Sharpen Your Edge in Cyber Warfare
Dive into the crucible of cyber operations with Boston Cybernetics Institute's elite "Core" course, a 20-day intensive program designed to transform experienced developers into masters of Computer Network Operations (CNO). Within this compact timeframe, you will hone your skills in areas critical to mission success, from Secure Programming to Reverse Engineering, all through a high-octane blend of hands-on experience and minimal lecture time.
Our DoD-veteran instructors will guide you through real-world challenges, leveraging our signature hands-on, team-based, and problem-solving approach to learning. "Core" embodies the rigors of mission-centric CNO development, with a curriculum that challenges and builds your capabilities in a battlefield-replica environment. Whether you're safeguarding national security or corporate interests, this course is the forge where your skills will be tempered for operational superiority.
Join us at BCI for an unmatched learning experience that goes beyond the conventional to prepare you for the front lines of cyber defense and offense. "Core" is not just a course; it's a commitment to excellence in the rapidly evolving realm of cyber warfare. Secure your spot now and emerge as a leader in the digital arena.
Curriculum Overview: Detailed Course Breakdown
Basic JQR Validation
This foundational module establishes a baseline for all participants, ensuring everyone possesses the critical skills necessary for advanced CNO development. You'll engage in rigorous assessment and calibration exercises that scrutinize your grasp of essential cybersecurity concepts, tools, and practices. This is a vital step in preparing you for the complex scenarios you will encounter later in the course.
Immerse yourself in the mission-centric approach to cyber operations. This detailed exploration covers the A-to-Z of mission planning: defining objectives, intelligence gathering, attack planning, execution, and mission analysis. Learn how to align technical operations with strategic objectives effectively, ensuring that every action taken in the cyber realm supports the overarching mission goals.
Project management within the cyber operations framework is uniquely challenging. This comprehensive segment is built to impart specialized project management skills that cater to the unpredictability and fluidity of the cyber warfare domain. You'll learn to navigate risk, manage cross-functional cyber teams, and ensure that your project stays resilient against the backdrop of cyber adversities.
Delve into the nuances of crafting software that is not just functional but battle-ready. This intensive module teaches you the principles of robust software engineering for CNO, emphasizing modular design, reliability, and maintainability under duress. You'll work on actual CNO development scenarios, learning to produce software that stands up to the tests of real-world application and adversary pressures.
Building secure programs is an art and a science. Here, you'll refine your ability to code with security at the forefront, preventing vulnerabilities from being introduced at the source. The course will cover defensive programming tactics, secure coding standards, and the use of advanced tools for code analysis and vulnerability scanning. By the end of this module, writing code that thwarts attackers will become second nature.
Advance your understanding of networking to a level where you can not only navigate but also manipulate complex network infrastructures. You'll gain deeper insights into protocol analysis, network security, and traffic engineering. Learn how to exploit network configurations and how to protect against such exploitation. This segment equips you to handle sophisticated network attacks and defense strategies, crucial for maintaining integrity and security in a high-threat cyber environment.
Embark on a deep dive into systems programming, an area where you will harness the full potential of computer systems. This segment focuses on low-level programming with an emphasis on memory management, process control, and system-level I/O operations. You'll learn to develop software that directly interacts with the kernel of the operating system, gaining the skills to create and manage powerful, efficient, and concurrent systems. Expect to gain a comprehensive understanding of how operating systems work, how to manipulate them, and how to build the resilient systems required in a hostile cyber environment.
Reverse engineering is a critical skill for any senior CNO developer. In this part of the course, you will unravel the complexities of analyzing software to discover its source code, architecture, and design, even without having the original documentation. This knowledge is indispensable for understanding malware, finding vulnerabilities in existing systems, and enhancing your defensive and offensive cyber capabilities. Through hands-on exercises, you'll learn various reverse engineering techniques and tools that will empower you to deconstruct and analyze software at a granular level. By mastering these skills, you will be better equipped to predict and counteract the actions of potential cyber adversaries.
Each topic in the "Core" course is an essential pillar in the CNO domain. By providing a comprehensive and detailed roadmap of cyber operations, Boston Cybernetics Institute ensures that every graduate is not just ready but highly proficient in tackling the most advanced cyber challenges in today's dynamic threat landscape.
Who Should Take This Course?
