Cyber Leader Course (CLC)

Please call for additional course dates.


Learn How Advanced Cyber Threats Compromise Business Networks


    • Use real client-side exploits against web browsers
    • Learn the methodologies used by real-world attackers
    • Master strategies to implement defense-in-depth to defend your networks


Cyber Leader Course (CLC) familiarizes leaders with the processes, techniques and terminology used by cyber professionals to explain, discover and prevent threats to enterprise networks and sensitive business information.

The exercises in this course are designed to enable leaders to make better decisions in order to protect their organization’s critical information. Students will leave the class with a strong awareness of the current cyber environment, modern exploitation techniques and an understanding of cyber terminology used by security-minded professionals.

This course is designed for managers and leaders at all levels who want to understand what happens in a cyber-attack. The course is also intended to demystify cyber-related terms so that you can discuss cyber issues with technical staff, make well-informed security investment decisions and more effectively lead and manage your organization.


NOTE: In this class you will use real exploits against simulated targets. For example, you will perform spear phishing attacks against email addresses found in your scenario. Our remote target computers will check their email and open your exploit attachments and links sent. All exploits are performed in a realistic sandboxed network with routing, public IP addresses and domain names.
Download Course Sheet




Grasp the methodologies and attack vectors used by hackers, discover their identities and uncover their motivations.


Use the open source tools Metasploit and Armitage to experience the actions of a hacker. You’ll also learn how to deploy and run a small-scale botnet with real malware.


Gain insight into executive orders, DoD directives, regulations and the NIST Cybersecurity Framework in order to develop an understanding of how these cyber policies could affect your organization.


Learn about defense-in-depth, how it can be used to protect and secure your networks and gain a high-level understanding of security and privacy expectations when moving to cloud computing.


Know what actions to take if your organization has been breached and master the best practices for performing Incident Response.



CLC (Single Seat)


Course Length: 2 Days

Sign up

Additional group and government discounts available, just email us.


What will you get out of this course?

Using our proficiency-based hands-on instruction, you will be able to experience a cyber-attack from an APT’s perspective. By the end of the course, you will have a confident understanding of how attackers can breach your perimeter security and expand their access within your compromised network.

What makes this course unique?

You’ll perform your exercises and scenarios in a sandboxed network, allowing you to practice and learn at your own pace without affecting other students.