PowerShell Bootcamp (POBO)
PowerShell Bootcamp provides foundational scripting skills for automating tasks, interacting with Windows systems, and building reusable command-line tooling using PowerShell. Students learn core scripting constructs including variables, data types, flow control, functions, error handling, and interaction with the Windows operating system. The course emphasizes hands-on scripting, structured problem-solving, and safe scripting practices rather than advanced exploitation or framework development. By the end of the course, students will be able to write, debug, and execute PowerShell scripts that interact with files, processes, the registry, WMI, and .NET objects. The course concludes with a Culmination Exercise (CULEX) requiring students to integrate scripting concepts into a functional automation solution.
Intended Audience: Individuals new to scripting or automation, including junior cyber operators, system administrators, analysts, and IT personnel who require foundational PowerShell skills. No prior scripting experience is required, though basic familiarity with Windows systems and command-line usage is beneficial.
Python Programming (PYPRO)
Python Programming develops intermediate-level scripting and software development skills using Python for automation, data handling, and system interaction. Students build upon basic programming concepts to write structured Python code using strings, collections, functions, modules, file input/output, networking, and object-oriented design. The course emphasizes readable code, modular design, error handling, and practical scripting workflows applicable to cybersecurity, automation, and systems engineering tasks. Hands-on labs reinforce each concept through progressively complex exercises, culminating in a Culmination Exercise (CULEX) requiring students to integrate Python concepts into a complete, functional solution.
Intended Audience: This course is intended for students who possess basic programming or scripting experience and want to develop practical Python skills for automation and system interaction. Typical students include cyber operators, analysts, system administrators, and technical practitioners. Prior experience with basic scripting or command-line environments is recommended.
Intermediate Computer Exploitation Development (ICED)
The Intermediate Computer Exploitation Development course introduces students to foundational exploit development concepts through hands-on construction and analysis of memory corruption–based exploits in Linux and Windows environments. The course focuses on understanding how vulnerabilities manifest at the binary and memory level, how shellcode and staged payloads are developed, and how common defensive mechanisms are bypassed. Students progress through fundamental exploit development concepts, including assembly language, shellcode creation, and binary analysis, to building functional exploits that integrate multiple defensive bypass techniques. Emphasis is placed on exploit mechanics, payload staging, and defensive mitigation awareness rather than tool-driven exploitation or operational tradecraft. The course culminates in a structured exploitation exercise requiring students to finalize, refine, and validate a working exploit.
Intended Audience: This course is intended for experienced cyber operators, vulnerability analysts, and developers who already possess strong foundational knowledge of Linux or Windows systems and are seeking an introduction to exploit development. Students should be comfortable with command-line environments, basic scripting, binary debugging, and low-level system concepts. This course is NOT intended for students new to exploitation or general computer network exploitation techniques. Familiarity with exploitation workflows, scripting, and operating system internals is strongly recommended.
Python for Red Teaming (PYRE)
Python for Red Teaming develops advanced Python scripting skills for offensive security and red team operations. Students learn to design and implement Python-based tooling to support reconnaissance, scanning, fingerprinting, exploitation, and post-exploitation workflows. The course emphasizes tradecraft-aware tool development, operational reliability, and adaptability rather than reliance on prebuilt frameworks. Students build threaded scanners, packet manipulation tools using Scapy, fingerprinting utilities, and exploitation scripts targeting real-world vulnerabilities. Instruction focuses on how Python enables customization, automation, and scalability in offensive operations. The course culminates in a Culmination Exercise (CULEX) requiring students to integrate Python tooling across multiple phases of a red team operation. An optional interactive challenge environment (PyFight) is available throughout the course to provide additional hands-on practice and reinforce Python problem-solving skills. PyFight is not graded and does not factor into course completion.
Intended Audience: This course is intended for advanced cyber operators, red team members, penetration testers, and offensive security practitioners who already possess solid Python fundamentals. Students should be comfortable with scripting, networking concepts, and basic exploitation workflows. Completion of an intermediate Python course (e.g., CSD200) or equivalent experience is strongly recommended.