Autoplay
Autocomplete
Previous Lesson
Complete and Continue
C-UAS Site Vulnerability Assessments
Drones: The Advancement of a Technological Threat
Advancement of Technology
Drone Advancements
C-UAS Development
Adversary Capabilities
Conclusion
The Threat to Infrastructure
Infrastructure
Border Security
Integration of an Infrastructure C-UAS Program
Module Activity #1
Conclusion
CUAS System Testing Matrix
Understanding C-UAS Needs
Factors for Detection Systems
Factors for Mitigation Systems
Common Factors for Consideration
Test & Evaluation Parameters
Module Activity #2
Conclusion
Evaluating Pilot Training Program
Doctrine
COTS/SUAS Pilot Development Program
Training Exercises
Conclusion
Exercise Development
The Framework of an Exercise
Assessment
Flight Scenarios & Profiles
REDTEAM & BLUEFOR
Equipment
Information Sharing and Lessons Learned
Data Collection & Information Sharing
Conclusion
Threat Modelling Framework (Pilot Perspective)
Operational Environment
Modelling the Threat Matrix
Hawg-View Examples
Exploitation
Running the Site Assessment
Conclusion
Conclusion
Final Thoughts
Challenges
Exploitation
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock