Courses

Tactical Mission Planning Using PBED - Beta
Cyber Training

This course discusses the Plan, Brief, Execute, and Debrief process, which is part of a larger Military Decision-Making Process (MDMP). It discusses mission analysis, COA development, executing the mission, and gathering important lessons learned for debriefing an incident.

Mission Planning using the PBED Process
Cyber Training

This course discusses the Plan, Brief, Execute, and Debrief process, which is part of a larger Military Decision-Making Process (MDMP). It discusses mission analysis, COA development, executing the mission, and gathering important lessons learned for debriefing an incident.

Cyber Analyst (Basic)
Cyber Training

The Cyber Analyst (Basic) course facilitates an understanding of the special command-line tools and devices residing within the IT security suite. The tools taught in this course are vendor agnostic, open source tools that provide funtionality training. The course uses the Cyberoperations Enhanced Network & Training Simulators (CENTS) cyber range configurations. This course cover BASELINE to FUNCTIONAL training requirements, and it provides fundamental information required to perform as a Cyber Analyst. This course is a pre-requisite course for the Cyber Analyst and Range Engineer tracks of training.

Vulnerability Assessor
Cyber Training

Security testing is the primary job of the Vulnerability Assessor. The goal of the security test is for the assessor to test the system and evaluate and measure its potential vulnerabilities.

This course introduces the process and tools used to perform a vulnerability assessment using open-source, vulnerability assessment tools, such as Nmap, Nikto, OpenVAS and Wireshark


Defense-in-Depth & Risk
Cyber Training

This topic provides an understanding of security through defense-in-depth and defines risks to our enterprise from breaches.

Law, Compliance and the Cybersecurity Policy Framework
Cyber Training

This topic is an overview of National and International regulations that drive our organization's cybersecurity policy framework.

Network, Security & Incident Management Frameworks
Cyber Training

In this topic, we discuss several management frameworks that will assist you in performing security operations.

Production Version 3.6

Information Operations
Cyber Training

This course reviews one of our most important tools, Information!! In the topic, we'll discuss current events in the cybersecurity realm. We'll then discuss resources that are available for doing open-source research, or intelligence. Lastly, we'll display how the bad guy uses this same tool to enumerate a target.

Planning, Briefing, Executing, & Debriefing Cyber Missions
Cyber Training

Cyber teams, when responding to an incident, must properly plan for deployment on the network, execute that plan seamlessly, and brief and debrief stakeholders. This course explains the Planning, Briefing, Executing, and & Debriefing process, as used by the United States Air Force.

Remote Login Tools
Cyber Training
This topic steps you through the operation of tools to communicate remotely with the VNC, RDP, NoVNC, and SSH protocols. Students use the actual tools to remote around the CENTS Immersive Training Environment.
Proxy & NAT Functionality
Cyber Training

Some security is provided by limiting our public-facing IP space. By using NAT and/or proxy server techniques, we can mask the IP of our internal user. This topic is a deep-dive in the Network Address Translation, Port Address Translation and Proxying.

Introduction to Packet Analysis (CENTS Version)
Cyber Training

This course introduces you to the basic operation of the Internet, the key protocols, their uses, how they are typically exploited and how you can protect a network that requires the protocol.  

We begin with a short discussion about how packets are structured in encapsulated layers on the Internet and what normal protocols look like in the protocol analysis tool Wireshark. 


Intrusion Detection
Cyber Training

This course provides an introduction to the concept of intrusion detection using Snort and Suricata, two open-source Network Intrusion Detection System (NIDS).  You will complete labs to familiarize yourself with the sensor’s functionality, rule writing, and alerting on traffic.

Email Analysis
Cyber Training

This course provides an understanding of email log and header analysis, and it provides an overview of the use of DNS with email.

Malware Analysis, Anti-Virus and Forensics Tools
Cyber Training

This topic is an introductory course in Malware Analysis and Monitoring. Discussions in the topic include the definition of different types of malware, the use of anti-virus, and what to do when under attack by malware.

Structured Query Language (SQL) & SQL Injection (SQLi)
Cyber Training

This topic provides basic and intermediate training in the Structured Query Language (SQL), as well as the use of SQL injection (SQLi) as a means to break through defenses.

Cross-Site Scripting (XSS)
Cyber Training

This course introduces you to basic concepts in a Cross-Site Scripting (XSS) attack.  This is a very common and dangerous class of attacks involving web site vulnerabilities through the use of malicious code injection in a web page or application.  

When you complete this course, you will understand the different types of XSS attacks, how they are used and what they are designed to achieve from an attacker’s viewpoint.   The course also provides a discussion on detection and mitigation strategies.


Industrial Control Systems ICS 101
Cyber Training

This course is an introduction to Operational Technology (OT).  The intended audience are students that want to understand Industrial Control Systems (ICS) and the convergence of IT/OT into the Industrialized Internet of Things (IIOT).

The course provides an introduction to ICS, the Purdue reference model for control systems, attacks on critical infrastructure and basic security design principles.

Automated Opposing Force (AutoOP4)
Cyber Products
This course introduces basic concepts for operating the CyberCENTS Automated Opposing Force (AutoOP4) product & creating Attack Campaigns. This course will assist users in planning and carrying out an Advanced Persistent Threat (APT) stimulation to trainees and/or exercise participants.

CENTS Assessments Manager
Cyber Products

This course gives an introductory to intermediate view on the CyberCENTS Knowledge Center, and the integration with the Sentinel, Legion, Auto-build, Myrmidon and Reconstitution (SLAM-R) software and hardware systems.

CENTS Capture-The-Flag Scoring Tutorial
Cyber Products

This course provides information on the operation of the CENTS Capture-The-Flag scoring engine.

CyberCENTS Range Familiarization
Cyber Products

This course is designed to provide participants with an introduction to the CyberCENTS range and its incorporated tools sufficiently to conduct network mapping and discovery. This course provides additional basic system and network administration refresher information to support normal and maintenance operations in the CENTS environment.


SLAM-R Range Builder
Cyber Products

This course gives an introductory view on the CyberCENTS range offerings, and the operation of the Sentinel, Legion, Auto-build, Myrmidon and Reconstitution (SLAM-R) software and hardware systems.

FY25 Military Exercise Template
CENTS Trainer Products

This space is used as a template for Military Exercises post April 2024.




Mil Ex Demo
CENTS Trainer Products

This space is to be used for military exercise development.


Test Mil Exercise
CENTS Trainer Products

This space is to be used for military exercise development.


Military Exercise Template
CENTS Trainer Products

This space is to be used for military exercise development.


Exercise Planning Using CENTS
CENTS Trainer Products

This course walks the student through the Joint Event Life Cycle or JELC used by the US DoD. It is a tried and true exercise planning tool used by the military to properly plan, execute, and de-brief exercises.

Developing Curriculum Using the CENTS Knowledge Center
CENTS Trainer Products

This course provides educators and trainers with the information required to perform in the work role of Trainer and Educator.

CSF Exercise Template
CENTS Trainer Products

This space is to be used for the NIST CSF exercise development.


NICE Exercise Template
CENTS Trainer Products

This space is to be used for the NIST NICE exercise development.


Training/Education Course Template
CENTS Trainer Products

This course is a template that may be used to create new courses using the lesson activity. Utilize this course along with the LMS Style Guide to ensure your course adheres to the design template to provide a consistent experience across the site.

In this block, add a course description that will be displayed on the main course list.

Include a course image below using the guidelines in the style guide.


SLAM-R Collaboration Space
Leonardo Collaboration

This section is for collaboration of files and schedules for work with Leonardo UK.