- › Our Cyber Training Courses
- Mobile Device Forensics (MDF)
- Cyber Leader Course (CLC)
- Offensive Methodology & Analysis (OMA)
- Digital Forensics and Analysis (DFA)
- Windows Exploitation & Analysis (WEA)
- Frequently Asked Questions About Cyber Mission Training
- My Account
- Log In / Sign Up
- Class Alerts
- My Courses
August 14 – 15, 2018 | September 5 – 6, 2018
Please call for additional course dates. Customized courses can run by request.
Cost (single seat): $1,500
Course Length: 2 Days
Additional group and government discounts available.
Please call for vouchers and additional course dates.
What will you get out of CLC?
Using our proficiency-based hands-on instruction, you will experience a cyber-attack from an APT’s perspective. By the end of the course, you will have a confident understanding of how attackers can breach perimeter security and expand access within a compromised network.
What makes CLC unique?
You’ll perform exercises and scenarios in a sandboxed network, allowing you to practice and learn at your own pace without affecting other students.
Why should you enroll in CLC?
- Use real client-side exploits against web browsers
- Learn the methodologies used by real-world attackers
- Master strategies to implement defense-in-depth to defend networks
The Cyber Leader Course (CLC) familiarizes leaders with the processes, techniques and terminology used by cyber professionals to explain, discover and prevent threats to enterprise networks and sensitive business information.
The exercises in this course are designed to enable leaders to make better decisions in order to protect organizations’ critical information. Students will leave the class with a strong awareness of the current cyber environment, modern exploitation techniques and an understanding of cyber terminology used by security-minded professionals.
This course is designed for managers and leaders at all levels who want to understand what happens in a cyber-attack. The course is also intended to demystify cyber-related terms so that you can discuss cyber issues with technical staff, make well-informed security investment decisions and more effectively lead and manage your organization.
What topics are covered in CLC?
Grasp the methodologies and attack vectors used by hackers, discover their identities and uncover their motivations.
THREAT AND MALWARE IDENTIFICATION
Use open source tools such as Metasploit and Armitage to experience the actions of a hacker. Also, learn how to deploy and run a small-scale botnet with real malware.
Gain insight into executive orders, DoD directives, regulations and the NIST Cybersecurity Framework in order to develop an understanding of how these cyber policies affect organizations.
Learn about defense-in-depth, how it can be used to protect and secure networks and gain a high-level understanding of security and privacy expectations when moving to cloud computing.
INCIDENT RESPONSE AND FORENSICS
Know what actions to take if an organization has been breached and master the best practices for performing Incident Response.