The Chiron Experience
Chiron's training is built around measurable performance.
Students work inside live adversarial lab environments that require them to think, execute, and adapt under pressure. Every course is designed around real job functions and operational relevance. Our instructors are experienced operators who have served in Information Operations domain roles and understand what competent performance looks like in practice.
We evaluate success by a simple standard: can the student perform on the keyboard?
Our programs develop practitioners who understand how systems function, how adversaries operate, and how to apply technical skills to protect real environments.
MODES OF DELIVERY
- Instructor-Led Training (ILT)
- Virtual Instructor-Led Training (VILT)
- Asynchronous Training (ASYNC)
All formats maintain the same lab rigor and performance focus.
TRAINING LEVELS & PROFICIENCY MODEL
Chiron training tracks follow a structured progression of proficiency levels:
- Basic - Establishes foundational understanding and guided execution of core tasks.
- Intermediate - Expands technical depth, increases complexity, and develops independent problem solving.
- Advanced - Requires sustained performance in complex environments and integration across systems and domains.
- Expert - Identifies courses that require significant prerequisite knowledge and technical maturity prior to enrollment.
Most Chiron tracks intentionally conclude at the Advanced level because mastery is developed through real-world experience. Expertise grows through operational repetition, adaptation, and accountability in live environments. No training program can grant it outright.
When a course is designated as Expert, it reflects the level of preparation required to participate. It does not imply that expertise is achieved upon completion. These courses demand deep understanding of operating system internals, programming, and low-level technical concepts before a student ever begins.
Chiron develops professionals capable of operating at an advanced level and prepared to pursue mastery through continued application.
CHIRON SKILL DEVELOPMENT TRACKS
Tracks represent capability groupings rather than mandatory sequences. Course selection is aligned to work role, proficiency level, and mission requirements.
Cyber Core (CYB)
Cyber Core (CYB) serves as the technical foundation for all Chiron training tracks.
CYB is a structured progression of courses that build the baseline knowledge and hands-on skill required to operate in any cyber domain. Students develop fluency in operating systems, networking, authentication, cryptography, system configuration, and foundational security concepts.
The focus is on developing technical understanding and the ability to reason through system behavior. CYB prepares students to move into specialized tracks with confidence and technical depth.
Course DescriptionsCourses
View all CYB coursesNetwork Fundamentals (NETFUND)
The Networking Fundamentals course introduces core networking concepts, protocols, and analysis techniques required to understand how data moves across modern networks. Students develop foundational knowledge of network architectures, addressing, routing, and common protocols while gaining hands-on experience analyzing packet-level traffic. Emphasis is placed on practical interpretation of network behavior using packet analyzers, protocol inspection, and … Continue reading "Network Fundamentals (NETFUND)"
Linux Fundamentals (LINFUND)
The Linux Fundamentals course provides a structured introduction to the Linux operating system with emphasis on command-line interaction, process management, filesystem structure, networking, logging, and security fundamentals. Students develop practical familiarity with Linux systems through hands-on labs that reinforce navigation, file management, process inspection, account and permission management, and basic scripting. The course establishes a … Continue reading "Linux Fundamentals (LINFUND)"
Windows Fundamentals (WINFUND)
The Windows Fundamentals course provides a structured introduction to the Windows operating system with emphasis on core components, filesystem architecture, networking, and security mechanisms. Students develop practical familiarity with Windows internals through hands-on labs that reinforce command-line navigation, registry interaction, process inspection, and basic security analysis. The course is designed to establish a strong operational … Continue reading "Windows Fundamentals (WINFUND)"
Defensive Operations (CND)
The Defensive Operations (CND) track develops professionals responsible for protecting, stabilizing, and sustaining enterprise environments.
This track includes a range of courses delivered at increasing levels of technical depth. Courses build capability in system hardening, configuration integrity, vulnerability management, monitoring architecture, and structured incident response.
CND provides modular capability development aligned to specific roles and mission requirements. Students engage at the level appropriate to their background and operational need.
Graduates of CND courses understand defensive architecture at the systems level and can implement controls that measurably strengthen security posture.
Course DescriptionsCourses
View all CND coursesBasic Secure Configuration of Operating Systems (BSCOS)
The Basic Secure Configuration of Operating Systems course is a two-day, entry-level course focused on multi-platform secure system configuration. Students learn the tools, techniques, and procedures necessary to reduce attack surface, mitigate vulnerabilities, and apply organizational security policies across Windows and Linux systems. The course emphasizes procedural execution using provided guidance, including STIGs and IAVAs, … Continue reading "Basic Secure Configuration of Operating Systems (BSCOS)"
Basic Security Fundamentals (BSF)
The Basic Security Fundamentals course introduces core concepts, terminology, and technologies that underpin modern cybersecurity operations. Students gain foundational understanding of information assurance principles, security policies, cryptography, access control, operating system hardening, and common security technologies. The course emphasizes practical exposure to Windows and Linux environments, administrative tooling, and defensive mechanisms to build a strong … Continue reading "Basic Security Fundamentals (BSF)"
Linux Hardening (LINHARD)
The Linux Hardening course provides hands-on instruction in securing Linux systems through policy enforcement, access control, service hardening, auditing, and system monitoring. Students learn to configure authentication mechanisms, enforce least privilege, harden boot and runtime environments, secure network services, and establish logging and auditing pipelines to support defensive operations. Emphasis is placed on practical configuration, … Continue reading "Linux Hardening (LINHARD)"
Offensive Operations (CNE)
The Offensive Operations (CNE) track develops professionals who identify and exploit systemic weaknesses in enterprise networks.
