Insert Custom HTML fragment. Do not delete! This box/component contains code that is needed on this page. This message will not be visible when page is activated.
+++ DO NOT USE THIS FRAGMENT WITHOUT EXPLICIT APPROVAL FROM THE CREATIVE STUDIO DEVELOPMENT TEAM +++

Deloitte Advanced
Cyber Training

Defending against evolving cybersecurity threats

Deloitte's Advanced Cyber Training program helps organizations develop and mature their defensive cyber capabilities with courses backed by a reputation for serving US commercial, defense, and intelligence communities.

Request course information
deloitte-advanced-cyber-training

Our approach to cyber training

Our program is designed to help you enhance your team's cybersecurity skills using a dynamic, trusted, and accessible approach. Deloitte instructors provide practical, real-world insights incorporating the latest industry practices and emerging adversary tactics, tailored to address your organization's specific needs and skill gaps.

Approach
  • Hands-on training with custom lab simulations
  • Operations and real-world scenario-directed training
  • Knowledge, skills, and abilities (KSA) developed through various exercises
Talent
  • Instructors offer deep insights into the mindset required for both offensive and defensive cyber operations
  • Gain valuable mission insights and practical experience from seasoned cyber professionals
Trusted
  • Program combines root9B's (R9B) training catalog and experience with Deloitte's resources and reputation for quality
  • Prior to acquisition by Deloitte in 2021, R9B provided training and mission qualification evaluations to DoD cyber operations organizations for more than seven years
  • Mature and well-defined training programs with learning objectives that align with National Institute of Standards and Technology (NIST) National Initiative for Cybersecurity Education (NICE) work roles
Accessible
  • Course schedules designed to be flexible to meet your specific requirements
  • Training is operations-focused and caters to those serving multiple security roles and specializations
  • Budget-friendly fees when compared with similar training options
Multifaceted
  • Modular course content design allows for customization based on need and current KSA gaps
  • Evolving content exposes learners to emerging adversary tactics, techniques, and procedures (TTP) and industry-leading practices
  • Current courses offered: Active Cyber Analytics, Adversary Tactics and Techniques, Cyber Threat Intelligence Analysis, Hunt Methodology, PowerShell Foundations, Python for Cyber Operations and Threat Methodology

Deloitte advanced cyber training courses

Our courses draw from our real-world operational experience and offer a mix of instruction-based learning and hands-on lab demonstrations. We regularly update our courses to keep them cutting-edge and impactful. Additionally, all our courses can be customized to your organization's needs to make maximum impact.

This course arms cyber defenders with a new set of tools to successfully analyze large collections of mission data. Collection, refinement, scripting, descriptive statistics, and visualizations come together to help the operator find useful patterns left behind by a potentially malicious actor.

Course duration: Typically, 16 or 40 hours but can be tailored to meet specific client requirements
Course delivery options: Live instructor-led, either in-person or remote

View course details

This intensive five-week course guides participants through the methodologies and technical details of how attackers conduct reconnaissance, gain access, pivot, and remain hidden within a target network. The course includes hands-on exercises via a browser-based custom lab environment.

Course duration: 200 total hours, ideally over five consecutive 40-hour weeks
Course delivery options: Live instructor-led, either in-person or remote

View course details

This course guides analysts and defenders through the process of planning, collecting, analyzing, reporting, and integrating cyber threat intelligence into network defense operations.

Course duration: Typically, 16 or 40 hours but can be tailored to meet specific client requirements
Course delivery options: Live instructor-led, either in-person or remote

View course details

This course teaches real-time detection and identification of adversarial presence in organizational networks. Topics include data collection, analytical processes, and interpreting findings to spot compromised systems. By the end of the course, participants are equipped with skills to help to uncover adversary activity that automated security tools may miss.

Course duration: Typically, 16 or 40 hours but can be tailored to meet specific client requirements
Course delivery options: Live instructor-led, either in-person or remote

View course details

This course presents the fundamentals of scripting, PowerShell, and a baseline of techniques and terminology for network defenders. The course is delivered using a balance of instructor lectures, class discussions, and practical, hands-on exercises for participants. Each lesson progresses participant knowledge, leveraging information learned from previous lessons to create a steady flow of development and concept reinforcement.

Course duration: 40 hours of course work, ideally delivered over five consecutive business days
Course delivery options: Live instructor-led, either in-person or remote

View course details

This course guides participants in using Python to tackle problems in multiple complex environments. The course provides a foundation in Python concepts and builds to create scripts and programs to automate processes, build utilities, and network applications.

Course duration: 40 hours of course work, ideally delivered over five consecutive business days
Course delivery options: Live instructor-led, either in-person or remote

View course details

This course delves into adversary approaches to the exploitation process. Participants will learn how to research a target, develop a plan of attack, and execute their plan to gain access to a remote network.

Course duration: Typically, 16 or 40 hours but can be tailored to meet specific client requirements
Course delivery options: Live instructor-led, either in-person or remote

View course details

Ready to get started?

Talk to our training team to understand how you can leverage our courses to meet your organization's needs.

contact-us

Get in touch

ryan-roberts
Ryan Roberts
Principal
Deloitte & Touche LLP
icon-email rroberts@deloitte.com icon-phone +1 303 305 3932 icon-linkedin
michael-tessier
Michael Tessier
Specialist Leader
Deloitte & Touche LLP
icon-email mitessier@deloitte.com icon-phone +1 850 521 4846 icon-linkedin
eric-stride
Eric Stride
Specialist Executive
Deloitte & Touche LLP
icon-email estride@deloitte.com icon-phone +1 210 390 3278 icon-linkedin

Insert Custom HTML fragment. Do not delete! This box/component contains code that is needed on this page. This message will not be visible when page is activated.
+++ DO NOT USE THIS FRAGMENT WITHOUT EXPLICIT APPROVAL FROM THE CREATIVE STUDIO DEVELOPMENT TEAM +++