Senior CNO Developer Course: Infrastructure
top of page

Course Description

Embark on a transformative journey with Boston Cybernetics Institute's Senior CNO Developer Course, titled "Infrastructure." This intensive 35-day program is meticulously designed for cybersecurity professionals who aspire to master the art and science of cyber operations within the realms of systems engineering, administration, and beyond.


Our curriculum bridges the gap between advanced theoretical concepts and their practical applications in both the private sector and the critical domain of US military operations. Participants will delve into the intricacies of Networking, Distributed Systems, and Security, ensuring a comprehensive understanding of the digital landscape.


Moreover, the course goes a step further by offering hands-on experience in Infrastructure Automation and Cloud Architecture, equipping professionals with the knowledge to architect robust systems that can withstand the tactics of modern adversaries. As the cyber battleground evolves, so does the need for software that not only performs but survives and thrives under duress. Our training is geared towards fortifying your capabilities to develop and manage infrastructures that promise Operational Effectiveness, Suitability, and Survivability.


Designed and delivered by DoD-experienced educators, our hands-on keyboard approach, coupled with the principles of Capture-the-Flag exercises, ensures that the learning experience is as real-world as it gets. You will be challenged, but never overwhelmed, as you engineer solutions that are not just effective but also resilient against the most sophisticated threats.


Join us at Boston Cybernetics Institute, where you will not just learn to anticipate the challenges of tomorrow but also to shape the cybersecurity infrastructure of the future. Whether for safeguarding national security or advancing corporate cybersecurity, "Infrastructure" is your strategic investment in becoming an undisputed leader in the field of CNO development.


Curriculum Overview: Detailed Course Breakdown


Systems Engineering

Our Systems Engineering module is tailored to arm you with the prowess to design, integrate, and manage complex systems over their life cycles. Focusing on the cybersecurity aspect, we emphasize secure systems engineering principles that form the bedrock of reliable and resilient infrastructure. You'll engage with the latest methodologies in threat modeling, risk assessment, and security design, ensuring that every system you architect is robust against both current and emerging cyber threats. We dive deep into the interplay between system components to ensure you can create not just functional but also intrinsically secure systems.


Systems Administration

The Systems Administration section of the course is far from your standard IT training. Here, you will learn to fortify servers, workstations, and networks against advanced threats. We cover the criticality of patch management, privilege escalation prevention, and system hardening. This module is not just about maintaining systems; it's about securing them. You'll gain insight into the latest adversarial tactics and learn how to implement proactive defenses to ensure system integrity, confidentiality, and availability in the face of cyber warfare.


Networking

Networking in the realm of cyber operations is a battleground of its own. Our networking curriculum takes you beyond the basics into the security-focused architecture of network design. You'll study the construction of resilient networks that can sustain and repel cyber-attacks, exploring concepts like secure routing, segmentation, and intrusion detection systems. We dissect protocols, not just for functionality but for vulnerabilities, equipping you with the ability to design, implement, and secure complex networking infrastructures against sophisticated network-based attacks.


Distributed Systems

Distributed Systems are at the core of modern computing environments, and understanding their security is paramount. In this course, we cover the principles of creating and managing distributed architectures with an eye for security and scalability. Learn how to construct systems that not only perform efficiently but also maintain integrity and security when spread across multiple nodes and networks. Explore fault tolerance, consensus algorithms, and the challenges of synchronization, all while maintaining a laser focus on the cybersecurity aspects that will keep a distributed system secure in a hostile environment.


Security

Security is not a single topic but a thread that weaves through every aspect of this course. However, in the Security module, we hone in on the advanced defensive and offensive techniques that make or break the safety of our cyber infrastructure. We cover encryption, endpoint protection, behavioral analytics, and advanced persistent threats (APT). You will learn the strategies for building a comprehensive security posture that includes not just technological solutions but also addresses policy, procedure, and human factors.


Infrastructure Automation

In the Infrastructure Automation segment, the aim is to teach you how to scale security practices through automation. By automating repetitive tasks, you can focus on strategic security concerns. We will walk you through automating the deployment, management, and operation of secure infrastructures. You'll learn scripting and coding practices to automate security tasks such as compliance checks, threat hunting, and incident response. This module will empower you to build and maintain secure and efficient systems that keep pace with the rapid evolution of the cyber landscape.


Cloud Architecture

The Cloud Architecture module is designed to provide you with the knowledge to securely leverage the power of the cloud. As more organizations migrate to cloud environments, understanding the security implications is critical. We dissect the architecture of cloud services from the cybersecurity lens, focusing on cloud-specific threats and defenses. From the configuration of secure virtual networks to the implementation of cloud security postures that comply with industry standards and regulations, you'll be equipped to architect, deploy, and secure cloud infrastructures against sophisticated cyber threats.


Who Should Take This Course?