Courses within this track span increasing technical complexity and cover reconnaissance, exploitation, privilege escalation, lateral movement, and post exploitation operations in controlled enterprise environments.
CNE supports distinct work roles and mission functions. Training is selected based on operational requirements and existing proficiency rather than completion of an entire sequence.
CNE develops disciplined operators who understand how compromise occurs at a technical level and can demonstrate risk in a way that drives defensive improvement.
Course DescriptionsCourses
View all CNE coursesBasic Computer Network Exploitation (BCNE)
The Basic Computer Network Exploitation course introduces foundational offensive security concepts and techniques through hands-on exploitation of Windows and Linux systems in controlled environments. Students learn how attackers perform reconnaissance, gain initial access, escalate privileges, maintain persistence, and move within a network. The course emphasizes command-line proficiency, structured tradecraft, and repeatable workflows rather than advanced … Continue reading "Basic Computer Network Exploitation (BCNE)"
CNE Fundamentals and Offensive OSINT (CFOO)
CNE Fundamentals and Offensive OSINT introduces students to foundational computer network exploitation concepts with a strong emphasis on offensive open-source intelligence (OSINT) and target development. The course teaches students how attackers collect, analyze, and operationalize publicly available information to support reconnaissance, targeting, and exploitation activities. Students progress from OSINT tradecraft and intelligence development to basic … Continue reading "CNE Fundamentals and Offensive OSINT (CFOO)"
Basic Cyber Exploitation Analysis (BCEA)
The Basic Cyber Exploitation Analysis course provides foundational pipeline training for personnel entering an exploitation analyst work role. The course emphasizes structured operational processes, mission analysis, information gathering, target profiling, and exploitation support activities. Students learn how exploitation operations are planned, supported, executed, and documented within a governed cyber operations environment. Instruction blends conceptual understanding … Continue reading "Basic Cyber Exploitation Analysis (BCEA)"
Detection & Threat Hunting (DET)
The Detection & Threat Hunting (DET) track develops professionals who identify malicious activity within active enterprise environments.
This track includes courses at progressive levels of depth in telemetry analysis, investigative methodology, behavioral detection, and adversary tradecraft mapping.
DET supports role-specific capability development. While course difficulty increases, participation is aligned to mission needs rather than completion of an entire sequence.
DET practitioners develop the ability to identify adversary behavior and translate investigative findings into improved detection engineering.
Course DescriptionsCourses
View all DET coursesBasic Computer Forensics (BCF)
Basic Computer Forensics introduces foundational concepts and practical skills for collecting, preserving, and analyzing digital evidence from computer systems. Students learn how forensic investigations are conducted, how common attack vectors leave artifacts, and how data is acquired and examined in a forensically sound manner. The course emphasizes disk structure, file systems, deleted data, and core … Continue reading "Basic Computer Forensics (BCF)"
Intermediate Computer Forensics (ICF)
Intermediate Computer Forensics builds upon foundational forensic skills to develop deeper investigative capability across storage media, memory, file systems, and user activity artifacts. Students learn to conduct structured forensic investigations involving disk imaging, memory acquisition and analysis, file and partition recovery, artifact correlation, and evidence reporting. The course emphasizes analytical decision-making, evidence correlation across sources, … Continue reading "Intermediate Computer Forensics (ICF)"
Intermediate Incident Response (IIR)
The Intermediate Incident Response course develops hands-on skills for identifying, investigating, and responding to security incidents in enterprise environments. Students learn to apply structured incident response methodology to real-world intrusions affecting Windows and Linux systems, including unauthorized access, malware execution, persistence, and lateral movement. The course emphasizes evidence handling, live response, artifact analysis, timeline reconstruction, … Continue reading "Intermediate Incident Response (IIR)"
Cyber Software Development (CSD)
The Cyber Software Development (CSD) track develops professionals who operate at the intersection of programming and low-level system behavior.
This track builds disciplined technical depth in Python, PowerShell, and systems-level development, with emphasis on understanding how software interacts with operating systems, memory, and execution flow. Courses progress from scripting and automation fundamentals to advanced concepts in debugging, reverse engineering, and exploit construction.
CSD emphasizes precision and technical control. Students learn to write reliable code, analyze program behavior, manipulate execution paths, and understand vulnerabilities at a structural level.
The track culminates in exploit development, where participants apply their understanding of operating system internals, memory management, and programming logic to build working exploits in controlled environments.
Course DescriptionsCourses
View all CSD coursesPowerShell Bootcamp (POBO)
PowerShell Bootcamp provides foundational scripting skills for automating tasks, interacting with Windows systems, and building reusable command-line tooling using PowerShell. Students learn core scripting constructs including variables, data types, flow control, functions, error handling, and interaction with the Windows operating system. The course emphasizes hands-on scripting, structured problem-solving, and safe scripting practices rather than advanced … Continue reading "PowerShell Bootcamp (POBO)"
Python Programming (PYPRO)
Python Programming develops intermediate-level scripting and software development skills using Python for automation, data handling, and system interaction. Students build upon basic programming concepts to write structured Python code using strings, collections, functions, modules, file input/output, networking, and object-oriented design. The course emphasizes readable code, modular design, error handling, and practical scripting workflows applicable to … Continue reading "Python Programming (PYPRO)"
Intermediate Computer Exploitation Development (ICED)
The Intermediate Computer Exploitation Development course introduces students to foundational exploit development concepts through hands-on construction and analysis of memory corruption–based exploits in Linux and Windows environments. The course focuses on understanding how vulnerabilities manifest at the binary and memory level, how shellcode and staged payloads are developed, and how common defensive mechanisms are bypassed. … Continue reading "Intermediate Computer Exploitation Development (ICED)"