Shopping Cart

No products in the cart.

Introduction to Cybersecurity in Space Systems with Tim Fowler

Introduction to Cybersecurity in Space Systems

Overview

  • Course Length: 16 hours
  • Support from expert instructors
  • Includes a certificate of completion
  • 12 months access to Cyber Range
Instructor:

Introduction to Cybersecurity in Space Systems is a course designed to expose cybersecurity professionals to the concepts and implementations of space systems including the ramification and impacts security can have on a mission.

In this course each element is broken down into its most basic components and we look at how proper security can be applied; what tradeoffs must be made and many of the operational constraints governing every design decision.

This course walks students through each of the segments that make up a space system, the subsystems that comprise a spacecraft, and ways that each need to be defended from attacks.

This course also includes multiple hands-on labs that will walk students through the process of implementing a custom ground station solution, a virtual satellite with simulated subsystems, and executing simulated attacks against both.

At the completion of this course, students will have a fundamental knowledge and understanding of space systems, how and where security can be implemented and have a set of tools, they can use to further their knowledge and experience.

What You Will Learn

  • Foundational Knowledge: A strong foundation in space systems, including an understanding of satellite technology, ground stations, communication protocols, and the components that make up space-based infrastructure
  • Cybersecurity Expertise: In-depth knowledge of cybersecurity principles and practices as they apply to space systems, including threat modeling, vulnerability assessment, penetration testing, and risk management
  • Real-world Case Studies: Exposure to real-world examples and case studies of cyberattacks on space systems, enabling attendees to learn from past incidents and understand the evolving threat landscape
  • Ethical Hacking Techniques: Practical experience with ethical hacking tools and methodologies tailored to space system security
  • Hands On Experience: Practical experience with deploying and using a virtual space system lab for fun and learning
  • Additional Resource Materials: Beyond access to course materials, students will be provided reference guides, and resources that can serve as valuable references in their continuing education on the topic of cybersecurity in space

Who Should Take The Course

  • University & Research Students
  • General Cybersecurity Professionals
  • Penetration Testers
  • Red Teamers
  • Blue Teamers
  • Space Enthusiasts
  • Aerospace Professionals
  • Stable Internet Connection
  • CPU: 64-bit processor (Intel i5/i7 8th generation or newer, or AMDequivalent recommended)
  • BIOS: Intel-VTx or AMD-V enabled. You must be able to access your BIOS if changes are necessary.
  • RAM: A minimum of 16GB of RAM is required. It is recommended to have 24GB or more of RAM.
  • STORAGE: A minimum of 40GB of free storage space is required.

Host Configuration and Software Requirements

Additionally, students will need the following host and software requirements:

  • VirtualBox and Hyper-V will not be supported
  • VMware Workstation Pro 17.0.0+ or VMware Player 17.0.0+
  • Free trials can be obtained from VMware for your host operating system.

There are no scheduled live dates for this course at this time. Private training may be available.

Course Categories:

Blue Team, Featured, Space Systems

Course Inquiry

Course Introduction to Cybersecurity in Space Systems with Tim Fowler