Computer network operations (CNO) software development is very much like traditional software development: code needs to be modular, reliable, and well-documented, with one major exception - there is an adversary.
In this course, students learn the unorthodox programming techniques and strategies to make software operationally effective, suitable, and survivable in the face of modern adversaries.
Course Length Varies - This course delivers the information senior executive staff need to secure a competitive edge in the information technology arena by building up organic innovation capabilities and knowledge management within their own organizations.
We use examples from the United States innovation ecosystem to connect goals to resources to enabling organizations. We delineate the innovation ecosystems and opportunities available to those wishing to keep moving forward including the policy and regulatory challenges associated with technological innovation in legacy environments.
We map out the existing research and development resources such as DARPA, IARPA, FFRDCs, IJARCs, and national laboratories, which can all be leveraged by military' commanders today and show how organization can combine innovation from outside with innovation inside their organization.
This is a majority hands-on course, with theory, visualizations: and lectures as needed. Exercises are in Linux and VxWorks and utilize multiple architectures with an emphasis on PowerPC. The course balances fundamentals with modern applications.
After completing this course, students will have the practical skills required to assess embedded programs for vulnerabilities, recommend mitigations, and create proof-of-concept exploits to demonstrate those vulnerabilities to commanders.