HW401

HW401 Documentation Hub

Warfare in the Fifth Domain
Strategic cyber conflict, cognitive-domain operations, information superiority, and critical infrastructure security.

course hw401 focus fifth domain documentation live status expanding maintained yes paths lowercase

## Strategic Documentation for Cyber Conflict Education A structured course and reference hub for exploring cyber warfare, information operations, state and non-state campaigns, critical infrastructure disruption, and cognitive-domain conflict.

Overview

HW401 is a course documentation and teaching repository focused on the fifth domain of warfare: cyberspace as a strategic battlespace. The material connects technical cyber activity with operational outcomes, strategic signaling, influence operations, and decision advantage.

This hub acts as the primary entry point for:


Repository Design Principles

Naming convention: all documentation filenames, folders, and page links should use lowercase for consistency, portability, and cleaner GitHub paths.

This hub is designed to be:


Fast Access Navigation

Section Description Entry Point
course Learning structure, outcomes, and assessment open course docs
frameworks Conceptual models for fifth-domain conflict open frameworks
instructor Delivery guides, facilitation, demos, transcripts open instructor docs
student Study guidance, revision, and discussion support open student docs
references Glossary, reading list, and case-study register open references
case studies Applied cyber conflict examples and incident analysis open case studies
repository operations Contribution standards and repo maintenance open repo operations

Documentation Architecture

flowchart TD
    A[hw401 documentation hub] --> B[course]
    A --> C[frameworks]
    A --> D[instructor]
    A --> E[student]
    A --> F[references]
    A --> G[case studies]
    A --> H[repository operations]

    B --> B1[course overview]
    B --> B2[module outline]
    B --> B3[learning outcomes]
    B --> B4[assessment strategy]

    C --> C1[cognitive domain framework]
    C --> C2[dimensions of cyberspace]
    C --> C3[information dominance model]
    C --> C4[decision-loop disruption]
    C --> C5[influence propagation]

    D --> D1[instructor guide]
    D --> D2[facilitation playbook]
    D --> D3[live demo and browsing guide]
    D --> D4[slide transcript strategy]

    E --> E1[student guide]
    E --> E2[study guide]
    E --> E3[discussion prompts]

    F --> F1[glossary]
    F --> F2[reading list]
    F --> F3[case study register]

    G --> G1[stuxnet]
    G --> G2[notpetya]
    G --> G3[ukraine power grid]
    G --> G4[solarwinds]
    G --> G5[colonial pipeline]
    G --> G6[shamoon]
    G --> G7[blackenergy]
    G --> G8[industroyer]
    G --> G9[wannacry]
    G --> G10[moonlight maze]

    H --> H1[contributing]
    H --> H2[documentation style guide]
    H --> H3[roadmap]
    H --> H4[repository conventions]
    H --> H5[pull request template]

Mission Snapshot

HW401 examines how cyber operations create:

What this hub enables


Course

## Core Learning Structure
Foundation Purpose
course overview Introduces scope, positioning, and rationale for the course
module outline Breaks the course into teachable thematic units
Performance Purpose
learning outcomes Defines measurable learning expectations
assessment strategy Explains evaluation logic, evidence, and learner performance criteria

Recommended starting path: begin with course overview, continue to module outline, then use the frameworks section to support deeper conceptual teaching.


Frameworks

## Conceptual Models for the Fifth Domain

These pages provide the theoretical backbone of the course and help connect tactical cyber actions to higher-level military, political, and cognitive outcomes.

why these frameworks matter These frameworks help explain how: * technical compromise becomes operational leverage * information control influences human judgment * cyber disruption affects tempo, trust, and command quality * perception management alters strategic outcomes * digital actions extend beyond networks into cognition and behavior

Instructor

## Facilitation and Delivery Toolkit

Built for course facilitators, trainers, and documentation authors who need structured delivery support.

  1. Read the module outline
  2. Review the matching pages under frameworks
  3. Use the instructor guide to shape session flow
  4. Pull current examples from the live demo and browsing guide
  5. Standardize narration using the slide transcript strategy
instructor focus areas A strong instructor experience in HW401 should emphasize: * strategic framing, not just technical events * case comparison across espionage, disruption, influence, and sabotage * cognitive effects such as hesitation, misperception, panic, and trust erosion * the relationship between cyber operations and real-world organizational dependency * disciplined use of terminology across military, policy, and cybersecurity contexts

Student

## Study, Reflection, and Discussion Support

Built to reinforce understanding, enable revision, and support structured discussion.

  1. Start with the student guide
  2. Consolidate concepts using the study guide
  3. Deepen analysis through discussion prompts
  4. Cross-reference concepts with the glossary
  5. Apply theory using the case studies

References

## Terminology, Reading, and Evidence Support

Use these pages to anchor terminology, source material, and structured case-study discovery.

Reference use cases

Resource Best Use
glossary Standardize terminology across lessons and submissions
reading list Extend theory and support academic grounding
case study register Track incidents, patterns, and teaching relevance

Case Studies

## Applied Cyber Conflict Analysis

These case studies connect abstract concepts to real-world incidents across espionage, critical infrastructure disruption, destructive malware, ransomware, and supply-chain compromise.

Core Case Studies

Case Primary Focus Link
stuxnet cyber-physical sabotage open
notpetya systemic disruption and destructive propagation open
ukraine power grid infrastructure disruption and power operations open
solarwinds supply-chain compromise and stealth access open
colonial pipeline business interruption and operational dependency open

Expanded Case Studies

Case Primary Focus Link
shamoon destructive wiper operations open
blackenergy intrusion and grid-related operations open
industroyer ICS-targeted disruption open
wannacry ransomware at global scale open
moonlight maze long-term strategic espionage open
suggested teaching sequence A strong sequence for instructional progression is: 1. **moonlight maze** for early cyber espionage foundations 2. **stuxnet** for cyber-physical effect and covert sabotage 3. **ukraine power grid**, **blackenergy**, and **industroyer** for infrastructure disruption 4. **wannacry** and **notpetya** for scale, spread, and systemic consequence 5. **solarwinds** for supply-chain access and strategic stealth 6. **colonial pipeline** for operational dependency and business continuity 7. **shamoon** for destructive intent and organizational paralysis

Repository Operations

## Standards for Maintainers and Contributors

These pages support repo consistency, collaboration, and controlled documentation growth.

Repository rules at a glance

Rule Standard
filenames lowercase only
links lowercase relative paths
page style consistent heading hierarchy
structure predictable section ordering
case studies use common analysis template
pull requests include summary, rationale, and impact

Suggested Next Additions

To strengthen the hub and deepen the strategic framing of the course, the next recommended pages are:

These additions would improve the bridge between legal interpretation, deterrence theory, operational tempo, infrastructure context, and information influence.


Recommended Future Enhancements

Content Enhancements

Repo Experience Enhancements


Maintainer Notes

This page is intended to serve as a professional documentation landing page for the HW401 repository.

It uses:


Quick Start Paths

For instructors

Read:

  1. course overview
  2. module outline
  3. cognitive domain framework
  4. instructor guide

For students

Read:

  1. student guide
  2. study guide
  3. glossary
  4. one case study from case studies

For contributors

Read:

  1. contributing guide
  2. documentation style guide
  3. repository conventions

## HW401 · documentation hub · fifth domain studies **structured learning · strategic cyber conflict · applied case analysis**

```

I can also generate a premium GitHub README version with a clickable table of contents and a case-study matrix.