Course Overview

POET is a three-day cyber foundational course designed for cleared industry personnel, military members, and government civilians tasked with supporting control systems, embedded assets, and critical infrastructure. It establishes a functional baseline for reverse engineering within the Cyber-Physical Systems (CPS) domain, providing the technical framework necessary for further specialization.

Guided by our expert instructors, participants will gain hands-on experience identifying, disassembling, and interpreting software binaries using industry-standard tools like Ghidra. The curriculum moves beyond the OS level to analyze the physical layer, examining electronic components, firmware architectures, and the communication interfaces that link embedded peripherals within a CPS environment. Finally, you will use diagnostic instruments to observe and verify real-time electronic behavior.

Born out of necessity after dissatisfaction with available cyber training, POET delivers operator-in-the-loop training, advisory, and consulting support in technology, engineering, and cybersecurity, designed by defense experts and entrepreneurs in defense tech. This course is purpose-built to uplift current defense training with modules that build foundational understanding of technology design at the OS level.

Participants receive a formal course certificate supporting DoW and DIB qualification pathways upon completion.

Course Sequence

The POET curriculum is structured as a progressive ladder, where each level removes specific failure modes and prepares analysts for increasingly advanced offensive operations.

POET 100 - Foundations:

Basic embedded familiarity, tooling exposure, and firmware awareness

POET 200 - Analyst Discipline:

Evidence handling, ambiguity tolerance, and toll control that prevent exploitation failure

POET 300 - Architecture & Exploitation:

Flash extraction, execution reconstruction, and architecture-driven exploitation

Each level is intentionally incomplete on its own. Capability emerges from progression, not from skipping levels.

Who Should Attend?
  • Gold infinity symbol

    Defense contractors

  • Gold infinity symbol

    DIB technical SMEs

  • Gold infinity symbol

    OT and control systems engineers

  • Gold infinity symbol

    Military and governmet cyber personnel

  • Gold infinity symbol

    Cybersecurity professionals expanding into ICS/SCADA exploitation

Designed for technical practitioners with foundational knowledge in:

  • Gold infinity symbol

    Cybersecurity

  • Gold infinity symbol

    Network engineering

  • Gold infinity symbol

    Operational technology

Optional Add-on: Take Home Kit
Included Components
  • Gold infinity symbol
    Core Embedded Testbed Unit
  • Gold infinity symbol
    Patch Panel Interface
  • Gold infinity symbol
    Wiring Harness Kit
  • Gold infinity symbol
    I2C EEPROM Expansion Module
  • Gold infinity symbol
    SPI Flash Expansion Module
  • Gold infinity symbol
    Developer Quick Start Guide
Upcoming Classes
All Upcoming Trainings
POET Training Information Request
Interested in Additional Capabilities?

Infinity Labs LLC delivers both advanced technical solutions and business-focused advisory services across cyber and operational domains.

Technical & Engineering Services

  • Gold infinity symbol

    Cyber technology development for ICS/SCADA environments

  • Gold infinity symbol

    Cyber testbed design, development, and integration

  • Gold infinity symbol

    Modeling, simulation, and cyber experimentation platforms

  • Gold infinity symbol

    Applied cybersecurity engineering and analysis

Business & Advisory Services

  • Gold infinity symbol

    Cybersecurity strategy development for operational environments

  • Gold infinity symbol

    Business consulting on cyber program implementation and risk management

  • Gold infinity symbol

    Operational planning and program support for cyber initiatives

  • Gold infinity symbol

    Advisory services for integrating cyber capabilities into business and mission operations