Price: $4,999.00

Length: 4 Days
Print Friendly, PDF & Email

Cybersecurity and Satellite Systems Training

The rapidly expanding number of satellites transmitting GPS locations, cellphone signals and other sensitive information is creating new opportunities for hackers.

Truth is, cybersecurity isn’t just a terrestrial concern – it’s also become a hot button in space.

That’s because the U.S. and other countries have become increasingly reliant on orbiting satellites for communications and military defense strategies. It’s this dependency on satellites that has cybersecurity experts worried.

The big problem is that satellites can be vulnerable to a number of different types of attacks that can be more difficult to interpret than physical damage. Cybercriminals can, for example, corrupt signals that are going from the ground to the satellite or back.

But it’s not just the signals being exchanged between orbiting satellites and Earth-based stations that are vulnerable. Satellite antennas themselves are prone to cyberattacks according to cybersecurity professionals.

A report claims that  a number of popular satellite communication systems are vulnerable to the cyberattacks, which could also leak information and hack connected devices, leading the head researcher of this report to call the consequences of these vulnerabilities “shocking.”

Nearly 5,000 satellites are currently in orbit around the Earth. The U.S. relies on many of them for everything from communications and emergency warnings to GPS coordinates and defense information.

Damage inflicted in the satellite sector could have a ripple effect, leading to heavy financial losses and/or comprised data in other areas. Satellites are part of the extended cyber ecosystem for most organizations, but organizations rarely have direct control over satellite cybersecurity.

Cybersecurity and Satellite Systems Training Course by Tonex

The 4-day Cybersecurity Satellite Systems course provides an understanding of unique vulnerabilities in SATCOM systems that are commonly exploited. Discover techniques and strategies for integrating cybersecurity measures into SATCOM systems, networks, products and critical missions from the start.

Cyberattacks are increasing at an exponential rate, and SATCOM systems and satellite communications are becoming a prime target. Cybersecurity and Satellite Systems Training addresses all the key areas of satellite systems, including the management of the space and ground segments, Tracking, Telemetry and Command (TT&C) functions, uplink and downlink transmissions and network performance.

Cybersecurity and Satellite Systems Course is a knowledge-level course designed to provide a knowledge base of Cybersecurity applied to SATCOM. Lessons and exercises taught by subject matter experts will expand the student’s understanding of the space and radio frequency environments, capabilities and limitations of military and commercial SATCOM systems, threats to all segments of SATCOM, planning processes, cybersecurity attacks and mitigation techniques.

This course will also provide continued education/training for space professionals to obtain foundation knowledge and develop an understanding of basic skills in the application of SATCOM concepts to cybersecurity operations.

Through activities and strategies learn to think like a hacker to gain the skills necessary to create more secure SATCOM systems. You will also learn the best practices to integrate into SATCOM system and network planning, design, implementation and operations processes and raise the level of SATCOM security.

Learning Objectives

Upon completion of this course, the participants will learn how to:

  • Examine SATCOM networks, architecture, network attacks, and their impact on devices
  • Develop a foundation knowledge of SATCOM cybersecurity threats and strategies for mitigating risk
  • View the SATCOM system from the perspective of the “hacker”
  • Identify exploitation and exploring how tools are used to gain entry into SATCOM systems and their secure environments.
  • Develop skills for analyzing and addressing vulnerabilities in SATCOM systems and products with embedded systems and software
  • Analyze SATCOM system embedded hardware and firmware to detect vulnerabilities and opportunities for improving security
  • Mitigate threats by implementing effective and proven countermeasures
  • Reduce risk to acceptable levels to ensure successful SATCOM operations
  • Optimize resources by prioritizing countermeasures against threats
  • Address audit and governance compliance requirements effectively
  • Analyze best practices with regard to securing space assets and increase visibility into potential threats to improve SATCOM networks and systems cybersecurity posture
  • Identify, analyze and apply best practices, skills, and techniques for integrating security into the SATCOM design process from the start
  • Evaluate SATCOM system threat modeling across the ecosystem

Topics Covered

  • SATCOM systems, networks and embedded SATCOM applications/systems
  • SATCOM software, hardware and firmware analysis
  • Integrating security into the SATCOM planning ConOps, analysis, design, verification and validation process
  • Foundations of SATCOM system cyber security and emerging threats
  • Foundations of space system attack surface
  • Attack types against SATCOM and wireless communications protocols, buses, terminals, embedded operating systems, applications
  • Mitigation approaches and techniques
  • Hacking/exploitation techniques, tools, and entry points
  • Encryption and authentication defensive technologies

Course Topics

Introduction to SATCOM Networks and Systems

  • SATCOM 101
  • Satellite Communications Overview
  • Satellite Orbits and Payloads
  • Satellite Constellations
  • Spectrum and Bands
  • Channels and Carriers
  • Channelization
  • Satellite Access Techniques
  • Satellite Coverage
  • Principles of Spot Beams
  • Coverage and Communication Analysis
  • Common Types of Satellites
  • Geostationary Earth Orbit (GEO) systems
  • Low Earth Orbit (LEO) systems
  • Medium Earth Orbit (MEO) systems
  • Highly Elliptical Orbit (HEO) systems
  • Satellite Services
  • Broadcasting, Mobile and Fixed Satellite Service
  • Satellite communications systems engineering principals
  • Digital Direct-to-Home (DTH) TV
  • VSAT Services
  • 2-way Interactive Services
  • Mobile Communications Technologies
  • Service and Performance Requirements

