Course Description
Our intensive course, "Defensive Cyber Ops," offers a comprehensive exploration of defensive cyber operations (DCO) for both private sector professionals and the U.S. military, illuminating the integral role of DCO in modern cyber warfare.
The rapidly evolving world of cyberspace operations demands robust defensive measures and the ability to rapidly deliver innovative, tailored information technology solutions. This course equips you with the skills and knowledge necessary to defend, protect data networks, and rapidly mitigate threats in this complex and high-stakes domain.
At the heart of our Defensive Cyber Ops course is a thorough understanding of defensive cyber operations, including the various roles within DCO teams, the phases of defensive actions, such as prevention, detection, response, and recovery operations, and how these components work together to protect critical missions.
You'll dive deep into the core principles of defensive cyber, learning how to safeguard your organization's data and infrastructure from cyber threats. We'll explore the development of dominant cyberspace capabilities, the application of tailored information technology solutions to specific threats, and the implementation of internal defensive measures (IDM) for proactive protection.
This course offers a unique blend of theory and practice, with an emphasis on real-world scenarios and hands-on exercises. You'll learn how to actively engage in cyberspace operations intended to protect data and other designated systems, utilizing cutting-edge technologies such as artificial intelligence and rapid prototyping.
We'll also explore the unique considerations of defensive cyber operations for military professionals, examining the nuances of cyber warfare and the importance of creating net-centric capabilities that can safeguard national security and protect critical missions.
This course doesn't just cover defensive strategies. We'll also delve into active cyberspace operations intended to hunt for and counteract cyber threats, allowing you to effectively defend and protect data networks within your organization and beyond.
Designed for those serious about mastering defensive cyber, this course combines theory, practice, and in-depth case studies to offer one of the most comprehensive defensive cyber operations (DCO) courses available. Whether you're protecting a private organization's data or engaging in military cyber warfare, you'll leave this course equipped to deliver outstanding DCO performance.
Who Should Take This Defensive Cyber Ops Course?
This course is designed for anyone who seeks a comprehensive understanding of defensive cyberspace operations, whether you are a cybersecurity professional aiming to deepen your expertise or a military personnel tasked with protecting national security interests.
Cybersecurity Professionals: If you're a cybersecurity analyst, network engineer, IT manager, or a professional in a similar role, this course will provide you with the knowledge and skills necessary to effectively protect your organization's data networks and designated systems from cyber threats.
U.S. Military and Government Personnel: For those serving in the armed forces or government agencies, this course provides critical understanding and skills that can be directly applied to protect our nation's cyber terrain. You will learn how to leverage net-centric capabilities, rapidly deliver innovative solutions, and conduct active cyberspace operations intended to counter threats.
Cybersecurity Students: If you're a student pursuing a degree in cybersecurity, computer science, or a related field, this course can provide you with a practical, real-world understanding of defensive cyberspace operations, complementing your academic studies and preparing you for a successful career.
Example Course Schedule:
Day 1: Introduction to Defensive Cyberspace Operations
We'll kick off the course with an overview of defensive cyberspace operations, setting the stage for what's to come. We'll cover the history, key concepts, and roles within DCO teams. By the end of the day, you'll understand the foundational principles of defensive operations in cyberspace, setting the stage for more complex topics.
Day 2: Active Defensive Cyber Operations
Day two takes a closer look at active cyberspace operations intended to protect data networks and other designated systems. We'll explore real-world case studies and delve into how these operations can safeguard your organization's data and other designated systems.
Day 3: Innovative Solutions & Tools
On day three, we'll dive into how defensive cyberspace operations rapidly deliver innovative, tailored solutions. From artificial intelligence and machine learning to advanced algorithms, you'll learn about the cutting-edge technologies that are revolutionizing the way we protect data networks.
