Training

ADVANCED CYBERSECURITY TRAINING

R9B employs Top Secret (TS) cleared instructors and subject matter experts in the field of advanced computer network operations.

OUR TRAINING AREAS INCLUDE:

  • Advanced Cyber Operations
  • HUNT Methodologies
  • Computer Network Exploitation for Defenders

  • Advanced Computer Network Exploitation for Defenders
  • Windows Fundamentals
  • Firewall Exploitation and Administration for Defenders

  • Computer Forensics In-depth
  • Malware Analysis
  • Network Defense Administration
  • Wireless Exploitation and Attack for Defenders

  • Mobile Device Exploitation and Forensics
  • Windows Network Administration
  • Industrial Control System Protection
  • Linux Fundamentals

CYBERSECURITY TRAINING COURSES

R9B understands the cognitive aspects of cyber operations. Our curriculum provides the hands-on technical skills students require to attain a variety of advanced cybersecurity qualifications. We instill the knowledge, skills, and abilities necessary for our students to defeat the adversary. Below are our available courses. Please check back often as our course offerings are updated regularly. Government organizations, please contact R9B directly via training@root9B.com for pricing and purchasing information.

Adversary Tactics and Techniques

R9B Adversary Tactics and Techniques (ATT) is an intense, five-week, hands-on course. Students learn the methodology and technical details of how attackers recon, gain access to, pivot, and remain hidden within a target network. They learn how their own actions may leave behind artifacts alerting attackers […] Learn More

Cyber Threat Intelligence Analysis

This five-day, instructor-led training course teaches network defenders to collect, analyze, and apply targeted cyber intelligence to defensive operations. The instruction provided enables students to proactively act on and adapt to sophisticated attacks by cyber adversaries. The limited signature and heuristic analysis capabilities […] Learn More

HUNT Certification – Windows

HUNT Certification – Windows is the first of three courses in R9B’s HUNT Certification program. R9B designed this course to train cybersecurity professionals to actively defend critical Windows systems. The course exposes students to a “think like the adversary” mindset to actively detect sophisticated and tailored adversary attacks. This course prepares cybersecurity professionals to HUNT […] Learn More

HUNT Certification – Linux

R9B designed the second course in the HUNT Certification program to train cybersecurity professionals to actively defend critical Linux systems and infrastructure. This five-day advanced course exposes students to a “think like the adversary” mindset to actively pursue and detect adversary activity targeting Linux-based systems. This course, when combined with the other two phases […] Learn More

HUNT Certification – Network

R9B designed the third course in the HUNT Certification program to train cybersecurity professionals to collect and analyze data from a network beyond single node analysis. This five-day advanced course exposes students to a “think like the adversary” mindset in order to actively pursue and detect adversary activity targeting network-based systems and infrastructure. When combined with the other two phases […] Learn More

Intelligence Led Digital Forensics Incident Response

Threat Intelligence provides crucial defense posturing for proactive defense against malicious actors. The application of the intelligence processes to reactive incident response protocols offers valuable insight and context into the likely threat vector, the stage of the attack plan, and the motive of a cyber adversary. This threat insight and attack context significantly reduces […] Learn More

Powershell Foundations For Cyber Operations

PowerShell is one of most recognized and prevailing tools provided by Microsoft. Network defenders and aggressors realize the value of PowerShell and have incorporated PowerShell into their standard tactics. This course cultivates a foundation in PowerShell for those students with little to no experience […] Learn More

Human-Led. Technology-Accelerated.

Email Call 719.368.3677
R9B Cybersecurity Training

Building the Foundation

  • ATT - Adversary Tactics and Techniques [5 weeks]
  • CTIA - Cyber Threat Intelligence Analysis [1 week]
  • HUNT [Windows] [1 week]
  • HUNT [Linux] [1 week]
  • HUNT [Networks] [1 week]
  • HUNT Certification Program
  • Advanced Cybersecurity Training

Calendars

THE LEADERS IN HUNT

Securing the commercial sector since 2013