top of page

Course Description

In the ever-evolving landscape of cyber warfare, the DoD stands as the bulwark of the nation's defense. The increasing reliance on advanced weapon systems has necessitated a paradigm shift in military operations, bringing cybersecurity to the forefront. Recognizing this, we have crafted the "Cyber Survivability Assessments for Weapons Systems" course, specifically tailored to the unique needs of the DoD.

This specialized military cybersecurity training focuses on the crux of weapon systems cybersecurity – assessing and enhancing cyber survivability. Through the lens of cyber survivability, the course offers a deep-dive into the challenges and nuances associated with the security of various weapon systems, including avionics, smartphones, cars, and satellites.

The course is deeply rooted in the philosophy of active learning. Participants will be engaged with practical exercises and real-world scenarios, enabling them to understand the complexities of cyber threats to the weapon systems. From identifying vulnerabilities and estimating potential impacts to formulating robust defense strategies, the course covers all critical aspects.

In the realm of cyber survivability, the course addresses the inevitable question – how much will it cost to enhance the survivability? Here, we have integrated the concept of cost assessments, providing the tools and methodologies to evaluate the potential investment required for security enhancements. Participants will learn to balance the scales of security upgrades and budgetary restrictions, ensuring an informed and strategic allocation of resources.

The "Cyber Survivability Assessments for Weapons Systems" course is not just about learning the theoretical aspects of DoD cybersecurity. It is about empowering the Army personnel with the knowledge and skills to safeguard our nation's defense systems against cyber threats. It's about making risk-based decisions informed by a comprehensive understanding of cyber survivability.

This course is an essential part of your cybersecurity toolkit. We invite you to join us on this journey of securing our nation's defense systems. Be part of the initiative that ensures our weapon systems not only withstand cyber threats but excel in the face of adversity.

Who Should Take This "Cyber Survivability Assessments for Weapons Systems" Course?

This course is meticulously designed with a specific audience in mind, crafted to empower various stakeholders within the DoD and associated defense sectors with the knowledge and skills necessary for effective cybersecurity measures.

  1. Military Commanders and Leaders: Military leaders responsible for making risk-based decisions about staff and weapon systems will benefit greatly from this course. The knowledge gained will help these leaders to make informed decisions about the cyber survivability of their systems, thus enhancing the overall security posture of their units.

  2. Cybersecurity Professionals: If you are a cybersecurity professional working in or with the military sector, this course will provide you with a focused perspective on weapon systems cybersecurity, enabling you to better understand and address the unique challenges associated with it.

  3. Military Technicians and Engineers: Those responsible for the maintenance, operation, and enhancement of military weapon systems would also greatly benefit from this course. Understanding cyber survivability can help these professionals to design and implement more resilient systems.

  4. Defense Contractors: Professionals working in defense contracting, particularly those involved in the design, development, and supply of weapon systems, should consider this course. It will provide valuable insights into the cyber survivability expectations and standards of the DoD.

  5. Policy Makers and Strategists: Individuals responsible for formulating military and defense strategies, as well as policy makers in the defense sector, will gain a deeper understanding of the importance of cyber survivability in current and future military operations.

In essence, the "Cyber Survivability Assessments for Weapons Systems" course is for anyone involved in the lifecycle of military weapon systems who wishes to ensure these systems are robust, resilient, and ready to face the cyber challenges of today and tomorrow.

Example Course Schedule:

Day 1: Foundations of Cyber Survivability

  • Course Overview and Introductions

  • Understanding Cyber Survivability: Definitions, Principles, and Importance

  • Exploring the Current Cyber Threat Landscape

  • In-depth Exploration of Cyber Resilience Principles: Robustness, Redundancy, and Recovery Mechanisms

Day 2: Unpacking the Cyber Vulnerabilities in Weapon Systems

  • Familiarization with Diverse Weapon Systems (Avionics, Smartphones, Cars, Satellites)

  • Detailed Breakdown of Potential Cyber Threats and Vulnerabilities in Weapon Systems

  • Real-world Case Studies: Dissection and Analysis of Past Cyber Attacks on Weapon Systems

  • Interactive Exercise: Performing a Comprehensive Vulnerability Assessment

Day 3: Strategies and Techniques for Enhancing Cyber Survivability

  • Deep Dive into Proven Strategies for Strengthening Cyber Survivability

  • Exploration of Cutting-edge Technologies and Techniques for Cyber Defense

  • Practical Exercise: Implementing Defense Measures in a Simulated Environment

  • Success Stories: Detailed Analysis of Successful Implementations of Cyber Survivability Measures

Day 4: Deciphering the Economics of Cyber Survivability

  • Demystifying the Costs of Improving Cyber Survivability

  • Hands-on Training with Tools and Frameworks for Effective Cost Assessment

  • Decision-making Workshop: Balancing Security Enhancements and Budget Constraints

  • Interactive Exercise: Real-world Cost Assessment and Resource Allocation Scenarios

Day 5: Integrating Cyber Survivability into Real-world Operations

  • Applying Learned Concepts to Real-world Military Scenarios

  • Discussion: Strategies for Integrating Cyber Survivability into Existing Military Operations

  • Group Project: Developing a Comprehensive Cyber Survivability Plan for a Hypothetical Scenario

  • Course Review, Open Q&A Session, and Course Wrap-up


  1. Understanding of Cybersecurity Principles: Participants should have a foundational understanding of cybersecurity principles. This knowledge will be critical in understanding the course material, especially when it comes to aspects of DoD cybersecurity.

