Phase2 Advantage Cybersecurity and Certifications

Train-the-Trainer Programs

Train-the-Trainer Programs

Cybersecurity instructors teaching in universities and colleges can master the industry tools required to provide students with cutting-edge skills in immersive learning environments.




Our train-the-trainer programs are taught using the Project Ares® platform by Circadence and designed to increase the capability and confidence that’s needed to lead aspiring students from the front.   

Supporting Cybersecurity Training in the Classroom

Universities and colleges are diligently working to create new Cybersecurity degrees to address a widening skills gap in the current workforce. As a result, professional educators with years of experience in Computer Science and Information Technology are now responsible for teaching cybersecurity courses, a discipline with which they may have little to no experience. Our train-the-trainer programs provide instructors with the knowledge and skills necessary to teach their students to master specialized industry tools in an immersive learning environment. The training allows instructors to keep pace with this dynamic field and enhance the immersive learning component of their cybersecurity curricula.

Popular Train-the-Trainer Programs

Each of the training programs listed below are 4-8 hours in length and are conducted as instructor-led online courses.  Course fees include a lecture component, lab guides, and a one-month subscription to Project Ares® by Circadence.  Training schedules are flexible, convenient, and designed to accommodate working professionals.

NOTEPhase2 Advantage clients already using the Project Ares® platform as the lab component of their courses receive a Training Support Package which includes all the instruction listed below and do not need to register for this program.  For information regarding the use of Project Ares® in your classroom for labs, email


Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It is used by law enforcement, military, and corporate forensic examiners to investigate incidents on a variety of computer systems. It is also used to recover files from peripheral devices such as USB’s, external hard drives, and digital cameras.  The core Autopsy Browser can be extended by adding modules which help scan files of interest, browse the results of targeted scans or summarize the results of digital investigations.


Ophcrack is a free open-source (GPL licensed) program that cracks Windows log-in passwords by using NTLM hashes through rainbow tables.  A rainbow table is a precomputed table for caching the output of cryptographic hash functions, usually for cracking password hashes.  The program includes the ability to import the hashes from a variety of formats, including dumping directly from the SAM files of Windows. On most computers, Ophcrack can crack most passwords within a few minutes.  


Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. This specialized software is a data capturing program that “understands” the structure (encapsulation) of different networking protocols. It can parse and display the fields, along with their meanings as specified by different networking protocols.  Wireshark is commonly used to support Incident Response and Network Forensics cybersecurity missions.

Kali Linux

Kali Linux (formerly known as BackTrack Linux) is an open-source, Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. This Linux distribution contains several hundred tools targeted towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Kali Linux is a multi-platform solution, accessible and freely available to information security professionals and educators.  Kali Linux is available on Windows 10, on top of the Windows Subsystem for Linux (WSL).


Snort is the foremost open-source Intrusion Prevention System (IPS) in the world. Its open-source network-based intrusion detection/prevention system (IDS/IPS) can perform real-time traffic analysis and packet logging on Internet Protocol (IP) networks. Snort performs protocol analysis, content searching, and matching. The program can also be used to detect probes or attacks, including, but not limited to, operating system fingerprinting attempts, semantic URL attacks, buffer overflows, server message block probes, and stealth port scans.


Maltego is software used for open-source intelligence and forensics and focuses on providing a library of transforms for discovery of data from open sources, and visualizing that information in a graph format, suitable for link analysis and data mining. The basic focus of the application is analyzing real-world relationships (social networks, OSINT API’s, self-hosted private data and Computer Networks Nodes) between people, groups, web pages, domains, networks, internet infrastructure, and social media affiliations.

Windows Registry Editor (Regedit)

Windows Registry Editor (Regedit) is a graphical tool in the Windows operating system (OS) that allows authorized users to view the Windows registry and make changes. In the disciplines of Network and Digital Forensics, this utility allows investigators to view hidden system and user files to gather critical evidence which would not be available through the File Explorer. Information which can be obtained with this tool includes user and system data, changes to files and logs, timestamps, dates, passwords, and locating deleted files.

Circadence Gold Partner
Phase2 Advantage is proud to be a Gold Partner with Circadence

Contact Us to Learn More

To find out more about our instructor training programs and Project Ares®, contact us today via the phone number or email address listed below.

(912) 335-2217