Link 16 Cybersecurity Training Crash Course Course Hands-on
Link 16 Cybersecurity Training Crash Course covers Link 16 TDL operational security and cybersecurity requirements for managing and exchanging Link 16 data.
Learn about security of Link 16 and datalink implementations needs to interoperate STANAG 5602 Standard Interface for Multiple Platform Link Evaluation (SIMPLE) Link 16 standard (Reference 8) protocol.
Learn how to analyze security and cybersecurity at node and message level model for various JTIDS J-messages messaging.
Duration: 4 days
● We can adapt this Link 16 Cybersecurity Training course to your group’s background and work requirements at little to no added cost.
● If you are familiar with some aspects of this Link 16 Cybersecurity Training course, we can omit or shorten their discussion.
● We can adjust the emphasis placed on the various topics or build the Link 16 Cybersecurity Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
● If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Link 16 Cybersecurity Training course in manner understandable to lay audiences.
● Link 16 Security Features and Policies
● How to administer, manage, and troubleshoot hardware, software, or services for single, mixed and multi-user Link-16 environments
● Use cyber security measures for Link 16 operations.
● Link 16 Joint key management Policies and Plans
● Procedures for production, distribution, and use of Link 16 COMSEC keying material (KEYMAT) for legacy and crypto modernized Link 16 systems
● Joint Multi-Tactical Data Link (TDL) Operating Procedures
● National Security Agency (NSA) security doctrine associated with Link 16 devices
● Link 16 Vulnerabilities and Mitigation
Link 16 Cybersecurity Training - Course Content:
Introduction of Link 16
General Link-16 Information
Link 16 architecture
Link 16 Terminals, Users, and Associated Platforms
Joint Tactical Information Distribution System(JTIDS) (AN/URC-107 Series)
Multifunctional Information Distribution System (MIDS) Low-Volume Terminal (LVT) (AN/USQ-140 Series) sets
MIDS Joint Tactical Radio System (JTRS) sets
Introduction to Link-16 Network and Information Security
Cryptographic Variable Logic Label (CVLL)
Link 16 Security Architecture
CVLL by the Joint Interface Control Officer (JICO)
Role of Operational Tasking Data Link (OPTASK LINK) Message
Basic Link-16 Security
Encryption including TRANSEC and Message Encryption (MSEC)
Partitioned Variable Mode (PVM) NPG
One variable for CVM NPG
Link 16 and functional mission areas
Joint theater air and missile defense
Suppression of enemy air defenses
Close air support
Time-critical targeting prosecution
Secure Data Unit
Link 16 Networks Protection
COMSEC Equipment and KEYMAT
Procedure to Load an Unencrypted ECU KEK into Link 16 Equipment
Procedure to Load Either an Encrypted ECU KEK or a TEK
Operational Link 16 Key Allocation
Link-16 Security Management
Link-16 Security Classification
Transition to Modernized Crypto
Key Loading Devices
Key Distribution for Link 16
Link-16 Key Management Infrastructure
Electronic Key Management System
Key Ordering Parameters for KMI and EKMS
Joint Key Management Plan Procedures
Key Management Responsibilities
Operational Tasking Data Link
Transition to Modernized Crypto
CJCSI 651002D directs DoD to perform Link 16 Crypto
Modernization for all DoD users and must also be extended to Allied and compatibility with legacy Link 16 equipment
Link-16 Penetration Test
Link 16 Digital Forensics
Link 16 Information Assurance and Security
Link 16 Network Defense
What is a Link-16 Penetration Test?
Link 16 Security Assessment
Effectiveness of Link 16 security controls against
Controls and correct configurations
Determining the feasibility of a particular set of Link 16 attacks
Lower-risk vulnerabilities exploited in a particular sequence
Assessing the magnitude of potential operational impacts of successful attacks
Testing the ability of Link 16 network defenders
Post security incident