SATCOM Network and System Architecture

  • SATCOM Architectural Components
  • Spacecraft, Repeater, Transponders and Antennas
  • Spacecraft Mission and Bus Subsystems
  • Earth Stations and Network Technology
  • Tracking, Telemetry and Command (TT&C)
  • Uplink and Downlink Transmissions
  • Launch Vehicles and Services
  • Satellite Operations and Organization
  • Space Segment
  • Control Segment
  • User Segment
  • Architectures Defined by Function
  • SATCOM System Functions
  • Tracking Telemetry & Command (TT&C)
  • Data Collection
  • Data Relay
  • Satellite Design
  • Onboard Processing
  • Platforms for Terminal (Chips, OS, MMI, etc)
  • Transmission (coding, modulations, etc)
  • Types of earth stations
  • Design considerations
  • Earth station hardware
  • User Terminals
  • General UT design – different subsystems and components
  • Types of antennas and design
  • Capabilities and limitations
  • Product development process
  • Autonomous Satellite Control
  • Spacecraft Operations
  • Spacecraft Navigation
  • Network Management
  • Network Operations Center (NOC)

Satellite Communications Technology Principles

  • Satellite communication systems
  • Satellite constellations
  • Spot beams
  • Radio Link
  • Spectrum issues
  • Propagation characteristics
  • Analog and digital Modulation
  • Digital modulation and Coding
  • Satellite RF Link
  • Multiple access principles
  • Earth Stations
  • Antennas
  • Satellite system performance
  • System tradeoffs
  • Transponder System Design and Architecture
  • System tradeoffs
  • Communications Payload Performance Management
  • Earth station and other equipment
  • Multiple Access Techniques
  • Access methods
  • SCPC, TDMA, TDM, DAMA, CDMA, OFDM, DVB
  • Single channel per carrier (SCPC)
  • Propagation Interference and Regulation
  • Payload Engineering
  • Spacecraft Engineering and Operations
  • Earth Station Engineering
  • Modems
  • Footprints
  • Link budget
  • Link margin
  • Payload
  • Gateway
  • NOC
  • SOC
  • Horizontal and geographic satellite coordinates and look angles
  • Trajectories

Satellite Technology Engineering Across the SDLC

  • The Path from Concepts, Development to Decommissioning
  • IT systems to collect, generate, store, process, transmit and receive information
  • End-to-end encryption
  • Techniques and Architectures
  • Protection of all transmitted data over any communications link
  • Secure Networking for Satellites in multiple orbits with multiple communications links and multiple remote users
  • Autonomous detection and response to malicious cyber events
  • Ground (or Earth) stations, which provide radio interfaces with spacecraft
  • Mission control (or operations) centers, from which spacecraft are managed
  • Ground networks, which connect the other ground elements to one another
  • Remote terminals, used by support personnel
  • Spacecraft integration and test facilities
  • Launch facilities

Introduction To SATCOM Networks and System Cybersecurity

  • SATCOM Systems Attacks
  • Uniquely Network Concerns
  • Reliability and Security
  • Role of Obscurity
  • Threat Assessment
  • Attackers and Assets
  • Attack Surface
  • Attack Trees
  • Security Policy
  • SATCOM System Vulnerabilities
  • Backdoors
  • Denial of Service (DOS)
  • Defensive Architectures
  • Combating Complexity
  • Defensive Hardware Interfaces
  • Public Key Cryptography (PKI)
  • Protecting Data In Motion
  • Secure Software Process

SATCOM System Vulnerability Analysis

  • SATCOM System and Network Attacks
  • Exploiting SATCOM Systems and Devices
  • The Stages of System Exploitation
  • Initial Reconnaissance
  • Exploitation
  • Firmware Unpacking and Modification
  • Detecting
  • Extracting
  • Analysis
  • Modification and Creation of new firmware
  • Hacking/exploitation techniques, tools and entry points
  • Defensive technologies

Cybersecurity Attacks and Best Mitigation Practices for SATCOM Systems

  • Non-Invasive Hardware Reverse Engineering
  • Component identification
  • Interface Analysis
  • Communications Protocols Sniffing
  • Decoding and Deciphering Captured Bits
  • Critical Data Identification and Detection
  • Component Removal and Replacement
  • Electronics and Circuit analysis
  • Security Measures

Case Study and Workshop

  • Cybersecurity Analysis of SATCOM Systems
  • Design Process
  • System CONOPS
  • Mission objectives
  • Test and Evaluation
  • Threat Analysis
  • System Design and Security Requirements
  • System Implementation Security
  • Attack surface
  • Physical Attack Surface
  • SATCOM software, hardware and firmware analysis
  • Attack types against SATCOM and wireless communications protocols, buses, terminals, embedded operating systems, applications
  • Automated Threat Modeling
  • Threat Modeling
  • Threat Modeling Methodologies
  • Threat Modeling Software
  • Threat Modeling Tools
  • Mitigation approaches and techniques
  • Hacking/exploitation techniques, tools, and entry points
  • Trust hardware and software components
  • Risk Assessment
  • Control Plan
  • Mitigation

Tonex SATCOM Cybersecurity Assessment

  • Evaluate your SACTOM system security vulnerabilities
  • Assessing cyber-related information and control systems to relevant regulations, standards and guidance
  • Gap analysis to unveil security holes
  • real-time situational awareness
  • Insider and external threat protection
  • System hardening and active defenses for comprehensive protection of SATCOM system satellite environment
  • SATCOM cybersecurity patching

 

Cybersecurity and Satellite Systems Training

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.