Parrot Labs excels in three subject areas: using offensive methodologies (network exploitation), finding malicious threats in a network (forensics), and programming custom tools (tool development). After attending our proficiency-based courses, you will become a formidable cyber-security professional.
Cyber Leader Course (CLC)
Introduces processes, techniques, and terminology used by cyber professionals to explain, discover and prevent threats to enterprise networks and sensitive information. In this course, students will use real client-side exploits against web browsers, learn the methodologies used by real-world attackers, and master strategies to implement defense-in-depth to defend networks. Topics include the cyber threat landscape, overview of threats and malware, cyber policy, cyber defensive strategies, and incident response.
Cyber Mission Foundations (CMF)
Provides multi-dimensional foundation to help students confidently and effectively carry out cyber operations in the digital environment. In this course, students will learn to (1) identify, monitor, and defend targeted Windows systems; (2) detect and resolve threats against a wide range of Unix systems; (3) analyze network traffic and gain in-depth knowledge of how systems communicate; and (4) bolster security, conduct situational awareness surveys, and explore the engineering of malware.
Offensive Methodology & Analysis (OMA)
Teaches current cyber-attack methods to develop strategies to protect and defend networks and critical information. In this course, students will learn to exploit and expand access into remote networks using open source tools, use client-side exploits against web browsers, deploy and control a botnet, and tunnel and pivot deep into a network. This course teaches the essentials of remote network exploitation by demonstrating offensive methodologies in a coherent framework.
Digital Forensics & Analysis (DFA)
Teaches digital forensic knowledge of the inner workings of malware analysis, preparing students to become proficient cyber mission malware hunters and defenders. In this course, students will investigate real malware, including TDL4, Spybot, and Metasploit backdoors; learn how to perform memory forensics, seeking malware that bypasses antivirus solutions; and discover how reading network traffic assists with finding artifacts and identifying malicious behavior. Topics include process interrogation, file system analysis, supplemental artifacts, and responsive actions.
Windows Exploitation & Analysis (WEA)
Teaches the essentials of offensive methodology that focus on Windows systems and modern techniques. In this course, students will use the Browser Exploitation Framework (BeEF) to control clients, deploy and control an IRC-based botnet, and learn Windows 7 security bypass techniques. Classroom discussion and exercises focus on information gathering, scanning and enumeration, gaining access, expanding access, and sustaining access.
Windows and Linux Scripting (WLS)
Introduces PowerShell and Python scripting, beginning with the fundamentals and finishing with students creating fully executable scripts. In this course, students will identify scripting fundamentals, the differences between various sequences and primitive data types, and the importance of input validation; define the concept and importance of scoping, object-oriented programming, and classes; demonstrate the ability to use the command line interpreter; and learn the proper use of a function and multi-threaded scripting.
Mobile Digital Forensics (MDF)
Teaches the ins and outs of the ever-changing mobile devices and how they relate to hacking and forensics. In this course, students will dive in the inner workings of the Android and iOS operating systems, to recover and analyze mobile forensic data, defend against mobile malware, and explore mobile hacking concepts. Hands-on extractions of both mobile devices and removable media will be conducted, as well as database analysis, and other applicable file analysis. Exercises are performed in a sandboxed network, using an analytical approach as students comb through a variety of mobile device data and determine what is forensically valuable during the interworking of malware analysis.