Skip to Main Content

Combatant Commands Research Guide

Unified Geographic and Functional Combatant Commands of the United States Department of Defense

CYBERCOM Overview & Strategy

US Cyber Command: CYBERCOM headquartered at Fort Meade, Maryland, is one of four functional combatant commands. It leads the Department of Defense’s efforts in cyberspace by defending the DoD Information Network (DoDIN), conducting cyber operations, and supporting broader national cybersecurity initiatives.

Mission and Vision - Outlines CYBERCOM’s strategic priorities and operational goals.

Posture Statement (2025) - Annual congressional report on readiness, strategy, and future needs.

CYBERCOM History | Official News - Key developments and ongoing updates from CYBERCOM.

CYBERCOM Component Commands & Cyber Defense Exercises

These service components carry out CYBERCOM’s mission across the Department of Defense and global cyberspace operations:

🔗 Service Component Commands

 

🔗 Major U.S. & Allied Cyber Defense Exercises

These exercises enhance cyber readiness, coordination, and defense across CYBERCOM, federal partners, and allied nations, while reinforcing deterrence and resilience in a contested domain.

Supporting Partners & Agencies

Organizations supporting CYBERCOM’s mission to defend DoDIN, conduct full-spectrum cyber operations, and secure national cyber interests.

🔗 DoD Core Support Entities

🔗 Federal Civilian Agencies - Coordinate on joint defense and national cyber response:

 

🔗 Intelliigence & Academic Workforce Partners - Provide strategic support and talent development

Key Reference Sources

Research Tools

Books

Enter your search terms and click Search to find an e-book:

Use the Library Online Catalog to search for printed book titles, which may also be available electronically.

Reports & Studies

Security Studies on JSTOR is an excellent resource to find research reports from different policy institutes in the field of security studies.  Keyword is the default search in JSTOR with the option to refine results by publication year, content type and subject.  Advanced Search allows more precise searching. 

Below are some reports from this collection:

A variety of quality, open access reports are also available from government and private research organizations.  Important sources include:

Below is a selected list of reports from different research and government institutions:

Articles & Journals

Enter a journal title to check full-text availability and coverage in all library collections:

Selected journal and news articles for greater analysis and exploration of key issues.

Journals to Explore

Keyword Index

Curated list for focused database and research searches:

  • Artificial intelligence
  • Big data
  • Computer networks
  • Cyber campaigns
  • Cyber deception
  • Cyber deterrence
  • Cyber espionage
  • Cyber power
  • Cyber strategy
  • Cyber threats
  • Cyber warfare
  • Cyber weapons
  • Cybersecurity
  • Cyberspace operations
  • Data governance
  • Deterrence
  • Denial-of-service attacks
  • Digital infrastructure
  • Disruption
  • DODIN operations
  • Electronic warfare
  • Emerging technologies
  • Escalation
  • Exploitation
  • Globalization
  • GPS signals
  • Great power competition
  • Hacking
  • Industrial espionage
  • Infiltration
  • Information advantage
  • Information security domain
  • Infrastructure protection
  • Infrastructure security
  • Internet of Things
  • ISR
  • Machine learning
  • Malicious activities
  • Malware
  • Military information
  • National security
  • Network warfare operations
  • Online conflict
  • Ransomware
  • Security alliances
  • Security espionage
  • Situational awareness
  • Social engineering
  • Strategic intelligence
  • Virtual battlefield
  • Virtual societal warfare
  • Vulnerability assessment
  • Wargames
  • Worm (Stuxnet)
  • Zero-day attacks
  • Zero-day vulnerabilities