ü From 28–31 October 2024 (4 Days, 20 Hours Total, Class Dates: October 28, 29, 30, 31)
ü 12–5 p.m. Eastern Time (9 a.m. – 2 p.m. Pacific Time)
ü All students will receive an AIAA Certificate of Completion at the end of the course
OVERVIEWThis exciting, fast-paced 4-day course examines the practical issues of developing and sustaining a secure cyber environment through all phases of the space mission lifecycle. The course is organized around the SPAce Domain Cybersecurity (SpaDoCs) Framework. The SpaDoCs Framework provides a comprehensive and systematic model for understanding and tackling all critical issues of cybersecurity in the space domain. An examination of the Key objectives—confidentiality, integrity, availability—provides the foundation for the course. From there, the space domain is examined layer by layer starting from the enterprise layer, then drilling down through mission, system and DevSecOps layers. Threats and vulnerabilities at each layer are highlighted. Finally, first principles of cybersecurity are discussed (domain separation, process isolation, etc.) as well as key enablers (vision, strategy, etc.) to help frame plans for action to address the cybersecurity issues exposed by this course. Course exercises center around practical application of the material to real-world space mission scenarios.
LEARNING OBJECTIVES
At the end of this course you should be able to:
- Space Domain Cybersecurity Fundamentals
- Describe the big picture challenges of cybersecurity in the space domain as organized in the SPAce Domain Cybersecurity (SpaDoCs) Framework
- List and define key objectives of cybersecurity (CIA Triad), the first principles of secure systems, along with cybersecurity enablers
- Identify cyber threats to and vulnerabilities of space missions and systems
- Characterize the various layers of the space domain and the elements that comprise them
- Cybersecurity Principles
- Apply cybersecurity first principles to specific space domain threats and vulnerabilities
- Associate specific cybersecurity enablers with various space domain threat or vulnerability scenarios
- Cybersecurity Threats and Vulnerabilities
- Analyze threats and vulnerabilities and their attack vectors for various space domain scenarios at each layer
- Cybersecurity Assessment Plans
- Formulate inputs and issues to a cybersecurity assessment plan for a given space domain scenario
- Non-Member Price: $1995 USD
Testimonials:
"The best part of the course was...the deep dive into each of the layers of the space domain and how they relate to cybersecurity."
"I think the instructors are engaging and very easy to listen to."
"[The instructor] answered my detailed questions on cyber quite well."
- Course Intro
- Course Objectives
- Framework Overview
- Cybersecurity Fundamentals
- Space Domain Layers
- Enterprise Layer
- Mission Layer
- System Layer
- DevOps Layer
- Threats and Vulnerabilities
- First Principles of cybersecurity applied in the space domain
- Enablers of security and mission success in space enterprises
INSTRUCTORS
Dr. Bruce Chesley is an experienced space program manager and industry executive. He served as the Chief Strategist for a space system portfolio spanning human spaceflight, commercial satellites, and government space systems and he led the early development of a global broadband satellite constellation. He has also delivered advanced space systems and prototypes while serving in a variety of roles in program management, business development and engineering. His Air Force assignments included Air Force Space Command, the National Reconnaissance Office, and the USAF Academy where he was an Assistant Professor of Astronautics. He was elected to the International Academy of Astronautics in 2020 and serves as a Vice President on the Bureau of the International Astronautical Federation. He has published more than 20 technical papers and book chapters on satellite design and space systems engineering. He is also an adjunct professor at Stevens Institute of Technology.
Terri Johnson is the Department Chair of the Computer Networking and Cybersecurity Department at Pikes Peak Community College. She has an MS in Cybersecurity and Information Assurance as well as over 20 years of experience in Information Technology, specializing in building and securing computer networks. Terri started out working for two of the world’s largest tax and audit firms, after which she transitioned to serving several educational institutions as both IT faculty and IT staff support. Terri is the lead faculty of the NSA-DHS designated Center of Academic Excellence program at PPCC; a member of WiCyS and the Colorado Springs chapter of ISSA (Information Systems Security Association), PPCC Cyber Club Advisor, and Coach to PPCC’s nationally recognized Cyber Competition Team. Her industry certifications include Cisco’s CCNA Routing / Switching and CCNA Security and EC-Council’s CEH (Certified Ethical Hacker). Terri is currently working on her DBA in Cybersecurity Management at University of Colorado, Colorado Springs.
The course lectures will be delivered via a Zoom virtual classroom. Classes will not be recorded. You can test your connection here: https://zoom.us/test Connection information will be provided to registrants near to the course start date. - Each registrant will receive a complete set of course notes with copies of all slides used in the presentations.
- Between classes, the instructor will be available via email for technical questions and comments.
Classroom Hours: 20 classroom hours / 2.0 CEU/PDH
Cancellation Policy: A refund less a $50.00 cancellation fee will be assessed for all cancellations made in writing prior to 7 days before the start of the event. After that time, no refunds will be provided.
Contact: Please contact Lisa Le or Customer Service if you have questions about the course or group discounts (for 5+ participants).