Cyberforce Superiority Executive/Managers Course

Cyberforce Superiority

Instructors: Mark Lowenthal, Craig Stevenson, Michael Hennick

Fee: $4495

The Executive/Managers Course gives students a technical sampling of the complete belt series in an immersive five-day offering.

Unlike most cyber training courses that emphasize either computer security or hacking skills, our course is designed to give students a preliminary integrated understanding of the methodologies and interrelated offensive and defensive factors that come into play when training a cyber warrior.  Students will learn a sample of the introductory, mid-level, and high-level tactics used for Computer Network Operations (CNO) including Computer Network Attack (CNA) & Computer Network Exploitation (CNE), Computer Network Defense (CND), as well as Computer forensics.  Topics of instruction include: ethical hacking, Boolean Logic, networking for both advanced Unix and Windows, vulnerability identification, computer exploit development, and reverse engineering.

This is a practical course with instruction that is focused on in-class computer exercises and lab work.   This course is ideal for executives, managers and supervisory personnel who play a role in planning, operations, risk assessment, policy, and ethics.  This course also allows the more technical student to benchmark his or her skills against the entirety of curriculum learning objectives.

This course is approved for CEUs through George Mason University.

George Mason University

Upcoming Dates

No events available...

Course Learning Objectives and Content

Day 1:Introduction to and History of Hacking
  • Historical Background and Legal Context
  • Introduction to Computers
  • History of Hacking
  • Introduction to Programming
  • Introduction to Windows
  • Introduction to Linux
  • Windows and Linus Labs
Day 2:Introduction to Networking and Computer Math
  • Introduction to Computer Math
  • Introduction to Networking
  • Advanced Linux
  • Windows and Linux Servers
Day 3:Beginning Hacking
  • Introduction to Hacking
  • Overview:  Attack Methodology
  • Open Source Collection
  • Target Identification
  • Application Identification
  • Vulnerability Identification
  • Labs and Exercises
Day 4:Attack Methodology and Targeting
  • Attack Methodology Review
  • Compromising Targets
  • Establishing a Presence on a Target
  • Attacking Trusted Networks
  • Labs and Exercises
Day 5:Exploit Development & Cyber Engineering
  • Introduction to Exploit development
  • Introduction to Root kits
  • Introduction to Reverse Engineering
  • Introduction to Social Engineering