C-STRIKE Program

Computer Skills Training for Readiness, Innovation, and Knowledge Exploitation

Course Description

This 6-week intensive bootcamp combines the fundamentals from computer science programs with lessons in critical thinking learned over years of tackling challenging problems for the US military. Students learn to apply programming, networking, data science, cybersecurity, and systems analysis skills to solve real-world problems faced during modern military operations.

Course Dates

Request Info

Course Location

The course is provided at BCI’s training facility in Harvard square at 30 JFK Street, Cambridge, MA.

Class Size

There is a minimum of 12 students and maximum of 30.


BCI's 1200 square foot classroom furnished with with whiteboards, projectors, desks, chairs and kitchen.


Each student is provided with all necessary equipment for the course, to include:

  • Desktop computer with late model i7 and 16GB RAM

  • 28” 4k display

  • Ergonomic keyboard and mouse

  • Licensed copies of all relevant software

  • Licensed copy of IDA Professional


This course is intended for enlisted E-5 and above and junior officers that utilize technology as a weapons system. No prior programming experience is required.

Teaching Methodology

Students in this course will work individually and in teams to develop software solutions to problems drawn from real operations. In the course, time is balanced between team design discussions and hands-on keyboard time implementing solutions. Students will demonstrate solutions to the class and integrate group feedback into improved solutions.

Learning Objectives

  • Translate vague operational problems into programming requirements

  • Develop computer programs/scripts which automate tasks

  • Integrate disparate data sources into a single cohesive picture

  • Create programs which update in real-time as data sources update

  • Display information visually for efficient communication to unit leaders

  • Python/PowerShell/C# Programming

  • Jupyter Notebooks

  • Automating MS Office tasks

  • Integrating data across Office applications

  • Version control

  • Documentation

Systems Analysis

  • Requirements interview techniques

  • Critical Thinking

  • Logical Fallacies/Cognitive Biases

  • Briefing/presenting insights


Data Science

  • Probability and statistics

  • Database Interaction

  • Machine Learning

  • Visualization

Cyber Security

  • Cyber Survivability 

  • Measurement

  • Cryptography

  • Reverse-engineering

  • Vulnerability Assessment

  • Forensics


  • TCP/IP Stack

  • Protocol analysis

  • Routing

  • Network programming


Evan Jensen

Brandyn Schult

Rodolfo Cuevas