Link 16 Cybersecurity Training Crash Course

Print Friendly, PDF & Email

Link 16 Cybersecurity Training Crash Course Course Hands-on

Link 16 Cybersecurity Training Crash Course covers Link 16 TDL operational security and cybersecurity requirements for managing and exchanging Link 16 data.

Learn about security of Link 16 and datalink implementations needs to interoperate STANAG 5602 Standard Interface for Multiple Platform Link Evaluation (SIMPLE) Link 16 standard (Reference 8) protocol.

Learn how to analyze security and cybersecurity at node and message level model for various JTIDS J-messages messaging.

Duration: 4 days

Link 16 Cybersecurity Training Related Courses

Customize It!

● We can adapt this Link 16 Cybersecurity Training course to your group’s background and work requirements at little to no added cost.
● If you are familiar with some aspects of this Link 16 Cybersecurity Training course, we can omit or shorten their discussion.
● We can adjust the emphasis placed on the various topics or build the Link 16 Cybersecurity Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
● If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Link 16 Cybersecurity Training course in manner understandable to lay audiences.


● Link 16 Security Features and Policies
● How to administer, manage, and troubleshoot hardware, software, or services for single, mixed and multi-user Link-16 environments
● Use cyber security measures for Link 16 operations.
● Link 16 Joint key management Policies and Plans
● Procedures for production, distribution, and use of Link 16 COMSEC keying material (KEYMAT) for legacy and crypto modernized Link 16 systems
● Joint Multi-Tactical Data Link (TDL) Operating Procedures
● National Security Agency (NSA) security doctrine associated with Link 16 devices
● Link 16 Vulnerabilities and Mitigation

Link 16 Cybersecurity Training - Course Content:

Introduction of Link 16

General Link-16 Information
Link 16 architecture
Link 16 Terminals, Users, and Associated Platforms
Joint Tactical Information Distribution System(JTIDS) (AN/URC-107 Series)
Multifunctional Information Distribution System (MIDS) Low-Volume Terminal (LVT) (AN/USQ-140 Series) sets
MIDS Joint Tactical Radio System (JTRS) sets

Introduction to Link-16 Network and Information Security

Cryptographic Variable Logic Label (CVLL)
Link 16 Security Architecture
CVLL by the Joint Interface Control Officer (JICO)
Role of Operational Tasking Data Link (OPTASK LINK) Message
Basic Link-16 Security
Encryption including TRANSEC and Message Encryption (MSEC)
Partitioned Variable Mode (PVM) NPG
One variable for CVM NPG
Link 16 and functional mission areas
Joint theater air and missile defense
Attack operations
Suppression of enemy air defenses
Close air support
Time-critical targeting prosecution
Secure Data Unit
COMSEC Requirements
Link 16 Networks Protection
COMSEC Equipment and KEYMAT
Procedure to Load an Unencrypted ECU KEK into Link 16 Equipment
Procedure to Load Either an Encrypted ECU KEK or a TEK
Operational Link 16 Key Allocation

Link-16 Security Management

Link-16 Security Classification
J-Series Messages
Link-16 Crypto
Transition to Modernized Crypto
System Description
Key Loading Devices
Key Distribution for Link 16

Link-16 Key Management Infrastructure

Electronic Key Management System
Key Ordering Parameters for KMI and EKMS
Joint Key Management Plan Procedures
Key Management Responsibilities
Key Generation
Key Distribution
Key Storage
Key Loading
Crypto Periods
Compromise Procedures
Operational Tasking Data Link
Transition to Modernized Crypto
CJCSI 651002D directs DoD to perform Link 16 Crypto

Modernization for all DoD users and must also be extended to Allied and compatibility with legacy Link 16 equipment
Link-16 Penetration Test

Link 16 Digital Forensics
Link 16 Information Assurance and Security
Link 16 Network Defense
What is a Link-16 Penetration Test?
Vulnerability Scan
Link 16 Security Assessment
Effectiveness of Link 16 security controls against
Compliance audits
Controls and correct configurations
Determining the feasibility of a particular set of Link 16 attacks
Higher-risk vulnerabilities
Lower-risk vulnerabilities exploited in a particular sequence
Assessing the magnitude of potential operational impacts of successful attacks
Testing the ability of Link 16 network defenders
Post security incident

Request More Information

Time Frame: 0-3 Months4-12 Months