The Chiron Experience
Chiron's Cybersecurity Training methodology facilitates critical thinking by immersing students in live adversarial emulation scenarios which forces a student to perform, practice and develop skills for a specific job role. Chiron's team of subject matter experts have years of experience performing in the Domain Roles within Information Operations Teams. This allows Chiron's training to focus on the known skills needed by individuals or teams operating and defending key assets of an organization. Chiron's training portfolio is not centered on knowledge based multiple choice exams. We value and pride our success by developing students who can perform with skill on the job, not by measuring a student by how well they can define a term or recite a theory.
MODES OF DELIVERY
- Instructor Led Live Training (ILT)
- Asynchronous Training (ASYNC)
- Virtual Instructor Live Training (VILT)
Cyber Core (CYB)
While Cyber Core is not a "domain", it is a critical component of the learning and development process of IO Professionals. Cyber Core is a base requirement needed to successfully operate within the specific domain areas of Cyber Protection, Threat Emulation, Discovery and Counter-Infiltration, or Developer. Core skills are being recognized as a major learning gap in the development of IO professionals when transitioning from other IT Functions or having knowledge competency without time on the keyboard. The core provides the critical technical skills foundation for any IO professional or aspiring technical administration professional since it focuses on "how things work" and starts the process of critical thinking from a technical point of view opposed to knowledge, policy and definition memorization.
Course DescriptionsCourses
View all CYB™ coursesNetwork Fundamentals (NETFUND)
The Networking Fundamentals course introduces core networking concepts, protocols, and analysis techniques required to understand how data moves across modern networks. Students develop foundational knowledge of network architectures, addressing, routing, and common protocols while gaining hands-on experience analyzing packet-level traffic. Emphasis is placed on practical interpretation of network behavior using packet analyzers, protocol inspection, and … Continue reading "Network Fundamentals (NETFUND)"
Linux Fundamentals (LINFUND)
The Linux Fundamentals course provides a structured introduction to the Linux operating system with emphasis on command-line interaction, process management, filesystem structure, networking, logging, and security fundamentals. Students develop practical familiarity with Linux systems through hands-on labs that reinforce navigation, file management, process inspection, account and permission management, and basic scripting. The course establishes a … Continue reading "Linux Fundamentals (LINFUND)"
Windows Fundamentals (WINFUND)
The Windows Fundamentals course provides a structured introduction to the Windows operating system with emphasis on core components, filesystem architecture, networking, and security mechanisms. Students develop practical familiarity with Windows internals through hands-on labs that reinforce command-line navigation, registry interaction, process inspection, and basic security analysis. The course is designed to establish a strong operational … Continue reading "Windows Fundamentals (WINFUND)"
Defensive Operations (CND)
The mission of the Defensive Operations (CND) is to use the methodologies and processes of "Blue Teams" to proactively secure and defend information assets. CND members are highly skilled and versed in the tools, techniques and procedures to identify, protect and evaluate information systems and supporting technologies. CND teams perform various tasks related to protecting information and information systems such as verifying network base-lines and systems configurations, performance evaluations of anti-virus and intrusion detection systems and architectures, performing host-based assessments identifying vulnerabilities and anomalies that are outside of established base-line configurations and provide recommendations for and in some cases persistent monitoring of network performance. CND team members develop and implement incident response plans and develop and apply risk mitigation strategies that enhance the overall security, defense and recovery posture of the network.
Course DescriptionsCourses
View all CND™ coursesBasic Secure Configuration of Operating Systems (BSCOS)
The Basic Secure Configuration of Operating Systems course is a two-day, entry-level course focused on multi-platform secure system configuration. Students learn the tools, techniques, and procedures necessary to reduce attack surface, mitigate vulnerabilities, and apply organizational security policies across Windows and Linux systems. The course emphasizes procedural execution using provided guidance, including STIGs and IAVAs, … Continue reading "Basic Secure Configuration of Operating Systems (BSCOS)"
Basic Security Fundamentals (BSF)
The Basic Security Fundamentals course introduces core concepts, terminology, and technologies that underpin modern cybersecurity operations. Students gain foundational understanding of information assurance principles, security policies, cryptography, access control, operating system hardening, and common security technologies. The course emphasizes practical exposure to Windows and Linux environments, administrative tooling, and defensive mechanisms to build a strong … Continue reading "Basic Security Fundamentals (BSF)"
Linux Hardening (LINHARD)
The Linux Hardening course provides hands-on instruction in securing Linux systems through policy enforcement, access control, service hardening, auditing, and system monitoring. Students learn to configure authentication mechanisms, enforce least privilege, harden boot and runtime environments, secure network services, and establish logging and auditing pipelines to support defensive operations. Emphasis is placed on practical configuration, … Continue reading "Linux Hardening (LINHARD)"
Offensive Operations (CNE)
The mission of the Offensive Operations (CNE) is to emulate the adversary. The CNE performs its mission by coupling an in-depth understanding of the behaviors and techniques utilized by the threat in concert with advanced exploitation techniques to perform penetration tests. CNEs utilize the methodologies of the adversary to conduct Open Source Information Gathering (OSINT), scanning and enumeration, network mapping, exploitation to gain access to and remain persistent within networks. The goal of the CNE is to identify those areas of weakness within a network and provide those findings to the CND for mitigation.
