Due to the nature of the subject matter in this course, a UK or 5EYES enhanced security clearance will be required. 

This module can only be taken as a Short Course for Credit with a pre-requisite of successful completion of Foundations of Cyber in order to take this module.

For more information please go to the 'Upgrade to a professional qualification' section.

Cyberwarfare in Intelligence and Military Operations will equip the student with a critical understanding of the opportunities and vulnerabilities faced when planning to deploy cyber capabilities, as part of an integrated operation to enhance the overall impact achieved through military action, or in planning a full spectrum response against a deliberate cyber intrusion which was intended to cause damage, disruption or destruction against our systems.

At a glance

  • Dates
    • Please enquire for course dates
  • Duration5 days face to face learning (with additional distance learning to be completed during 7 weeks)
  • Cost£1,490
    Concessions available

Course structure

The course will be delivered using both compulsory residential and online activities.

What you will learn


  • Assess the main elements and key management issues in the planning and conduct of cyberspace operations as part of a full spectrum approach,
  • Assess theories of decision-making and sense-making in terms of their utility in effects planning and cyber operations,
  • Assess the implications of the changing operational environment for those conducting full spectrum operations in the information age,,
  • Assess the applicability of existing academic theories, national strategies and doctrine on cyber operations,,
  • Assess how existing military and intelligence planning considerations apply in cyberspace.,



  • Estimate key factors and associated planning assumptions to support a military commander’s operational estimate,
  • Critically evaluate differing international perspectives on cyber policy, strategy and doctrine,
  • Assess the effectiveness of cyber capabilities,
  • Appraise the legal and ethical considerations in the context of conducting cyber operations either as part of a military operation or outside of conflict,
  • Evaluate and recommend appropriate courses of action to a primary stakeholder for cyberspace operations.

Core content

Current doctrine, policy and strategies - assessment

Doctrines to be considered could include that of:

  • The UK and their allies,
  • National cyber security strategies,
  • Other national concepts of operation for cyber,
  • Associated organisation of cyber capabilities.

Constructs, concepts, cases of – critical review

Concepts to be considered could include:

  • Cyber domain and the information environment,

  • Cyber power,

  • Cyberwar,

  • Computer network operations (CNO),

  • Electronic warfare,

  • Cyber electromagnetic activities (CEMA),

  • Information warfare and operations,

  • Cyber influence,

  • Command and control warfare,

  • Media operations and public affairs,

  • Cyber intelligence,

  • Integrated planning,

  • Defence in depth,

  • Commander’s responsibilities.

Existing academic theories and their applicability in Cyberspace – assessment

Example theories could include:

  • Asymmetric and contested warfare and threat actor motivations,

  • Attribution,

  • Collective security,

  • Defence,

  • Deterrence,

  • Deception (military deception, cyber deception, camouflage, concealment and denial),

  • Espionage,

  • Sabotage and subversion,

  • Intelligence and information requirements,

  • The security dilemma,

  • Sense-making and decision-making,

  • Sovereignty.

Military Planning Considerations and their applicability in Cyberspace – assessment

This could cover topics such as:

  • Full spectrum operations,

  • Hybrid warfare,

  • Fusion warfare,
    effects (cognitive effects and behaviour change, deny, degrade, disrupt, destroy, deter, etc),

  • The applicability of concepts in cyberspace such as attack,

  • Defend and exploit,

  • Manoeuvre and lethality,

  • Legality (ius ad bellum, ius in bello),

  • Ethics,

  • Proportionality and collateral damage,

  • Target systems analysis,

  • Target audience analysis,

  • Targeting and intelligence.

Upgrade to a professional qualification

After successful completion of this Short Course for Credit, 10 credit points can be put towards the Cyberspace Operations MSc.

 Find out more about short course credit points.

Who should attend

Students must have successfully completed Foundations of Cyber in order to take this as a Short Course for Credit


Robert Black  


A limited number of MOD sponsored places are available.

How to apply

Please complete the online application form.

Read our Professional development (CPD) booking conditions.