Courses
Courses emphasize hands-on work, evidence-based thinking, and operational realism.
Firewall & Intrusion Detection Systems
Applied course focusing on firewalls, IPS/IDS technology, TCP/IP and OSI models, attack traffic analysis, and network-based and host-based security systems.
Topics
- Windows, Linux, Check Point and Cisco firewalls
- Network firewalls (pfSense)
- Signature-based NIDS
- SIEM architecture and threat hunting
Windows Security
Advanced system administration focusing on operating systems, servers, file systems authentication, user support services, and Active Directory environments.
Topics
- User and group administration
- Active Directory and GPO
- Server and workstation integration
- Backup and restoration strategies
Linux Systems
Essential knowledge and skills to implement, administer, and troubleshoot servers in a networked environment. Operating system concepts, file systems, authentication, and user support services.
Topics
- User and group administration
- DHCP and DNS
- SSH and backup strategies
- Integrated mass storage technologies
Cyber Defense I
Covers cryptographic tools and algorithms, types of malicious software, forms of attacks, software security, and secure coding principles.
Topics
- Cryptographic systems and attacks
- Malicious software analysis
- Attack detection and signatures
- Secure coding principles
Network Security
Introduction to fundamentals of computer and network security, security laws and ethics, vulnerability identification, attack forms, countermeasures, and detection/defense techniques.
Topics
- Vulnerability identification
- Attack forms and countermeasures
- Hardware, software, and data security
- Physical security
Penetration Testing
Focuses on recognizing potential cyber attackers and identifying vulnerabilities through vulnerability analysis tools. Covers auditing, monitoring, incident response, and system recovery.
Topics
- Vulnerability analysis tools
- Security log analysis
- Incident response and handling
- System recovery procedures
Computer Networks
Advanced computer network architectures, protocols, and programming. Overview of data communication and networking from classic to modern perspectives, emphasizing design principles.
Topics
- OSI seven layers
- Protocol and topology design
- Network control
- Modern wireless integration
Network Systems
Standards and technologies for inter-network structures supporting TCP/IP data streams. Introduces LAN and WAN, covering TCP/IP, OSI models, cabling, switches, routers, and subnetting.
Topics
- TCP/IP and OSI models
- Switches and routers
- Subnetting
- Initial switch and router configuration
Incident Response
Standards and technologies for organizational structures supporting IT incident response, business continuity, and disaster recovery. Covers planning concepts, tools, and techniques.
Topics
- Incident response planning
- Business continuity planning
- Disaster recovery planning
- Attack traffic analysis
Classroom-Tested Lab Exercises
Labs built to feel like real work: clear asks, real constraints, and deliverables you can grade. Each lab is designed to produce something tangible: a diagram, a ruleset, a short report, a detection rule, or a validated change.
Clear Objectives
Students know what "done" looks like
Explicit Constraints
Assume legacy systems and limited time
Reproducible Setup
Reset-friendly for instructors
Concrete Deliverables
Grading-friendly artifacts
OT Network Segmentation Baseline
Students start with a "flat" environment, identify what must communicate, define zones, then implement minimum viable segmentation without breaking required traffic.
Zone diagram, ruleset export, short "what broke / how fixed it" note
Telemetry First: What Should You Log?
Students decide what visibility is required before enforcing controls. The focus is building a defensible logging plan that supports investigation and change validation.
Log source list, sample events, brief justification for each source
Active Directory Least Privilege Audit
Students identify over-privileged accounts and groups, propose safer access paths, implement changes, then validate that required access still works.
Before/after access report, change log, validation notes
Requirements → Plan
Turning messy requirements into a clear technical plan
Safe Changes
Making changes safely (measure → change → verify)
Evidence-Based Decisions
Explaining decisions with evidence instead of guesswork
Professional Documentation
Documenting outcomes like a junior analyst or engineer would
Labs are not puzzles with hidden tricks.
They are simulations of real work: incomplete information, imperfect systems, and limited time.