Advanced CyberSecurity Training

R9B employs Top Secret (TS) cleared instructors and subject matter experts in the field of advanced computer network operations.


  • Advanced Cyber Operations
  • HUNT Methodologies
  • Computer Network Exploitation for Defenders

  • Advanced Computer Network Exploitation for Defenders
  • Windows Fundamentals
  • Firewall Exploitation and Administration for Defenders

  • Computer Forensics In-depth
  • Malware Analysis
  • Network Defense Administration
  • Wireless Exploitation and Attack for Defenders

  • Mobile Device Exploitation and Forensics
  • Windows Network Administration
  • Industrial Control System Protection
  • Linux Fundamentals

R9B - Training Map
Hawaii Colorado Texas Maryland

R9B Cybersecurity Training

Building the Foundation


R9B understands the cognitive aspects of cyber operations. Our curriculum provides the hands-on technical skills students require to attain a variety of advanced cybersecurity qualifications. We instill the knowledge, skills, and abilities necessary for our students to defeat the adversary. Below are our available courses. Please check back often as our course offerings are updated regularly. Government organizations, please contact R9B directly via for pricing and purchasing information.

Adversary Tactics and Techniques

R9B’s Adversary Tactics and Techniques course is an intense 5-week hands-on course that teaches students the methodology and technical details of how attackers recon, gain access to, pivot, and remain hidden within a target network, and any artifacts their actions may leave behind. Whether they’re on a path to become pen-testers, red team members, or cyber hunters, the Adversary Tactics and Techniques course prepares students […] Learn More

Cyber Threat Intelligence Analysis

This five (5)-day Instructor-Led Training (ILT) course teaches network defenders to collect, analyze and apply targeted cyber intelligence to defensive operations in order to proactively act on and adapt to sophisticated and dedicated attacks by cyber adversaries. As malicious software incorporates more advanced counter-detection techniques, the limited signature and heuristic analysis capabilities of anti-virus software and Intrusion Detection and Prevention Systems (IDS/IPS) […] Learn More

HUNT Certification – Methodology

HUNT Certification – Methodology provides a baseline level of knowledge designed to train cybersecurity professionals to actively defend critical computer systems. The course exposes students to a “think like the adversary” mindset to actively detect sophisticated and tailored adversary attacks. This course prepares cybersecurity professionals to HUNT within their network for evidence of adversary presence not previously detected by automated enterprise security devices and software. […] Learn More

HUNT Certification – Windows

The first of three courses in R9B’s HUNT Certification program is designed to train cybersecurity professionals to actively defend critical Windows systems. The course exposes students to a “Think like the Adversary” mindset in order to actively detect sophisticated and tailored adversary attacks. This course establishes the foundation upon which the R9B HUNT Certification is […] Learn More

Python for Cyber Operations

Python for Cyber Operations teaches students how to create Python scripts that solve problems in many environments. The course provides a solid foundation in Python concepts and builds on that foundation to enable students to develop scripts and programs to automate processes, build utilities and network applications. […] Learn More

Powershell Foundations For Cyber Operations

PowerShell has become one of most recognized and prevailing tools provided by Microsoft. Network Defenders and Aggressors have also realized the value of PowerShell and now have incorporated PowerShell into their standard tactics. This course is meant to train those who have little to no experience in PowerShell and make them proficient enough to learn on their own. […] Learn More

Advanced Protocol Analysis

Advanced Protocol Analysis (APA) Cybersecurity Training gives students the knowledge and skills to evaluate individual packets as well as full network traffic captures for malicious traffic. […] Learn More

Mobile Network Vulnerability and Analysis

The mobile network vulnerability training course is designed to take a novice operator from knowing very little about mobile networks to broad knowledge of several different network varieties as well as their potential flaws in relation to mobile network cybersecurity. The student will learn everything from radio and signaling characteristics, to launching a reconnaissance capability on an adversary’s network. […] Learn More

Industrial Control Systems

This is a hands-on introductory course into the basic to intermediate understanding of Industrial Control Systems (ICS). The students will be exposed to the typical modern automation systems implemented throughout the world. This course will begin with a brief history of ICS and how it grew into the modern automation systems of today. Virtually every modern industrial facility contains a control network of Programmable Logic Controllers (PLC) and Human Machine Interfaces (HMI). […] Learn More