Scheduled Courses
$
This is a hands-on course on using Ghidra for reverse-engineering and vulnerability research. Exercises include Windows binaries, Linux binaries, and will cover a variety of architectures (e.g., ARM, PowerPC, MIPS, x86, and x64). After completing this course, students will have the practical skills to use Ghidra in their day-to-day reversing tasks.
The course is live and recorded each day, with recordings posted at the end of each day. Students keep the VM, exercises, solutions, and all recordings. Students are encouraged to post all the materials in their organizations internal wiki to be used as future reference for themselves and other staff.
$
This is a majority hands-on course providing an in-depth introduction to advanced Windows 10 malware techniques and analysis. This course will teach students to both recognize and implement advanced malware tecniques. At the completion of this course students will have the practical skills needed to analyze sophisticated malware samples.
$
After completing this course, students will have the practical skills required to assess embedded programs for vulnerabilities, recommend mitigations, and create proof-of-concept exploits to demonstrate those vulnerabilities to commanders.
$
Course Length Varies - This course delivers the information senior executive staff need to secure a competitive edge in the information technology arena by building up organic innovation capabilities and knowledge management within their own organizations. We use examples from the United States innovation ecosystem to connect goals to resources to enabling organizations. We delineate the innovation ecosystems and opportunities available to those wishing to keep moving forward including the policy and regulatory challenges associated with technological innovation in legacy environments. We map out the existing research and development resources such as DARPA, IARPA, FFRDCs, IJARCs, and national laboratories, which can all be leveraged by military' commanders today and show how organization can combine innovation from outside with innovation inside their organization.
$
Computer network operations (CNO) software development is very much like traditional software development: code needs to be modular, reliable, and well-documented, with one major exception - there is an adversary. In this course, students learn the unorthodox programming techniques and strategies to make software operationally effective, suitable, and survivable in the face of modern adversaries.