Day 4: Enhancing Net Centric Capabilities & Defensive Measures
Day four will be dedicated to net-centric capabilities and their vital role in cyberspace operations. We'll explore how these capabilities enhance our ability to defend and respond to threats. We'll also discuss internal defensive measures (IDM), a key component of DCO IDM that bolsters the security of networks and designated systems.
Day 5: Applying Defensive Cyber Ops in Real-World Scenarios
The final day of our course brings all of your learning together with a focus on practical application. We'll simulate various threat scenarios and you'll have the opportunity to apply what you've learned to protect data networks. This hands-on experience will provide you with the confidence and skills needed to implement defensive cyberspace operations within your own organizations.
By the end of this five-day course, you will have a thorough understanding of defensive cyberspace operations, how to rapidly deliver innovative solutions, protect designated systems, enhance net-centric capabilities, and implement effective internal defensive measures.
About Boston Cybernetics Institute
Boston Cybernetics Institute, PBC was created by former MIT Lincoln Lab cybersecurity researchers to give meaningful niche cyber instruction to a new generation of cybersecurity professionals.
We avoid the normal style of teaching with PowerPoint and lectures, opting to provide instead real-life engaging instruction that takes place in a customized environment. We have given our style of instruction to multiple DoD agencies, US commercial companies, and international companies.
Instructors at Boston Cybernetics Institute
Jeremy Blackthorne
President of the Boston Cybernetics Institute
Jeremy Blackthorne is a Lead Instructor at the Boston Cybernetics Institute (BCI). Before BCI, he was a researcher in the Cyber System Assessments group at MIT Lincoln Laboratory. Blackthorne is the co-creator and instructor for the Rensselaer Polytechnic Institute (RPI) courses: Modern Binary Exploitation, Spring 2015 and Malware Analysis, Spring 2013. Jeremy has published research at various academic and industry conferences. He served in the U.S. Marine Corps and is an alumnus of RPISEC. He holds a BS and MS in computer science. Blackthorne was an active member of the Student Security Club and CTF team, RPISEC, from 2012 to 2015, where he taught seminars on Reverse-Engineering, Exploitation, and various other Cybersecurity topics.
Clark Wood
security researcher and instructor
Clark Wood is a security researcher and instructor at the Boston Cybernetics Institute (BCI), focusing on Reverse Engineering, Exploitation, and CI/CD. He recently built a Reverse-Engineering and Exploitation platform for a DoD customer and is the Lead Engineer for BCI’s Government Services. Clark was formerly on the technical staff at MIT Lincoln Laboratory where he was a member of the Cyber System Assessments Group. Clark holds a BA in Economics from the University of Florida, a BS and MS in Computer Science from Florida State University, and a Master’s in Technology and Policy from MIT.
Rodolfo Cuevas
security researcher and instructor
Rodolfo Cuevas is a security researcher and instructor at BCI, where he focuses on understanding how design constraints can be used to limit the impact of an attacker on a system. His research combines the adversarial mindset with approaches influenced by Systems and Control Theory. Rodolfo was a staff member at MIT Lincoln Laboratory and began his career as a RADAR and Ballistic Missile Defense System (BMDS) analyst. Later, Rodolfo transitioned to evaluating and Red-Teaming tactical and commercial cyber systems in support of DoD and other government programs. Rodolfo holds a BS, M.Eng., and M.S. in Electrical and Computer Engineering from Cornell University.
Reed Porada
security researcher and instructor
Reed Porada is a security researcher and instructor at BCI, focused on getting to the "so what" of both defensive and offensive cyber measures. Reed also leads BCI training in Cyber Systems Analysis, focusing on developing systems-thinking skills of developers up to managers. Reed was a staff member at MIT Lincoln Laboratory for ten years, where he was responsible for Test and Evaluation, Test Automation Research, Red-Teaming of Cyber Systems, and Blue System Architectures. Reed was a computer scientist at the Naval Research Laboratory focused on wireless communication systems. He holds a BS in Computer Science from the University of Maryland, College Park and an MS in Software Engineering from Carnegie Mellon University.