Price: $3,999.00

Length: 4 Days
Print Friendly, PDF & Email

Link 16 Cybersecurity Crash Course

Link 16 Cybersecurity Crash Course covers Link 16 TDL operational security and cybersecurity requirements for managing and exchanging Link 16 data. Learn about security of Link 16 and datalink implementations needs to interoperate STANAG 5602 Standard Interface for Multiple Platform Link Evaluation (SIMPLE) Link 16 standard (Reference 8) protocol. Learn how to analyze security and cybersecurity at node and message level model for various JTIDS J-messages messaging.

Our Link 16 cybersecurity program will  teach you:

  • Link 16 Security Features and Policies
  • How to administer, manage, and troubleshoot hardware, software, or services for single, mixed and multi-user Link-16 environments
  • Use cybersecurity measures for Link 16 operations.
  • Link 16 Joint key management Policies and Plans
  • Procedures for production, distribution, and use of Link 16 COMSEC keying material (KEYMAT) for legacy and crypto modernized Link 16 systems
  • Joint Multi-Tactical Data Link (TDL) Operating Procedures
  • National Security Agency (NSA) security doctrine associated with Link 16 devices
  • Link 16 Vulnerabilities and Mitigation

At TONEX, your Link-16 Security and Cybersecurity training class experience is reinforced with hands-on instruction and practices. Plan and architect Operational Link-16 networks, and design and implement Link 15 network security plans to keep hackers at bay and networks secure including:

  • Maintain Link 16 network hardware and software
  • Evaluate Link 16  problems and monitor network to ensure its availability to operation and users
  • Identify Link-16 and TDL needs and use that information to design, interpret, and assess Link 16 network requirements
  • Plan, coordinate, and implement Link 16 network security measures
  • Tools and Techniques to monitor Link 16 networks for security breaches

Further develop knowledge in the following Link-16 areas:

  • Link-16 Ethical and Professional Practices
  • Link-16 Logic and Decision Processes; Troubleshooting; Problem Resolution
  • Link-16 Risk Management
  • Protection of Sensitive Link-16 Information by Preventing, Detecting, and Responding to Cybersecurity Attacks

Topics Covered:

Introduction of Link 16

  • General Link-16 Information
  • Link 16 architecture
  • Link 16 Terminals, Users, and Associated Platforms
  • Joint Tactical Information Distribution System(JTIDS) (AN/URC-107 Series)
  • Multifunctional Information Distribution System (MIDS) Low-Volume Terminal (LVT) (AN/USQ-140 Series) sets
  • MIDS Joint Tactical Radio System (JTRS) sets

Introduction to Link-16 Network and Information Security

  • Cryptographic Variable Logic Label (CVLL)
  • Link 16 Security Architecture
  • CVLL by the Joint Interface Control Officer (JICO)
  • Role of Operational Tasking Data Link (OPTASK LINK) Message
  • Basic Link-16 Security
  • Encryption including TRANSEC and Message Encryption (MSEC)
  • Partitioned Variable Mode (PVM) NPG
  • One variable for CVM NPG
  • Link 16 and functional mission areas
  • Joint theater air and missile defense
  • Attack operations
  • Counter-air
  • Interdiction
  • Suppression of enemy air defenses
  • Close air support
  • Time-critical targeting prosecution
  • Secure Data Unit
  • COMSEC Requirements
  • Link 16 Networks Protection
  • COMSEC Equipment and KEYMAT
  • Procedure to Load an Unencrypted ECU KEK into Link 16 Equipment
  • Procedure to Load Either an Encrypted ECU KEK or a TEK
  • Operational Link 16 Key Allocation

Link-16 Security Management

  • Link-16 Security Classification
  • J-Series Messages
  • Link-16 Crypto
  • Transition to Modernized Crypto
  • System Description
  • Key Loading Devices
  • Key Distribution for Link 16

Link-16 Key Management Infrastructure 

  • Electronic Key Management System
  • Key Ordering Parameters for KMI and EKMS
  • Joint Key Management Plan Procedures
  • Key Management Responsibilities
  • Key Generation
  • Key Distribution
  • Key Storage
  • Key Loading
  • Crypto Periods
  • Compromise Procedures
  • Operational Tasking Data Link
  • Transition to Modernized Crypto
  • CJCSI 651002D directs DoD to perform Link 16 Crypto
  • Modernization for all DoD users and must also be extended to Allied and compatibility with legacy Link 16 equipment

Link-16  Penetration Test

  • Link 16 Digital Forensics
  • Link 16 Information Assurance and Security
  • Link 16 Network Defense
  • What is a Link-16 Penetration Test?
  • Vulnerability Scan
  • Link 16 Security Assessment
  • Effectiveness of Link 16 security controls against
  • Compliance audits
  • Controls and correct configurations
  • Determining the feasibility of a particular set of Link 16 attacks
  • Higher-risk vulnerabilities
  • Lower-risk vulnerabilities exploited in a particular sequence
  • Assessing the magnitude of potential operational impacts of successful attacks
  • Testing the ability of Link 16 network defenders
  • Post security incident

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.