The purpose of this paper is to provide an overview of the cyber exercise process from inception to after action report. This paper will introduce the terminology and life cycle of a cyber exercise. The content focuses on the entire planning and execution process, including details about different types of exercises and the resources required to plan and execute an exercise. After reading this document and reviewing the references, the reader should understand the purpose, objectives, planning, and execution process for cyber exercises.

Cyber Warfare Exercise Overview
Download Resources
PDF Accessibility
One or more of the PDF files on this page fall under E202.2 Legacy Exceptions and may not be completely accessible. You may request an accessible version of a PDF using the form on the Contact Us page.