Warfare in the Fifth Domain
Strategic cyber conflict, cognitive-domain operations, information superiority, and critical infrastructure security.
HW401 is a course documentation and teaching repository focused on the fifth domain of warfare: cyberspace as a strategic battlespace. The material connects technical cyber activity with operational outcomes, strategic signaling, influence operations, and decision advantage.
This hub acts as the primary entry point for:
Naming convention: all documentation filenames, folders, and page links should use lowercase for consistency, portability, and cleaner GitHub paths.
| Section | Description | Entry Point |
|---|---|---|
| course | Learning structure, outcomes, and assessment | open course docs |
| frameworks | Conceptual models for fifth-domain conflict | open frameworks |
| instructor | Delivery guides, facilitation, demos, transcripts | open instructor docs |
| student | Study guidance, revision, and discussion support | open student docs |
| references | Glossary, reading list, and case-study register | open references |
| case studies | Applied cyber conflict examples and incident analysis | open case studies |
| repository operations | Contribution standards and repo maintenance | open repo operations |
flowchart TD
A[hw401 documentation hub] --> B[course]
A --> C[frameworks]
A --> D[instructor]
A --> E[student]
A --> F[references]
A --> G[case studies]
A --> H[repository operations]
B --> B1[course overview]
B --> B2[module outline]
B --> B3[learning outcomes]
B --> B4[assessment strategy]
C --> C1[cognitive domain framework]
C --> C2[dimensions of cyberspace]
C --> C3[information dominance model]
C --> C4[decision-loop disruption]
C --> C5[influence propagation]
D --> D1[instructor guide]
D --> D2[facilitation playbook]
D --> D3[live demo and browsing guide]
D --> D4[slide transcript strategy]
E --> E1[student guide]
E --> E2[study guide]
E --> E3[discussion prompts]
F --> F1[glossary]
F --> F2[reading list]
F --> F3[case study register]
G --> G1[stuxnet]
G --> G2[notpetya]
G --> G3[ukraine power grid]
G --> G4[solarwinds]
G --> G5[colonial pipeline]
G --> G6[shamoon]
G --> G7[blackenergy]
G --> G8[industroyer]
G --> G9[wannacry]
G --> G10[moonlight maze]
H --> H1[contributing]
H --> H2[documentation style guide]
H --> H3[roadmap]
H --> H4[repository conventions]
H --> H5[pull request template]
HW401 examines how cyber operations create:
| Foundation | Purpose |
|---|---|
| course overview | Introduces scope, positioning, and rationale for the course |
| module outline | Breaks the course into teachable thematic units |
| Performance | Purpose |
|---|---|
| learning outcomes | Defines measurable learning expectations |
| assessment strategy | Explains evaluation logic, evidence, and learner performance criteria |
Recommended starting path: begin with course overview, continue to module outline, then use the frameworks section to support deeper conceptual teaching.
These pages provide the theoretical backbone of the course and help connect tactical cyber actions to higher-level military, political, and cognitive outcomes.
Built for course facilitators, trainers, and documentation authors who need structured delivery support.
Built to reinforce understanding, enable revision, and support structured discussion.
Use these pages to anchor terminology, source material, and structured case-study discovery.
| Resource | Best Use |
|---|---|
| glossary | Standardize terminology across lessons and submissions |
| reading list | Extend theory and support academic grounding |
| case study register | Track incidents, patterns, and teaching relevance |
These case studies connect abstract concepts to real-world incidents across espionage, critical infrastructure disruption, destructive malware, ransomware, and supply-chain compromise.
| Case | Primary Focus | Link |
|---|---|---|
| stuxnet | cyber-physical sabotage | open |
| notpetya | systemic disruption and destructive propagation | open |
| ukraine power grid | infrastructure disruption and power operations | open |
| solarwinds | supply-chain compromise and stealth access | open |
| colonial pipeline | business interruption and operational dependency | open |
| Case | Primary Focus | Link |
|---|---|---|
| shamoon | destructive wiper operations | open |
| blackenergy | intrusion and grid-related operations | open |
| industroyer | ICS-targeted disruption | open |
| wannacry | ransomware at global scale | open |
| moonlight maze | long-term strategic espionage | open |
These pages support repo consistency, collaboration, and controlled documentation growth.
| Rule | Standard |
|---|---|
| filenames | lowercase only |
| links | lowercase relative paths |
| page style | consistent heading hierarchy |
| structure | predictable section ordering |
| case studies | use common analysis template |
| pull requests | include summary, rationale, and impact |
To strengthen the hub and deepen the strategic framing of the course, the next recommended pages are:
These additions would improve the bridge between legal interpretation, deterrence theory, operational tempo, infrastructure context, and information influence.
standardize all case studies with:
add a docs-only GitHub Actions workflow for:
add badges for:
This page is intended to serve as a professional documentation landing page for the HW401 repository.
It uses:
Read:
Read:
Read:
```
I can also generate a premium GitHub README version with a clickable table of contents and a case-study matrix.