  2. Knowledge of Military Weapon Systems: A working knowledge of military weapon systems is crucial as the course is focused on enhancing their cybersecurity. Understanding the operational aspects and typical configurations of these systems will provide a necessary backdrop for the cyber survivability strategies discussed in the course.

  3. Background in IT or Related Field: This course delves into technical aspects of weapon systems cybersecurity. Therefore, previous experience in IT, cybersecurity, or a related field will be beneficial for comprehensive understanding.

  4. Leadership or Decision-Making Roles: Those who are in leadership or decision-making roles within military or defense organizations will find this course particularly beneficial, as it centers on making informed decisions about DoD cybersecurity and weapon systems cybersecurity.

While these prerequisites will help participants get the most out of the course, we've designed our program to be inclusive of a wide range of backgrounds and experiences. If you have any questions about your eligibility or how this course could benefit you, please reach out to us. We are committed to supporting all our participants to ensure they receive maximum benefit from the course.

In the rapidly evolving realm of DoD cybersecurity, the "Cyber Survivability Assessments for Weapons Systems" course is more than just military cybersecurity training. It's a comprehensive program designed to empower you with the knowledge and skills necessary to safeguard the nation's crucial defense systems against ever-present cyber threats.

This course provides an unparalleled opportunity to delve deep into the world of weapon systems cybersecurity. It equips you with the practical understanding to assess, enhance, and sustain the cyber survivability of diverse weapon systems, from avionics and smartphones to cars and satellites.

As we navigate the complex cyber terrain together, we'll be working towards a shared vision - a future where our nation's weapon systems not only withstand cyber threats but emerge stronger and more resilient.

Join us on this crucial journey. Let's shape the future of DoD cybersecurity together, ensuring our defenses remain robust, resilient, and ready for the challenges of tomorrow. We look forward to welcoming you to the course.

About Boston Cybernetics Institute

Boston Cybernetics Institute, PBC was created by former MIT Lincoln Lab cybersecurity researchers to give meaningful niche cyber instruction to a new generation of cybersecurity professionals.


We avoid the normal style of teaching with PowerPoint and lectures, opting to provide instead real-life engaging instruction that takes place in a customized environment. We have given our style of instruction to multiple DoD agencies, US commercial companies, and international companies.


Instructors at Boston Cybernetics Institute

Jeremy Blackthorne.png

Jeremy Blackthorne

President of the Boston Cybernetics Institute

Jeremy Blackthorne is a Lead Instructor at the Boston Cybernetics Institute (BCI). Before BCI, he was a researcher in the Cyber System Assessments group at MIT Lincoln Laboratory. Blackthorne is the co-creator and instructor for the Rensselaer Polytechnic Institute (RPI) courses: Modern Binary Exploitation, Spring 2015 and Malware Analysis, Spring 2013. ​Jeremy has published research at various academic and industry conferences. He served in the U.S. Marine Corps and is an alumnus of RPISEC. He holds a BS and MS in computer science. ​ Blackthorne was an active member of the Student Security Club and CTF team, RPISEC, from 2012 to 2015, where he taught seminars on Reverse-Engineering, Exploitation, and various other Cybersecurity topics.


Clark Wood

security researcher and instructor

Clark Wood is a security researcher and instructor at the Boston Cybernetics Institute (BCI), focusing on Reverse Engineering, Exploitation, and CI/CD. He recently built a Reverse-Engineering and Exploitation platform for a DoD customer and is the Lead Engineer for BCI’s Government Services. Clark was formerly on the technical staff at MIT Lincoln Laboratory where he was a member of the Cyber System Assessments Group. ​Clark holds a BA in Economics from the University of Florida, a BS and MS in Computer Science from Florida State University, and a Master’s in Technology and Policy from MIT. ​


Rodolfo Cuevas

security researcher and instructor

Rodolfo Cuevas is a security researcher and instructor at BCI, where he focuses on understanding how design constraints can be used to limit the impact of an attacker on a system. His research combines the adversarial mindset with approaches influenced by Systems and Control Theory. ​ Rodolfo was a staff member at MIT Lincoln Laboratory and began his career as a RADAR and Ballistic Missile Defense System (BMDS) analyst. Later, Rodolfo transitioned to evaluating and Red-Teaming tactical and commercial cyber systems in support of DoD and other government programs. ​ Rodolfo holds a BS, M.Eng., and M.S. in Electrical and Computer Engineering from Cornell University.


Reed Porada

security researcher and instructor

Reed Porada is a security researcher and instructor at BCI, focused on getting to the "so what" of both defensive and offensive cyber measures. Reed also leads BCI training in Cyber Systems Analysis, focusing on developing systems-thinking skills of developers up to managers. ​Reed was a staff member at MIT Lincoln Laboratory for ten years, where he was responsible for Test and Evaluation, Test Automation Research, Red-Teaming of Cyber Systems, and Blue System Architectures. Reed was a computer scientist at the Naval Research Laboratory focused on wireless communication systems. He holds a BS in Computer Science from the University of Maryland, College Park and an MS in Software Engineering from Carnegie Mellon University.

Cyber Survivability Assessments for Weapons Systems



Upon request


5 days

What happens after I click the button?

Your default e-mail client will pop up and you'll be asked to write us a short message. Please let us know which course you are interested in and what dates would work for you.

Anchor 1
bottom of page