Advanced Comm Training (18-E | SV-TA-N-0437)

A comprehensive communications course which mirrors 18E training for individuals with little or no previous experience in the communications field. The design of this course is a modular concept of training. Each of which can be modified to meet the custom needs of any client. This course has many plug and play modules that can be adjusted or deleted to ensure the best training curriculum for the client’s needs. This course is taught by Special Operations Communicators with vast experience over the entire spectrum of modern communications efforts around the globe. The course length is derived from the building of individual modules to complete the overall course. Not only is there classroom learning in this course, but each module ends with a practical hands on field training exercise where applicable with realistic training scenarios that support the clients real world needs. The modules are developed to teach basic and advanced concepts for the communicator to use in support of his integration into overall tactical and strategic operations. Beginning with basic Antennae theory to “Knobology” for individual radios to trouble shooting of problems where the communicator is in an austere environment and has little to no support. The student will learn the radios that he will use in the field, not last generation technology, included is current  Cyber security and awareness along with tactical cyber operations techniques and concepts.

Communications Planning (Intra-team, inter-team, and communications with higher echelons)

Comprehensive overview of developing Frequency Allocation Plans to facilitate communications between all elements with an emphasis on hierarchy. Call sign assignment, net control, individual responsibilities for team members at all levels (Protective Detail, Convoy, etc). Emergency procedures for net/frequency compromise. Primary, Alternate, Contingency, Emergency (PACE) planning for communications.


Communications Security (COMSEC and OPSEC)

Introduction to encryption techniques. Cover terms and encoding transmissions. Ensuring all individuals on all nets are aware of sensitive subjects during transmissions.

Basic Radio Frequency Theory

Introduction to the Voice Spectrum. Topics will include Modulation, Radio Frequency propagation, transmission power, and Radio Frequency Bands.

Antenna Theory and Construction (includes Field Expedient Antenna construction)

Different types of antennas, reciprocity of transmission and receiving antennas, wave patterns of all types, polarity, and phase. Field Expedient Antenna construction will be a Practical   Exercise involving materials readily available as well as pre-planned antenna construction kits.

HF, VHF, UHF Radio Classes (Configurable depending on equipment available)

Classes can include military radios as well as commercial radios (ICOM, YAESU, MOTOROLA, etc). All classes regardless of radio type will include set up, tear down, configuration, maintenance, troubleshooting and repair.

Satellite Communications Theory

Discussion of Satellite Theory and specific antenna types required as well as Satellite phone networks.

Cellular Communications Theory

Theories of Global Systems for Mobile Communications (GSM), Code Division Multiple Access (CDMA), Universal Mobile Telecommunications System (UMTS), and Long Term Evolution (LTE).

Wireless Internet (Wi Fi-802.11) Theory

Basic Internet protocols, including TCP-IP. Frequency allocations typically used for wireless internet and antenna types used.

Basic Signals Intelligence Theory (within applicable clearance levels)

Introduction to basic intercept of signals. Basic analysis of radio traffic collected and rudimentary direction finding.

Tactical Cyber Operations

Utilizing cyber assets and capabilities, across the full spectrum of economic, military and social constructs inherent and related to the enemy and their objective, in order to infiltrate, disrupt and destroy their capacity.

Emphasis on coordination / synchronization of cyber command and control

Flexibility and agility are key to ensure operational capability across a wide spectrum of technologies and environments

Broad situational awareness across primary, secondary, and tertiary domains to effectively address the breadth of their cyber operations

Employ deception and distraction techniques to infiltrate systems and networks by exploiting operational and cultural attributes