Cyber Leader Course (CLC)

Please call for additional course dates.

Learn How Advanced Cyber Threats Compromise Business Networks


    • Use real client-side exploits against web browsers
    • Learn the methodologies used by real-world attackers
    • Master strategies to implement defense-in-depth to defend your networks


Cyber Leader Course (CLC) familiarizes leaders with the processes, techniques and terminology used by cyber professionals to explain, discover and prevent threats to enterprise networks and sensitive business information.

The exercises in this course are designed to enable leaders to make better decisions in order to protect their organization’s critical information. Students will leave the class with a strong awareness of the current cyber environment, modern exploitation techniques and an understanding of cyber terminology used by security-minded professionals.

This course is designed for managers and leaders at all levels who want to understand what happens in a cyber-attack. The course is also intended to demystify cyber-related terms so that you can discuss cyber issues with technical staff, make well-informed security investment decisions and more effectively lead and manage your organization.


NOTE: In this class you will use real exploits against simulated targets. For example, you will perform spear-phishing attacks against email addresses found in your scenario. Our remote target computers will check their email and open your exploit attachments and links sent. All exploits are performed in a realistic sandboxed network with routing, public IP addresses and domain names.
Download Course Sheet


Vouchers are a way to pre-pay for a course and allow students to take the course at a later date.

Purchase Voucher


You will learn the methodologies and attack vectors used by hackers and who the attackers are and their motivations.


You will use the open source tools Metasploit and Armitage to experience the actions of a hacker. You’ll also learn how to deploy and run a small-scale botnet with real malware.


 You will learn about executive orders, DoD directives, regulations and the NIST Cybersecurity Framework. You’ll gain an understanding of how these cyber policies could affect your organization.


You will learn about defense-in-depth and how it can be used to protect and secure your networks and gain a high-level understanding of security and privacy expectations when moving to cloud computing.


You will learn what actions to take if your organization has been breached and best practices for performing Incident Response.

At Parrot Labs, we make it easy. You show up, we provide the tools. Our classroom facility is conveniently located near the BWI airport, and just down the street from a hotel where you can stay if you’re from out of town.


As a student, you’ll be provided a high-end workstation consisting of an i7 quad-core with 16 GB RAM. You will also have two monitors that provide the visual space necessary to comfortably perform a network attack, watch a packet capture, take online notes and perform research.

The classroom has 2 HD projectors with two screens. This allows students to view demos on one screen while viewing instructional slides on the other.


CLC (Single Seat)


Course Length: 2 Days

Sign up

CLC (Group Discount for 10 or More Students)


Course Length: 2 Days

Sign up

Additional group and government discounts available, just email us.

Further, the next generation of terrorists will grow up in a digital world, with ever more powerful and easy-to-use hacking tools at their disposal.”

— Dorothy Denning

What will you get out of this course?

You will learn how attackers can breach your perimeter security and expand their access within your compromised network.

You will receive proficiency-based hands-on instruction that enables you to experience a cyber-attack from an APT’s perspective.

What makes this course unique?

Parrots Labs creates a large scale, realistic network for each student. Each individual network has four routers, functioning domain controllers, a functioning root DNS server, multiple domains with DMZs to find and scan, and internal networks that are live and active.

You’ll perform your exercises and scenarios in a sandboxed network. Each student works in their own swim lane environment so you don’t have to worry about crashing another student’s VMs. You can practice and learn at your own pace without affecting other students.