Skip to main content

Deloitte Advanced Cyber Training

Defending against evolving cybersecurity threats

Deloitte's Advanced Cyber Training program helps organizations develop and mature their defensive cyber capabilities with courses backed by a reputation for serving US commercial, defense, and intelligence communities.

Our approach to cyber training

Our program is designed to help you enhance your team's cybersecurity skills using a dynamic, trusted, and accessible approach. Deloitte instructors provide practical, real-world insights incorporating the latest industry practices and emerging adversary tactics, tailored to address your organization's specific needs and skill gaps.

Deloitte advanced cyber training courses

Our courses draw from our real-world operational experience and offer a mix of instruction-based learning and hands-on lab demonstrations. We regularly update our courses to keep them cutting-edge and impactful. Additionally, all our courses can be customized to your organization's needs to make maximum impact.

This course arms cyber defenders with a new set of tools to successfully analyze large collections of mission data. Collection, refinement, scripting, descriptive statistics, and visualizations come together to help the operator find useful patterns left behind by a potentially malicious actor.

Course duration: Typically, 16 or 40 hours but can be tailored to meet specific client requirements
Course delivery options: Live instructor-led, either in-person or remote

View course details

This intensive five-week course guides participants through the methodologies and technical details of how attackers conduct reconnaissance, gain access, pivot, and remain hidden within a target network. The course includes hands-on exercises via a browser-based custom lab environment.

Course duration: 200 total hours, ideally over five consecutive 40-hour weeks
Course delivery options: Live instructor-led, either in-person or remote

View course details

This course guides analysts and defenders through the process of planning, collecting, analyzing, reporting, and integrating cyber threat intelligence into network defense operations.

Course duration: Typically, 16 or 40 hours but can be tailored to meet specific client requirements
Course delivery options: Live instructor-led, either in-person or remote

View course details

This course teaches real-time detection and identification of adversarial presence in organizational networks. Topics include data collection, analytical processes, and interpreting findings to spot compromised systems. By the end of the course, participants are equipped with skills to help to uncover adversary activity that automated security tools may miss.

Course duration: Typically, 16 or 40 hours but can be tailored to meet specific client requirements
Course delivery options: Live instructor-led, either in-person or remote

View course details

This course presents the fundamentals of scripting, PowerShell, and a baseline of techniques and terminology for network defenders. The course is delivered using a balance of instructor lectures, class discussions, and practical, hands-on exercises for participants. Each lesson progresses participant knowledge, leveraging information learned from previous lessons to create a steady flow of development and concept reinforcement.

Course duration: 40 hours of course work, ideally delivered over five consecutive business days
Course delivery options: Live instructor-led, either in-person or remote

View course details

This course guides participants in using Python to tackle problems in multiple complex environments. The course provides a foundation in Python concepts and builds to create scripts and programs to automate processes, build utilities, and network applications.

Course duration: 40 hours of course work, ideally delivered over five consecutive business days
Course delivery options: Live instructor-led, either in-person or remote

View course details

This course delves into adversary approaches to the exploitation process. Participants will learn how to research a target, develop a plan of attack, and execute their plan to gain access to a remote network.

Course duration: Typically, 16 or 40 hours but can be tailored to meet specific client requirements
Course delivery options: Live instructor-led, either in-person or remote

View course details

Ready to get started?

Talk to our training team to understand how you can leverage our courses to meet your organization's needs.