2-Cyber Policy, Doctrine and Tactics, Techniques and Procedures (TTPs)
3-A Taxonomy of Cyber Threats
4-Cyber Influence Operations
5-Cyber ISR and Analysis
6-Cyber Security and Defense for Analysis and Targeting
7-Cyber Offense and Targeting
8-Cyber Systems Design
9-Measures of Cyber Performance and Effectiveness
10-Cyber Modeling and Simulation for Analysis and Targeting
11-Cyber Case Studies
12-Cyberspace Analysis and Targeting Conclusion