The "Core" Senior CNO Developer Course is meticulously crafted for the following professionals:
Experienced Cybersecurity Personnel: Individuals who have a solid foundation in cybersecurity practices and are looking to elevate their strategic and technical skills to a senior level.
Military Cyber Operators: Members of the US military's cyber forces who require advanced training in offensive and defensive cyber operations to secure national interests.
Security Team Leads: Leaders who oversee cybersecurity teams and need to deepen their technical understanding to guide complex security projects effectively.
IT Professionals Transitioning into Cybersecurity: IT experts aiming to pivot into cybersecurity roles and seeking a comprehensive, fast-tracked training to bridge the gap in knowledge.
Software Developers: Seasoned developers who wish to specialize in creating secure and robust software for high-stakes environments where security is non-negotiable.
Private Sector Cybersecurity Consultants: Consultants and contractors supporting government or corporate clients with cybersecurity solutions, where understanding the intersection of software engineering and security is crucial.
Incident Response Managers: Those who are at the front lines of responding to cyber incidents and need to predict, prevent, and mitigate sophisticated cyber attacks.
By the end of this course, participants will not only have enhanced their skill set but will also be uniquely equipped to tackle the challenges faced in high-threat cyber environments. Whether safeguarding state secrets or securing corporate data, graduates of "Core" will be the vanguards of their respective cyber arenas.
About Boston Cybernetics Institute
Boston Cybernetics Institute, PBC was created by former MIT Lincoln Lab cybersecurity researchers to give meaningful niche cyber instruction to a new generation of cybersecurity professionals.
We avoid the normal style of teaching with PowerPoint and lectures, opting to provide instead real-life engaging instruction that takes place in a customized environment. We have given our style of instruction to multiple DoD agencies, US commercial companies, and international companies.
Instructors at Boston Cybernetics Institute
President of the Boston Cybernetics Institute
Jeremy Blackthorne is a Lead Instructor at the Boston Cybernetics Institute (BCI). Before BCI, he was a researcher in the Cyber System Assessments group at MIT Lincoln Laboratory. Blackthorne is the co-creator and instructor for the Rensselaer Polytechnic Institute (RPI) courses: Modern Binary Exploitation, Spring 2015 and Malware Analysis, Spring 2013. Jeremy has published research at various academic and industry conferences. He served in the U.S. Marine Corps and is an alumnus of RPISEC. He holds a BS and MS in computer science. Blackthorne was an active member of the Student Security Club and CTF team, RPISEC, from 2012 to 2015, where he taught seminars on Reverse-Engineering, Exploitation, and various other Cybersecurity topics.
security researcher and instructor
Clark Wood is a security researcher and instructor at the Boston Cybernetics Institute (BCI), focusing on Reverse Engineering, Exploitation, and CI/CD. He recently built a Reverse-Engineering and Exploitation platform for a DoD customer and is the Lead Engineer for BCI’s Government Services. Clark was formerly on the technical staff at MIT Lincoln Laboratory where he was a member of the Cyber System Assessments Group. Clark holds a BA in Economics from the University of Florida, a BS and MS in Computer Science from Florida State University, and a Master’s in Technology and Policy from MIT.
security researcher and instructor
Rodolfo Cuevas is a security researcher and instructor at BCI, where he focuses on understanding how design constraints can be used to limit the impact of an attacker on a system. His research combines the adversarial mindset with approaches influenced by Systems and Control Theory. Rodolfo was a staff member at MIT Lincoln Laboratory and began his career as a RADAR and Ballistic Missile Defense System (BMDS) analyst. Later, Rodolfo transitioned to evaluating and Red-Teaming tactical and commercial cyber systems in support of DoD and other government programs. Rodolfo holds a BS, M.Eng., and M.S. in Electrical and Computer Engineering from Cornell University.
security researcher and instructor
Reed Porada is a security researcher and instructor at BCI, focused on getting to the "so what" of both defensive and offensive cyber measures. Reed also leads BCI training in Cyber Systems Analysis, focusing on developing systems-thinking skills of developers up to managers. Reed was a staff member at MIT Lincoln Laboratory for ten years, where he was responsible for Test and Evaluation, Test Automation Research, Red-Teaming of Cyber Systems, and Blue System Architectures. Reed was a computer scientist at the Naval Research Laboratory focused on wireless communication systems. He holds a BS in Computer Science from the University of Maryland, College Park and an MS in Software Engineering from Carnegie Mellon University.