C-T Watch has recruited some of he best un-matched talent with expertise in the Cyber-Warfare arena. Our Cyber-Warfare course of instruction (CW-COI) comes at a time where the worlds battles are not only fought on land, sea, or air, but to include the cyberspace as well. Cyber-Warfare is fought 24 hours a day at the speed of light and can result in the devastation of critical infrastructure in the public and private sectors. This battle is waged everyday and the enemy is largely unknown, unseen, and most likely never caught without the proper training.

Our cyber warfare course combines the views of both military and commercial analysts to provide students with a well-rounded understanding of the conflicts within a cyber-war and how to best overcome them. Students will understand the strategic, operational and tactical aspects of these conflicts and then use this knowledge to assist in developing more efficient procedures and technical defenses. Any security professional within a management position will find this information useful in developing effective risk management strategies within an organization. The topics discussed during this five-day training class will help determine how to best allocate resources and drive security projects and policies, in order to mitigate the larger conflicts which arise during a cyber-war.

Course length is 3 days (24 hours total)

In this lecture only course, you will learn what cyber is and gain an understanding of Computer Network Attack (CNA) and Computer Network Exploitation (CNE), which are derived from several public unclassified DoD documents, manuals, and directives. You will examine parallels between the cyber and kinetic counterparts and learn strategic uses, including when to deploy CNA and CNE operations. You will discover the limitations and legal considerations of CNA and CNE operations, and you’ll walk through various attack scenarios to determine your proper course of action.


Anyone interested in the field of cyber warfare/cyber operations and/or looking to expand a cyber security career, including cyber commanders, information operations officers, information security/assurance professionals, cyber security consultants, cyber strategists, military members (J2, J3, J6, J9 types), SOC/NOC security analysts, network security engineers, penetration testers, auditors, government officials, and security engineers

Course length is 2 days (16 hours total)

This course provides in-depth cyber security awareness training on basic to advanced topics, including:

  • What information is at risk
  • How it is at risk
  • What hackers want to steal and why
  • How hackers are stealing data
  • Tools and techniques hackers use
  • How employees are losing data, whether intentionally or unintentionally
  • Impact of social media and mobile devices on data security
  • Current cyber threats and the scams and techniques used for stealing data
  • Secure against data breach attempts
  • Social media and mobile device risk and usage
  • Data protection tools and techniques for any device or location


In this course, you will learn policies business owners and managers should implement to protect the business and employees, and, in hands-on labs, you will learn about various tools to help end users protect data.

Course length is 3 days (24 hours total)

In this hands-on course, you will gain a better understanding of cyber operations (CO) for the deployment of computer network attack (CNA), computer network defense (CND), and computer network exploitation (CNE), against an adversary to achieve objectives and cause effects in support of a mission set.

This course, founded on concept operations and real cyber capabilities, provides you with the understanding, tools, and processes needed to conduct malware analysis with real-world malicious code samples to dissect. You will prepare and plan an effective offensive and defensive strategy, as well as evaluate covert protocols. Analysis of system specific, nondescript tools will be introduced to aid in attack and defense.


  • Classes of malware
  • System monitoring
  • Malware analysis tools
  • Socio-technological engineering
  • Forensics and counter-forensics
  • Analysis of kernel level rootkits
  • Network evasion techniques and countermeasures


Anyone interested in the field of cyber warfare/cyber operations and/or looking to expand a cyber security career, including cyber commanders, information operations officers, information security/assurance professionals, cyber security consultants, cyber strategists, military members (J2, J3, J6, J9 types), SOC/NOC security analysts, network security engineers, penetration testers, auditors, government officials, and security engineers.

Course length is 5 days (40 hours total)

In this course, you will develop the skills not only to capture suspicious data, but also to discern unusual patterns hidden within seemingly normal network traffic. You will gain a set of investigative techniques focused on the use of vendor-neutral, open source tools to provide insight into:

  • Forensics analysis fundamentals
  • Data recorder technology and data mining
  • Network security principles, including encryption technologies and defensive configurations of network infrastructure devices
  • Security threat recognition for a variety of common network attack and exploit scenarios, including network reconnaissance techniques, Bot-Net threat recognition, and man-in-the-middle attacks, and common user protocol vulnerabilities, such as IP-related protocols (IP/TCP, DNS, ARP, ICMP), e-mail protocols (POP/SMTP/IMAP), and other common Internet-based user protocols
  • Open source network forensics tools
  • Specialized network forensics analysis techniques, including suspicious data traffic reconstruction and viewing techniques

Throughout the course, real-world examples in conjunction with numerous hands-on exercises will provide practical forensics analysis skills.


