(866) 488-9228
Contact Us

Cyber Training

What problems can we solve for you?

Do you struggle to find qualified cyber experts who are also good instructors? Do you need effective end-to-end training in the most technical aspects of cybersecurity?

Our Capabilities

We are trusted leaders in providing high quality technical, planning, and operational training and complex simulations of real-world cyber operations across the spectrum from entry to advanced level service members.  We do not deliver short-term, one-off courses – we deliver a holistic and continuous professional education to prepare the next generation of cyber warriors throughout their careers.

OUR CYBER TRAINING EXPERTISE INCLUDES:

  • Developing & delivering technical cyber training: Our expertise includes Windows and Linux operating systems (kernel and internals programming, manipulation, command line tools, scripting in Bash and PowerShell, system hardening and auditing), Networking (protocols, discovery and reconnaissance, packet capture, analysis and filtering, auditing and hardening), Infosec operations (malware binary analysis and attack vectors, debugging and disassembly, principals of cyberattack and defense and the cyber kill chain), and Python, C and x86 assembly programming and cyber tool development.
  • Cyber operations and planning: Instructing military offensive and defensive cyber and electromagnetic operations & planning.
  • Assessing technical cyber expertise: Evaluation and assessment of a cyber professional’s capabilities using realistic scenarios through exercise development and cyber range customization.
  • Cyber Range Operations: Designing and managing realistic & challenging cyber exercises in a hybrid (virtual – physical) environment.

Our Work

CYBER COMMON TECHNICAL CORE (CCTC)

CCTC is a nine week course designed to enable student self-development in foundational topics for cyberspace operations. It builds upon the Joint Cyber Analysis Course (JCAC), producing graduates that meet the Intermediate Cyber Core (ICC) standard and understand the technical principles that exploit vulnerabilities and defend proactively. This capability propels graduates beyond blind reliance on a specific tool or weapons system, enabling them to solve the cyberspace problems our nation will face in the future. CCTC topics include programming, system and network enumeration, network traffic manipulation, cryptography, computer science theory, and exploitation and mitigation of security vulnerabilities. Throughout the course, students are required to think through difficult, multidimensional, real-world scenarios and apply learned skills to develop solutions.

CYBERSPACE ELECTROMAGNETIC ACTIVITIES IN SUPPORT OF MULTI-DOMAIN BATTLE (CEMA)

HigherEchelon’s seasoned and experienced instructors provide instruction on cyberspace planning, training, integration, and synchronization in support of Army formations at the strategic, operational, and tactical levels. HigherEchelon provides specialized capabilities in design and development of operational doctrine, strategy, and implementation of Department of Defense cyber capabilities. Our human dimension expertise prepares future CMF leaders to attack, exploit and defend within the Cyber Domain and the entire Multi-Domain Battle environment. We stand poised to leverage our Gaming and Simulation expertise to facilitate the training of our nation’s continuously evolving CMF.

Our team consists of career professionals in the following areas:

  • Electronic Warfare (EW) and Signals Intelligence (SIGINT)
  • Offensive & Defensive Cyberspace Operations (OCO & DCO)
  • Department of Defense Information Network (DODIN)
  • Combined Arms Maneuver and Targeting
  • Collection Management and Intelligence Surveillance and Reconnaissance (ISR)

CYBERSPACE RESPONSE ASSESSMENT (CSRA)

The CSRA course is a hands-on evaluation of cyber tasks coupled with an introduction to electronic warfare. This course facilitates the evaluation and assessment of the full breadth of student’s knowledge using a fusion of cyber and electronic warfare tactics, techniques, and procedures within a common exercise. It leverages both a physical and virtual scenario-based exercise environment which is designed to represent real-world cyberspace operations.

CYBER CAPABILITIES DEVELOPMENT

Cyber Capabilities Development provides advanced instruction in computer science, software development and programming, binary analysis, disassembly and debugging, and cyber operational analysis to support development and deployment of custom offensive and defensive cyber tools to support global US cyber operations.

ADDITIONAL CYBER INSTRUCTIONAL TRAINING

  • Information Warfare and Information Advantage
  • Targeting in Support of Operations in Cyberspace
  • Advanced Scripting and Digital Forensics
  • ICS / SCADA