Basic Secure Configuration of Operating Systems (BSCOS)
The Basic Secure Configuration of Operating Systems course is a two-day, entry-level course focused on multi-platform secure system configuration. Students learn the tools, techniques, and procedures necessary to reduce attack surface, mitigate vulnerabilities, and apply organizational security policies across Windows and Linux systems. The course emphasizes procedural execution using provided guidance, including STIGs and IAVAs, rather than independent analysis or system design. Students conclude with a comprehensive capstone exercise in which they harden systems within a small network environment using Active Directory and host-based configuration controls.
Intended Audience: Individuals new to cybersecurity or system administration, including entry-level IT personnel, junior defenders, and students seeking foundational experience with secure system configuration. No prior security experience is required.
Basic Security Fundamentals (BSF)
The Basic Security Fundamentals course introduces core concepts, terminology, and technologies that underpin modern cybersecurity operations. Students gain foundational understanding of information assurance principles, security policies, cryptography, access control, operating system hardening, and common security technologies. The course emphasizes practical exposure to Windows and Linux environments, administrative tooling, and defensive mechanisms to build a strong baseline for advanced security, cyber operations, and incident response training. The course concludes with a Culmination Exercise (CULEX) that reinforces foundational security concepts across multiple domains.
Intended Audience: Individuals new to cybersecurity, IT professionals transitioning into security roles, and students seeking foundational knowledge required for further training in cyber defense, penetration testing, or cyber operations. No prior security experience is required.
Linux Hardening (LINHARD)
The Linux Hardening course provides hands-on instruction in securing Linux systems through policy enforcement, access control, service hardening, auditing, and system monitoring. Students learn to configure authentication mechanisms, enforce least privilege, harden boot and runtime environments, secure network services, and establish logging and auditing pipelines to support defensive operations. Emphasis is placed on practical configuration, validation, and operational sustainment rather than theoretical security concepts. By the end of the course, students will be able to implement layered hardening controls and evaluate system security posture in alignment with defined operational requirements. The course concludes with a Culmination Exercise (CULEX) that requires students to harden and assess a Linux system using structured defensive methodologies.
Intended Audience: Cyber defenders, system administrators, and security practitioners with foundational Linux knowledge who are responsible for securing, maintaining, or assessing Linux systems. This course is intended for students who have completed Linux Fundamentals or possess equivalent experience and are transitioning from basic system administration to defensive hardening and security enforcement roles.
Windows Enterprise Hardening (WEH)
Windows Enterprise Hardening develops practical skills for securing Windows systems and supporting network infrastructure in enterprise environments. Students learn to apply layered defensive controls across network devices, Windows hosts, and Active Directory to reduce attack surface, enforce policy, and improve auditability. The course emphasizes configuration, validation, and policy enforcement rather than theory, with extended hands-on labs focused on access control, authentication, auditing, baseline enforcement, and security standards implementation. Students conclude with a challenging Culmination Exercise (CULEX) requiring them to harden and validate a Windows enterprise environment against defined security objectives.
Intended Audience: Intermediate-level cyber defense practitioners, system administrators, and network defenders responsible for securing Windows enterprise environments. This course is intended for students possessing foundational knowledge of TCP/IP networking, Windows operating system administration, and basic Active Directory concepts. Prior completion of foundational Windows administration training, or equivalent experience, is strongly recommended.