HomeCyber CollegeCyber Power Portal

America is faced with a national emergency in cyberspace. Threat actors utilize weaknesses in information systems upon which modern societies rely on for economic prosperity and military superiority as tools. As we move from an Industrial Age world to a Digital Age world, educating all Airmen on understanding the operational and strategic implications how cyberspace impacts military mission and national security is critical.

Creating a culture of cybersecurity and mission assurance poses a great challenge for the AF, DOD and the nation. This guide is an effort to inform the AF as a whole on the broader implications of cyberspace and electronic warfare within the AF core missions. Currently, there exists a gap in understanding the fundamentals of cyberspace as it relates to military missions and broader strategic goals contributes to difficulties in understanding tactical and operational-level impacts to AF core functions, and results in a reduced capacity for effective strategic thinking and planning in cyberspace. This guide offers a consolidated resource to educate Airmen to deal with cyberspace issues during the operational and strategic planning and decision-making process.

This guide is an unclassified resource on concepts and principles of cyberspace operations that reflects a snapshot of expertise from thinkers and experts who are on the leading edge of shape the nation's thinking about cyberpower.

Twitter

Facebook Twitter
We are proud to be playing a role in the education of this new initiative through our #FMAC class. Looking forward… https://t.co/NFVpcXmNK6
RT @MSFRIC: The Air University Library has resumed normal hours starting today, 2 Jan 2018. Find more information about our hours online at…
RT @DarkReading: Toxic Data: How 'Deepfakes' Threaten Cybersecurity https://t.co/Qcumfv0gqR by @dikaheto #deepfakes
RT @AETCommand: Major change to the @usairforce Officer Training School is changing the paradigm for building officers, pivoting away from…
RT @RidT: This is big: at-scale, real-time, fully automated phishing attacks against SMS two-factor authenticated email accounts are finall…
We will be supporting the @505th_CCW as they prepare to execute a training course in support of the Air Force’s new… https://t.co/xiHyYGF4xN
The Air Force is reorganizing its primary IT shop https://t.co/cPceGcsVxL
RT @AF_Cyber: If you're a cyber, IT or HR professional, you can be part of @AFCyberWorx's upcoming Talent Management Design Sprint to help…
RT @AFCYBERCOLLEGE: Come Work With Us! We are hiring multiple faculty instructor and researcher positions. More info to be posted later. Yo…
RT @CyberStatecraft: Compete in our one of a kind #cyber policy competition! Registration is now open for the 7th annual #Cyber912 Strategy…
Reality #1: Bad guys already have access to personal data points... Reality #2: Any data point you share with a co… https://t.co/0kbGmICbvJ
Come Work With Us! We are hiring multiple faculty instructor and researcher positions. More info to be posted later… https://t.co/V8R1CgLipr
RT @usairforce: We join the nation and the Bush family in mourning the loss of our 41st #POTUS, George H.W. Bush. Godspeed, Mr. President.…
We are always glad to have you. https://t.co/wsIUW8CTjM
RT @NautilusMag: Depending on the speaker, lectures can be a joy, but, the efficacy of the lecture, as a teaching method, is in doubt. http…
RT @Joseph_Marks_: GSA plans to formalize its rule requiring contractors to report cyber incidents that affect confidentiality, integrity o…

Email List

* indicates required