GT-100-NATO
Shock & Awe: Cybersecurity Awareness for NATO Members – Level 1
Description
Buckle up for an intensive cybersecurity awareness training experience designed specifically for the NATO community! Experience live demos and workshops revealing how attackers exploit vulnerabilities and showcasing a Hacker’s Toolkit: including evil plugin devices, hacking with AI, phishing scams, ransomware, Wi-Fi poisoning, Evil Twins, and poison phone charger cables. Investigate how hackers exploit social engineering, social media, and AI to infiltrate protected systems at record speed. With a focus on awareness, we’ll provide actionable insights tailored to the unique demands of NATO roles. NDA must be signed before course starts.
Prerequisite
NATO Member or Affiliate, War Fighter, First Responders. Private offerings only.
Objectives
By the end of this course, participants will be able to:
- Promote a culture of security within your team and organization.
- Identify basic Hacker Toolkit, AI, and intelligence gathering devices
- Understand the critical role of cybersecurity in protecting NATO operations.
- Recognize the increasing threat landscape targeting NATO members.
- Understand the impact of a data breach on operations and public trust.
- Learn how to identify and mitigate social engineering and cyberattack tactics.
- Secure all devices used in field operations.
- Understand basic bug sweep techniques.
Key Takeaways
- Electronic Signature Reduction best practices
- How to help become anonymous online
- How to identify social engineering threats
- Understanding of techniques used to compromise NATO
- Understand the importance of encryption, access controls, and MFA
- NATO Cybersecurity Best Practices
Certificate of Completion
- Certificate of Completion issued after successful completion of all chapters, hands-on exercises, and course evaluation.
- Certificate is downloadable from the Ghost Team Academy Education Portal.
Training Outline
Module 1: Welcome
- Topics:
- Introductions and Expectations
- Pre-Course Exam (30 Minutes on Laptop or Phone)
- Course Overview
Module 2: Cyber Threat Landscape
- Topics:
- High-Value Targets
- Most Common Cyber Threats
- Who and What Is The Enemy?
- Special International Airports
- The Hacker Toolkit
- Your Office
- Family
- Electronic Bugs (Continued in Module 8)
- Labs/Exercises: Surprise Student Workshop and Instructor Demos
Module 3: OSINT – Open-Source Intelligence and AI
- Topics:
- OSINT Basics
- Private and Public AI
- Special websites for recon
- Top Browsers and Search Engines
- Anonymous
- Top 10 NATO OSINT
- Other Places to Search…
- Labs/Exercises: Surprise Instructor Demos and Custom Hands-On Experience
Module 4: Encryption, VPNs, & Cloud
- Topics:
- Encryption Fundamentals
- VPNs
- Cloud
- Labs/Exercises: Device Hardening Workshop
Module 5: Authentication, Passwords & Access Control
- Topics:
- Authentication Basics
- Multi-Factor Authentication (MFA)
- Password Management
- Digital Certificates and Signatures
- Access Control
- ID cards
- Hacking Them All!
- Best Practices
- Labs/Exercises: Surprise Shock & Awe Workshop
Module 6: Social Engineering
- Topics:
- Social Engineering: The Art of Lying in different forms
- Social Media
- It’s Your Phone!
- Fake Cell Towers
- Insider Threat Detection and Prevention
- Body Language and Communication
- Labs/Exercises: Surprise Instructor Demo and NATO Breach Case Study
Module 7: Device & Network Hardening
- Topics:
- Securing Devices
- Clean Desk Policies
- Physical Access Controls
- Remote and Hybrid Workforces
- Secure Use of Mobile Devices
- Public Networks
- Your Home Camera System and Alarm
Module 8: Bug Sweeps
- Topics:
- Bug Sweep Basics
- Equipment
- The Office, Home, and Hotels
- Car
- Plane
Module 9: Incident Response & Compliance
- Topics:
- What To Do in Case of a Breach or Suspected Attack
- Reporting Channel
- Working with IT, Legal, and Compliance Teams
- Regulatory Breach Notification Requirements
- Incident Report Template
Module 10: Conclusion
- Topics:
- Course Summary
- Key Takeaways
- Post-Course Exam (30 Minutes on Laptop or Phone)
- Review and Q&A



















