CyberSec First Responder (CFR)
This course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frameworks such as NIST 800-61 r.2 (Computer Security Incident Handling), US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked […]
Cybersecurity Fundamentals
The Cybersecurity Fundamentals course provides students with an overview of core information assurance (IA) and cybersecurity concepts. This course is aimed at individuals in key technical IT and Cybersecurity roles. The course consists of lectures and hands-on labs for a multi-faceted learning experience. This course will provide a good initial foundation for participants wanting to […]
Cybersecurity Fundamentals
The three-day cybersecurity fundamentals course will provide students with an overview of current networking, information assurance (IA), and cybersecurity theory and application. The course will consist of lectures and hands-on labs for a multi-faceted learning experience. This course will provide a good initial foundation for participants wanting to ultimately pursue industry certification like Security + […]
Cybersecurity in the Age of AI
This course delves into the unique cybersecurity risks posed by AI systems and strategies to mitigate vulnerabilities and protect sensitive data. Hands-on Activities Conduct a security risk assessment for an agency’s proposed AI project. Simulate a cybersecurity incident response scenario involving AI. Course Duration 1-2 days
Cybersecurity Risk Management and Compliance
Cybersecurity Risk Management is an informed approach to planning, implementing, and operating in a connected environment through a risk-based approach, informed by business/mission objectives. This approach recognizes that cybersecurity is not an isolated function within any organization, but rather requires coordination with other organizational and executive functions – human resources, legal, finance, operations, technology. Identifying […]
Cybersecurity Risk Management and Compliance Primer/Review
The Cybersecurity Risk Management and Compliance Primer/Review course provides a high-level overview of Federal Information Security and Compliance Standards, Requirements, and Processes. The course is primarily aimed at IT and Business professionals who do not have primary responsibility for Information Security, but who work in IT environments where they need to have a good understanding […]
Intro to Malware Analysis
In this class students will learn the fundamentals of basic malware analysis through static and behavioral analysis of real and exemplar malware. This hands-on course will walk students through setting up a proper sandboxed environment well equipped for malware analysis. Students will be exposed to the compilation process that takes human readable code to compiled […]
Linux for Cyber Fundamentals
In this course, you will learn basic to intermediate end-user commands to help you navigate and use the Linux Operating System. Students will be prepared to: Log in and out of the system Perform tasks using terminal shells Navigate through the Linux file system Get help using the online manuals and documentation Understand Linux Bash […]
Linux for Cyber System Administration
In this course, you will build on Linux Fundamentals with more intermediate end-user and administrator command line operations focused on local system administration tasks. In this course, students will learn to: Run an Administrative Environment Manage and install system software Add and remove local storage, partitions, and filesystems Use Logical Volume Management Configure networking and […]
Logical Reasoning & Structured Analytic Techniques
The overall objective of this class is to enable students to critically think about their analysis and what they are tasked to analyze. A secondary objective is to provide students with a set of analytic tools to be used in future analytic scenarios. At the end of the course, students will be equipped with a […]
Malware Triage
Malware Triage was developed to provide students with a comprehensive hands-on exposure to the processes, tools and procedures used to identify common types of malware and to quickly determine their capabilities and threat level. This course teaches students concepts and methods involved in finding, analyzing and characterizing malware to determine how severe of a threat […]
Metasploit Framework
The Metasploit Framework course was developed to provide students with an introduction to an exploitation framework or suite of penetration testing tools commonly used by penetration testers. This course provides students with an in-depth overview of the capabilities and contents of the Metasploit Framework and shows them how to install it, maneuver within it and […]