CYBER TRAINING

Train to fight and defend today's cyber threats by leveraging our offensive and defensive cyber operations training for leaders and practitioners. You’ll receive hands-on training and course work with the appropriate content and intensity to fully prepare you for cyber operations. We design the curriculum and activities with your cyber missions in mind to best prepare you to meet your service mission requirements.

Shields-01.jpg

All required courses must be completed to earn the Cyber Security Associate Certification.

Required Courses

CYBER SECURITY FUNDAMETALS I


COURSE OUTLINE

  • Network Foundations​
  • Windows Foundations
  • Linux Foundations
  • Coding Foundations
COURSE DESCRIPTION This is an intense, hands-on course designed to deliver a complete array of topics relevant to operationally-focused cyber missions from both the offensive and defensive perspectives. Students will receive highly technical and mission relevant training proven to drastically reduce the amount of follow-on on-the-job training required to immediately impact operations. This course focuses heavily on the TCP/IP stack, deep-packet analysis, network forensics, Windows and Linux system fundamentals, shell scripting, malware triage, computer network exploitation, computer network attack, and the post-compromise maneuver and forensics of remote targets. Extensive analysis is conducted throughout each stage of the network attack methodology to include packet capturing and inspection, analyzing logs, deep dive examination of the compromised machine, and the execution o




CYBER SECURITY FUNDAMETALS II


COURSE OUTLINE

  • Security Fundamentals
  • Cyber Defense ​
  • Cyber Offense
  • Cyber Automation Coding
  • PowerShell Scripting​
  • BASH Scripting
  • Python Scripting
COURSE DESCRIPTION Students will start at the beginning with PowerShell, Bash and Python, no assumptions are made on prior skill level, and work towards becoming proficient in the language both in reading source code and designing and developing their own applications. The PowerShell portion is based on the methodologies and processes used by professional government and corporate penetration testers, but with a strong emphasis on utilizing Windows PowerShell to leverage the .NET framework and Windows Management Instrumentation. The course uses real-world techniques within each of the modules, demonstrating how Python can be leveraged in each scenario to help improve success and efficiency.





Optional Courses

COMPTIA SECURITY+


Gain the necesaary skills and knowledge needed to earn the CompTIA Security+ Certification.




COMPTIA LINUX+


Gain the necesaary skills and knowledge needed to earn the CompTIA Linux+ Certification.





Shields-02.jpg

All required courses must be completed to earn the Cyber Security Specialist Certification.

Required Courses

CYBER TOOLS FOUNDATIONS


COURSE OUTLINE

  • Wireshark​
  • File Transferring
  • Metasploit
COURSE DESCRIPTION Extensive analysis is conducted throughout each stage of the network attack methodology to include packet capturing and inspection, analyzing logs, deep dive examination of the compromised machine, and the execution of advanced Windows and Linux remote exploitation and attack techniques.




DIGITAL FORENSICS & INCIDENT RESPONSE


COURSE OUTLINE

  • Compromise Identification
  • Data Collection
  • Countermeasures
COURSE DESCRIPTION The course teaches a technological base, followed by an analysis of different aspects of cyber security. The scenarios in the cyber Security Forensics course combine incident response and analysis with extensive forensics on a multitude of technologies and platforms.




OS EXPLOITATION


COURSE OUTLINE

  • Targeting ​
  • Collecting Data
  • Access
COURSE DESCRIPTION Instructors use open-source tools to teach students precise
measures, techniques and skills to successfully identify malicious behavior and activities undetected by traditional security products on Windows and Linux operating systems.





Optional Courses

EC-COUNCIL COMPUTER HACKING AND FORENSIC INVESTIGATOR


Gain the necesaary skills and knowledge needed to earn the EC-Council Computer Hacking and Forensic Investigator Certification.




EC-COUNCIL CERTIFIED ETHICAL HACKER


Gain the necesaary skills and knowledge needed to earn the EC-Council Certified Ethcial Hacker Certification.





Shields-03.jpg

All required courses must be completed to earn the Cyber Security Professional Certification.

Required Courses

TACTICAL OFFENSIVE METHODOLOGIES


COURSE OUTLINE

  • Packet Capture and Analysis ​
  • Gaining Access
  • Penetration testing
COURSE DESCRIPTION This course challenges students to implement their own customattack frameworks for use during penetration testing and other activities. Students will no longer need to rely on a framework written and designed by someone else during assignments, they will use a tool that they created, free of known and compromising signatures.




SOC ANALYST


COURSE OUTLINE

  • IDS/IPS​
  • Anti-virus and Anti-malware
  • Malware analysis and forensics
  • Security Information and Event Management (SIEM)
COURSE DESCRIPTION The course focuses on the different aspects of security operations – from how the SOC is built, the tools and processes involved in incident response, and teamwork in the SOC, to an understanding of the different threats that a SOC analyst can encounter during a shift.





Required Courses

CYBER SECURITY FUNDAMETALS I


COURSE OUTLINE

  • Network Foundations​
  • Windows Foundations
  • Linux Foundations
  • Coding Foundations
COURSE DESCRIPTION This is an intense, hands-on course designed to deliver a complete array of topics relevant to operationally-focused cyber missions from both the offensive and defensive perspectives. Students will receive highly technical and mission relevant training proven to drastically reduce the amount of follow-on on-the-job training required to immediately impact operations. This course focuses heavily on the TCP/IP stack, deep-packet analysis, network forensics, Windows and Linux system fundamentals, shell scripting, malware triage, computer network exploitation, computer network attack, and the post-compromise maneuver and forensics of remote targets. Extensive analysis is conducted throughout each stage of the network attack methodology to include packet capturing and inspection, analyzing logs, deep dive examination of the compromised machine, and the execution o




CYBER SECURITY FUNDAMETALS II


COURSE OUTLINE

  • Security Fundamentals
  • Cyber Defense ​
  • Cyber Offense
  • Cyber Automation Coding
  • PowerShell Scripting​
  • BASH Scripting
  • Python Scripting
COURSE DESCRIPTION Students will start at the beginning with PowerShell, Bash and Python, no assumptions are made on prior skill level, and work towards becoming proficient in the language both in reading source code and designing and developing their own applications. The PowerShell portion is based on the methodologies and processes used by professional government and corporate penetration testers, but with a strong emphasis on utilizing Windows PowerShell to leverage the .NET framework and Windows Management Instrumentation. The course uses real-world techniques within each of the modules, demonstrating how Python can be leveraged in each scenario to help improve success and efficiency.





Take our certification prep courses and gain the skills and confidence to earn industry leading accreditations. Our course offerings will prepare you to pass highly sought after certifications from CompTIA and EC-Council! 

  • Computer Hacking and Forensic Investigator

  • Certified Ethical Hacker

  • Security Analyst

Ready to take the next step in your cyber security career? Looking to bolster the skills of your employees? Contact us today to register for training

Please fill out the below contact form and a representative will email you personally with more information on our offerings.

arrow&v

Success! Message received.