Deloitte Advanced
Cyber Training
Defending against evolving cybersecurity threats
Deloitte's Advanced Cyber Training program helps organizations develop and mature their defensive cyber capabilities with courses backed by a reputation for serving US commercial, defense, and intelligence communities.
Request course informationOur approach to cyber training
Our program is designed to help you enhance your team's cybersecurity skills using a dynamic, trusted, and accessible approach. Deloitte instructors provide practical, real-world insights incorporating the latest industry practices and emerging adversary tactics, tailored to address your organization's specific needs and skill gaps.
Approach
- Hands-on training with custom lab simulations
- Operations and real-world scenario-directed training
- Knowledge, skills, and abilities (KSA) developed through various exercises
Talent
- Instructors offer deep insights into the mindset required for both offensive and defensive cyber operations
- Gain valuable mission insights and practical experience from seasoned cyber professionals
Trusted
- Program combines root9B's (R9B) training catalog and experience with Deloitte's resources and reputation for quality
- Prior to acquisition by Deloitte in 2021, R9B provided training and mission qualification evaluations to DoD cyber operations organizations for more than seven years
- Mature and well-defined training programs with learning objectives that align with National Institute of Standards and Technology (NIST) National Initiative for Cybersecurity Education (NICE) work roles
Accessible
- Course schedules designed to be flexible to meet your specific requirements
- Training is operations-focused and caters to those serving multiple security roles and specializations
- Budget-friendly fees when compared with similar training options
Multifaceted
- Modular course content design allows for customization based on need and current KSA gaps
- Evolving content exposes learners to emerging adversary tactics, techniques, and procedures (TTP) and industry-leading practices
- Current courses offered: Active Cyber Analytics, Adversary Tactics and Techniques, Cyber Threat Intelligence Analysis, Hunt Methodology, PowerShell Foundations, Python for Cyber Operations and Threat Methodology
Deloitte advanced cyber training courses
Our courses draw from our real-world operational experience and offer a mix of instruction-based learning and hands-on lab demonstrations. We regularly update our courses to keep them cutting-edge and impactful. Additionally, all our courses can be customized to your organization's needs to make maximum impact.
This course arms cyber defenders with a new set of tools to successfully analyze large collections of mission data. Collection, refinement, scripting, descriptive statistics, and visualizations come together to help the operator find useful patterns left behind by a potentially malicious actor.
View course detailsThis intensive five-week course guides participants through the methodologies and technical details of how attackers conduct reconnaissance, gain access, pivot, and remain hidden within a target network. The course includes hands-on exercises via a browser-based custom lab environment.
View course detailsThis course guides analysts and defenders through the process of planning, collecting, analyzing, reporting, and integrating cyber threat intelligence into network defense operations.
View course detailsThis course teaches real-time detection and identification of adversarial presence in organizational networks. Topics include data collection, analytical processes, and interpreting findings to spot compromised systems. By the end of the course, participants are equipped with skills to help to uncover adversary activity that automated security tools may miss.
View course detailsThis course presents the fundamentals of scripting, PowerShell, and a baseline of techniques and terminology for network defenders. The course is delivered using a balance of instructor lectures, class discussions, and practical, hands-on exercises for participants. Each lesson progresses participant knowledge, leveraging information learned from previous lessons to create a steady flow of development and concept reinforcement.
View course detailsThis course guides participants in using Python to tackle problems in multiple complex environments. The course provides a foundation in Python concepts and builds to create scripts and programs to automate processes, build utilities, and network applications.
View course detailsThis course delves into adversary approaches to the exploitation process. Participants will learn how to research a target, develop a plan of attack, and execute their plan to gain access to a remote network.
View course detailsReady to get started?
Talk to our training team to understand how you can leverage our courses to meet your organization's needs.

Email our training team
usadvancedcybertraining@deloitte.comGet in touch