Course DescriptionsCourses
View all CNE™ coursesBasic Computer Network Exploitation (BCNE)
The Basic Computer Network Exploitation course introduces foundational offensive security concepts and techniques through hands-on exploitation of Windows and Linux systems in controlled environments. Students learn how attackers perform reconnaissance, gain initial access, escalate privileges, maintain persistence, and move within a network. The course emphasizes command-line proficiency, structured tradecraft, and repeatable workflows rather than advanced … Continue reading "Basic Computer Network Exploitation (BCNE)"
CNE Fundamentals and Offensive OSINT (CFOO)
CNE Fundamentals and Offensive OSINT introduces students to foundational computer network exploitation concepts with a strong emphasis on offensive open-source intelligence (OSINT) and target development. The course teaches students how attackers collect, analyze, and operationalize publicly available information to support reconnaissance, targeting, and exploitation activities. Students progress from OSINT tradecraft and intelligence development to basic … Continue reading "CNE Fundamentals and Offensive OSINT (CFOO)"
Basic Cyber Exploitation Analysis (BCEA)
The Basic Cyber Exploitation Analysis course provides foundational pipeline training for personnel entering an exploitation analyst work role. The course emphasizes structured operational processes, mission analysis, information gathering, target profiling, and exploitation support activities. Students learn how exploitation operations are planned, supported, executed, and documented within a governed cyber operations environment. Instruction blends conceptual understanding … Continue reading "Basic Cyber Exploitation Analysis (BCEA)"
Detection & Threat Hunting (DET)
The mission of the Detection & Threat Hunting (DET) is to seek out and hunt for the adversary within a network. DET members couple experience with an in-depth understanding of the methodologies, tools, techniques and tradecraft of the adversary to identify the behaviors not detected by tradition monitoring or detection methods. DET teams identify anomalous behavior through the use of both commercially and organically developed assets that develop signatures and heuristics that can be deployed to protect follow-on incidents from happening again. DETs perform in-depth timeline, log and traffic analysis to map out the incident and collect the data needed to implement real-time solutions to the customer.
Course DescriptionsCourses
View all DET™ coursesBasic Computer Forensics (BCF)
Basic Computer Forensics introduces foundational concepts and practical skills for collecting, preserving, and analyzing digital evidence from computer systems. Students learn how forensic investigations are conducted, how common attack vectors leave artifacts, and how data is acquired and examined in a forensically sound manner. The course emphasizes disk structure, file systems, deleted data, and core … Continue reading "Basic Computer Forensics (BCF)"
Intermediate Computer Forensics (ICF)
Intermediate Computer Forensics builds upon foundational forensic skills to develop deeper investigative capability across storage media, memory, file systems, and user activity artifacts. Students learn to conduct structured forensic investigations involving disk imaging, memory acquisition and analysis, file and partition recovery, artifact correlation, and evidence reporting. The course emphasizes analytical decision-making, evidence correlation across sources, … Continue reading "Intermediate Computer Forensics (ICF)"
Intermediate Incident Response (IIR)
The Intermediate Incident Response course develops hands-on skills for identifying, investigating, and responding to security incidents in enterprise environments. Students learn to apply structured incident response methodology to real-world intrusions affecting Windows and Linux systems, including unauthorized access, malware execution, persistence, and lateral movement. The course emphasizes evidence handling, live response, artifact analysis, timeline reconstruction, … Continue reading "Intermediate Incident Response (IIR)"
Cyber Software Development (CSD)
The mission of the Cyber Software Development (CSD) is to enable other IO Domain teams. CSDs combine their understanding of platforms, protocols, and APIs to produce solutions that verify the integrity of existing systems, facilitate configuration and administration and enable situational awareness on hosts and in networks. CSDs use a secure Software Development Lifecycle to create robust products that improve security by making opaque systems transparent.
Course DescriptionsCourses
View all CSD™ coursesPowerShell Bootcamp (POBO)
PowerShell Bootcamp provides foundational scripting skills for automating tasks, interacting with Windows systems, and building reusable command-line tooling using PowerShell. Students learn core scripting constructs including variables, data types, flow control, functions, error handling, and interaction with the Windows operating system. The course emphasizes hands-on scripting, structured problem-solving, and safe scripting practices rather than advanced … Continue reading "PowerShell Bootcamp (POBO)"
Python Programming (PYPRO)
Python Programming develops intermediate-level scripting and software development skills using Python for automation, data handling, and system interaction. Students build upon basic programming concepts to write structured Python code using strings, collections, functions, modules, file input/output, networking, and object-oriented design. The course emphasizes readable code, modular design, error handling, and practical scripting workflows applicable to … Continue reading "Python Programming (PYPRO)"
Intermediate Computer Exploitation Development (ICED)
The Intermediate Computer Exploitation Development course introduces students to foundational exploit development concepts through hands-on construction and analysis of memory corruption–based exploits in Linux and Windows environments. The course focuses on understanding how vulnerabilities manifest at the binary and memory level, how shellcode and staged payloads are developed, and how common defensive mechanisms are bypassed. … Continue reading "Intermediate Computer Exploitation Development (ICED)"