Cyber Leader Course (CLC)

Upcoming Courses

August 14 – 15, 2018 | September 5 – 6, 2018

  Cost (single seat): $1,500 Course Length: 2 Days Additional group and government discounts available. Contact Parrot Labs for more information.  Download Course Catalog

What will you get out of CLC?

Using our proficiency-based hands-on instruction, you will experience a cyber-attack from an APT’s perspective. By the end of the course, you will have a confident understanding of how attackers can breach perimeter security and expand access within a compromised network.

What makes CLC unique?

You’ll perform exercises and scenarios in a sandboxed network, allowing you to practice and learn at your own pace without affecting other students.

Why should you enroll in CLC?

The Cyber Leader Course (CLC) familiarizes leaders with the processes, techniques and terminology used by cyber professionals to explain, discover and prevent threats to enterprise networks and sensitive business information. Throughout this course, you will:
      • Use real client-side exploits against web browsers
      • Learn the methodologies used by real-world attackers
      • Master strategies to implement defense-in-depth to defend networks
     
The exercises in this course are designed to enable leaders to make better decisions in order to protect organizations’ critical information. Students leave the class with a strong awareness of the current cyber environment, modern exploitation techniques and an understanding of cyber terminology used by security-minded professionals. This course is designed for managers and leaders at all levels who want to understand what happens in a cyber-attack. The course is also intended to demystify cyber-related terms so that you can discuss cyber issues with technical staff, make well-informed security decisions and more effectively lead and manage an organization.  

What topics are covered in CLC?

 

THREAT LANDSCAPE

Grasp the methodologies and attack vectors used by hackers, discover their identities and uncover their motivations.

THREAT AND MALWARE IDENTIFICATION

Use open source tools such as Metasploit and Armitage to experience the actions of a hacker. Also, learn how to deploy and run a small-scale botnet with real malware.

CYBER POLICY

Gain insight into executive orders, DoD directives, regulations and the NIST Cybersecurity Framework in order to develop an understanding of how these cyber policies affect organizations.

CYBER DEFENSE

Learn about defense-in-depth, how it can be used to protect and secure networks and gain a high-level understanding of security and privacy expectations when moving to cloud computing.

INCIDENT RESPONSE AND FORENSICS

Know what actions to take if an organization has been breached and master the best practices for performing Incident Response.