  • Principles of network forensics analysis and how to apply them
  • Configure various open source tools for network forensics analysis
  • Utilize tools to recognize traffic patterns associated with suspicious network behavior
  • Reconstruct suspicious activities such as e-mails, file transfers, or web browsing for detailed analysis and evidentiary purposes
  • Recognize potential network security infrastructure misconfigurations


  • Network engineers, network security professionals, who possess basic- to intermediate-level general security and networking knowledge
  • Personnel who have working knowledge of host-based forensics analysis and want to gain expertise in the end-to-end digital forensics process.

Cyber Warfare Instructor 1 (Identity is not disclosed for security reasons)

INSTRUCTOR 1 is a recognized expert in information systems and the field of computer law enforcement investigations. He is currently President of a private company specializing in secure communications for federal agencies, military and law enforcement. He has served as the Lead of the Security Group of the Naval Postgraduate School’s COASTS program. He held the faculty position of Adjunct Professor at the University of New Haven, National Security Program, and has also served as an instructor for SEARCH and the Secret Service. In January 2009 he retired in good standing as a sworn Deputy Sheriff in Kansas. He served as a sworn Reserve Police Officer and Computer Forensic Investigator for Torrance, California, is a State of California Certified Computer Crime Investigator, an Institute of Criminal Investigation Certified Instructor, and has testified as an expert witness on information systems and computer forensics.

INSTRUCTOR 1 served as CIO, Vice President of Information Technology, and Director of Manufacturing for a multi-national public company in the fiber optic industry. INSTRUCTOR 1 served two years at the National Criminal Justice Computer Laboratory and Training Center (SEARCH) where he taught Advanced Internet Investigation to sworn Federal, State and Local law enforcement officers and agents including Secret Service, Air Force OSI, IRS, FBI, ATF and NSA. At SEARCH, he also consulted on many government information systems including the Federal Reserve Bank and the Supreme Courts of Texas and Alaska. Prior to this, INSTRUCTOR 1 served as CIO of Enterprise Systems Consulting. The Lt. Governor of California awarded INSTRUCTOR 1 the State of California Commendation for his pioneering work in computer crime investigations while serving with the Los Angeles Police Department (LAPD). INSTRUCTOR 1 served with the LAPD as a specialist reserve office and computer crime instructor in the 90’s. He was attached to an elite unit that investigated computer crime and illegal network connections. He successfully penetrated many offenders’ computer systems, recovered decisive evidence and personally trained more than 100 detectives in network investigations, computer security methods and policy development. Additionally, INSTRUCTOR 1 pioneered methods in breaking password and encryption protection on suspects’ computers and participated in the execution of many search warrants and the arrests of numerous offenders. He was awarded numerous commendations, including the “LAPD Non-Geographical Divisions Reserve Police Officer of the Year for 1994.

INSTRUCTOR 1 served nearly four years as Adjunct Professor of Management Information Systems and lectured on Technology Management at Pepperdine University. He has been a featured lecturer on Internet security at U.S. Justice Department sponsored symposiums. As a Senior Network Scientist, he provided computer security consulting to such companies and organizations as Disney, Honda, the J. Paul Getty Trust, the U.S. Department of Justice and the States of Texas, Kansas, Oregon, Nebraska, Idaho, Alaska, Louisiana,Wisconsin, Oklahoma and Hawaii. The work INSTRUCTOR 1 has pioneered has been the featured subject for articles in magazines such as Computer World, “Cybercop Boot Camp,” September, 1998, SANS Institute, “The Cost of Security: November 21, 2000, and Information Systems Security Association (ISSA) Password. He was also a recipient of Citicorp’s highest Technical Achievement Award.