This comprehensive course is meticulously crafted for IT professionals who aspire to deepen their expertise in the field of systems and network security. It is ideally suited for:

  • Systems Engineers looking to incorporate security best practices into their system design and management workflows.

  • Network Administrators and IT Managers who must secure complex network infrastructures against escalating cyber threats.

  • Systems Administrators seeking to enhance their security skills to better protect critical information assets.

  • Cybersecurity Enthusiasts and aspiring professionals who want a deep dive into practical security measures across various IT domains.

  • Software Developers interested in understanding the security implications of distributed systems and cloud-based architectures.

  • DevOps Professionals who aim to integrate security into their automation and continuous integration/continuous deployment (CI/CD) pipelines.

  • Cloud Architects and engineers who are tasked with the design and deployment of secure cloud services.

  • Security Consultants looking to update their knowledge with the latest trends and techniques in infrastructure security.


Whether you're aiming to fortify your current role with cutting-edge cybersecurity knowledge or transitioning into a security-focused position, this course will equip you with the critical skills needed to succeed in today’s cyber-centric IT landscape. If you have a foundational understanding of IT systems and a passion for cybersecurity, this course is your gateway to the next level of professional competence.

About Boston Cybernetics Institute

Boston Cybernetics Institute, PBC was created by former MIT Lincoln Lab cybersecurity researchers to give meaningful niche cyber instruction to a new generation of cybersecurity professionals.

 

We avoid the normal style of teaching with PowerPoint and lectures, opting to provide instead real-life engaging instruction that takes place in a customized environment. We have given our style of instruction to multiple DoD agencies, US commercial companies, and international companies.

BCI_LOGO_FINAL_Seal_Black-MOD2.png

Instructors at Boston Cybernetics Institute

Jeremy Blackthorne.png

Jeremy Blackthorne

President of the Boston Cybernetics Institute

Jeremy Blackthorne is a Lead Instructor at the Boston Cybernetics Institute (BCI). Before BCI, he was a researcher in the Cyber System Assessments group at MIT Lincoln Laboratory. Blackthorne is the co-creator and instructor for the Rensselaer Polytechnic Institute (RPI) courses: Modern Binary Exploitation, Spring 2015 and Malware Analysis, Spring 2013. ​Jeremy has published research at various academic and industry conferences. He served in the U.S. Marine Corps and is an alumnus of RPISEC. He holds a BS and MS in computer science. ​ Blackthorne was an active member of the Student Security Club and CTF team, RPISEC, from 2012 to 2015, where he taught seminars on Reverse-Engineering, Exploitation, and various other Cybersecurity topics.

Clark-Wood.jpg

Clark Wood

security researcher and instructor

Clark Wood is a security researcher and instructor at the Boston Cybernetics Institute (BCI), focusing on Reverse Engineering, Exploitation, and CI/CD. He recently built a Reverse-Engineering and Exploitation platform for a DoD customer and is the Lead Engineer for BCI’s Government Services. Clark was formerly on the technical staff at MIT Lincoln Laboratory where he was a member of the Cyber System Assessments Group. ​Clark holds a BA in Economics from the University of Florida, a BS and MS in Computer Science from Florida State University, and a Master’s in Technology and Policy from MIT. ​

Rodolfo.png

Rodolfo Cuevas

security researcher and instructor

Rodolfo Cuevas is a security researcher and instructor at BCI, where he focuses on understanding how design constraints can be used to limit the impact of an attacker on a system. His research combines the adversarial mindset with approaches influenced by Systems and Control Theory. ​ Rodolfo was a staff member at MIT Lincoln Laboratory and began his career as a RADAR and Ballistic Missile Defense System (BMDS) analyst. Later, Rodolfo transitioned to evaluating and Red-Teaming tactical and commercial cyber systems in support of DoD and other government programs. ​ Rodolfo holds a BS, M.Eng., and M.S. in Electrical and Computer Engineering from Cornell University.

Reed-Porada.jpg

Reed Porada

security researcher and instructor

Reed Porada is a security researcher and instructor at BCI, focused on getting to the "so what" of both defensive and offensive cyber measures. Reed also leads BCI training in Cyber Systems Analysis, focusing on developing systems-thinking skills of developers up to managers. ​Reed was a staff member at MIT Lincoln Laboratory for ten years, where he was responsible for Test and Evaluation, Test Automation Research, Red-Teaming of Cyber Systems, and Blue System Architectures. Reed was a computer scientist at the Naval Research Laboratory focused on wireless communication systems. He holds a BS in Computer Science from the University of Maryland, College Park and an MS in Software Engineering from Carnegie Mellon University.

Senior CNO Developer Course: Infrastructure

Cyber-security-course.png

COURSE PRICE

Upon request

COURSE LENGTH:

35 days

What happens after I click the button?

Your default e-mail client will pop up and you'll be asked to write us a short message. Please let us know which course you are interested in and what dates would work for you.

Anchor 1
bottom of page