Spring 2013. ​Jeremy has published research at various academic and industry conferences. He served in the U.S. Marine Corps and is an alumnus of RPISEC. He holds a BS and MS in computer science. ​ Blackthorne was an active member of the Student Security Club and CTF team, RPISEC, from 2012 to 2015, where he taught seminars on Reverse-Engineering, Exploitation, and various other Cybersecurity topics.

Clark-Wood.jpg

Clark Wood

security researcher and instructor

Clark Wood is a security researcher and instructor at the Boston Cybernetics Institute (BCI), focusing on Reverse Engineering, Exploitation, and CI/CD. He recently built a Reverse-Engineering and Exploitation platform for a DoD customer and is the Lead Engineer for BCI’s Government Services. Clark was formerly on the technical staff at MIT Lincoln Laboratory where he was a member of the Cyber System Assessments Group. ​Clark holds a BA in Economics from the University of Florida, a BS and MS in Computer Science from Florida State University, and a Master’s in Technology and Policy from MIT. ​

Rodolfo.png

Rodolfo Cuevas

security researcher and instructor

Rodolfo Cuevas is a security researcher and instructor at BCI, where he focuses on understanding how design constraints can be used to limit the impact of an attacker on a system. His research combines the adversarial mindset with approaches influenced by Systems and Control Theory. ​ Rodolfo was a staff member at MIT Lincoln Laboratory and began his career as a RADAR and Ballistic Missile Defense System (BMDS) analyst. Later, Rodolfo transitioned to evaluating and Red-Teaming tactical and commercial cyber systems in support of DoD and other government programs. ​ Rodolfo holds a BS, M.Eng., and M.S. in Electrical and Computer Engineering from Cornell University.

Reed-Porada.jpg

Reed Porada

security researcher and instructor

Reed Porada is a security researcher and instructor at BCI, focused on getting to the "so what" of both defensive and offensive cyber measures. Reed also leads BCI training in Cyber Systems Analysis, focusing on developing systems-thinking skills of developers up to managers. ​Reed was a staff member at MIT Lincoln Laboratory for ten years, where he was responsible for Test and Evaluation, Test Automation Research, Red-Teaming of Cyber Systems, and Blue System Architectures. Reed was a computer scientist at the Naval Research Laboratory focused on wireless communication systems. He holds a BS in Computer Science from the University of Maryland, College Park and an MS in Software Engineering from Carnegie Mellon University.

Drone Cyber Security Course - Cyber Aspects of LIAS and Counter-UAS

Ensure your military operations are protected from drone cyber-attacks with our expert training.

Cyber-security-course.png

COURSE PRICE

Upon request

COURSE LENGTH:

Varies

What happens after I click the button?

Your default e-mail client will pop up and you'll be asked to write us a short message. Please let us know which course you are interested in and what dates would work for you.

Anchor 1
bottom of page