• COURSES
    • Certified Ethical Hacker – Practical
    • Cyber-Security Career Development Program – Online
    • IT Fundamentals
    • CISSP Boot Camp
    • FISMA Compliance
    • All Courses
  • Program Descriptions
  • Membership
    • Member Services
    • Membership Levels
    • Membership Cancel
    • Membership Billing
  • Page
    • Services
    • Become a Mentor
    • Shop
    • About Us
    • Contact
    • Blog
    • FAQs
    Learn How to Become A Cyber Security Analyst, Class starts 1/18/2021.    Limited seats available.    Sign Up Now
    RegisterLogin
    PJ Cyber-Security SchoolPJ Cyber-Security School
    • COURSES
      • Certified Ethical Hacker – Practical
      • Cyber-Security Career Development Program – Online
      • IT Fundamentals
      • CISSP Boot Camp
      • FISMA Compliance
      • All Courses
    • Program Descriptions
    • Membership
      • Member Services
      • Membership Levels
      • Membership Cancel
      • Membership Billing
    • Page
      • Services
      • Become a Mentor
      • Shop
      • About Us
      • Contact
      • Blog
      • FAQs

      Career Development

      • Home
      • All courses
      • Career Development
      • Cyber-Security Career Development – Live Class

      Cyber-Security Career Development – Live Class

      POyelakin
      Career Development, Certification Studies, Ethical Hacking, IT Foundations, Live Class, Security Compliance, Security Engineering
      Forum
      (1 review)
      $6,999.99 $4,000.00
      Buy Membership
      • Overview
      • Curriculum
      • Instructor
      • Reviews

      Lanham– MD – Classes Start August 10 , 2020

      Hours:  Mon, Tues 7pm-9pm |  Sat 9am-11am

      (Expect to stay late if class runs over, especially in the first month)

      Program Duration: 6-9 Months (depending on your learning capacity)

      This is a Comprehensive Classroom Course Unlike any out there in the Industry. 

      Rather than watching our recorded lessons, this is your chance to receive Mentorship as a Service. Work hand in hand with a real information security professional. In order to stay on schedule, this program requires you dedicate 20 hours per week (on site and remote learning).

      Your mentor will teach you information security from the ground up. Our program will give you a competitive edge when you apply for cyber security jobs.  Your mentor is an information security professionals that will provide you with practical experiences to put on your resume. Below is our course breakdown:

      • Foundation IT Concepts and FISMA Compliance
        • We kick this phase off by catering to beginners. We will get you familiarized with basic IT terminologies and concepts.After learning foundation IT concepts, you will learn the process to make a network FISMA compliant. We will do this using the NIST Risk management Framework (RMF) for guidance. Think of FISMA compliance as the documentation side of Information Security (aka Cyber-security Policy). FISMA compliance is a requirement for all networks that hold government data. Learning this skill alone can provide you with a lucrative career!
      • Cyber security Engineering and Ethical Hacking
        • Once you’re done learning cyber-security policy, you will get some hands on keyboard experience!Phase 2 is where you will develop a home lab and learn how to use the popular security tools such as SPLUNK, Nessus and Wireshark. These are the most popular tools in use by major companies today. Upon learning how to use popular security tools, we will practice our hacking skills using Metasploit Framework, Shellter, and other hacking tools. You will learn to hack wired and wireless networks. If you can think like an hacker, you will be better suited to defend against them. Not to mention is will be impressive to discuss your hacking skills during your job interview ?
      • Career Development and Mentoring
          • Now that you have developed strong foundation skills in compliance and are technical, its time to get some credentials and gain some real world experience. Your mentor will provide you with a real world project to provide cyber security services for a real company. If you don’t have certifications, we will coach you on how to pass one or more of the following: Sec+, CEH and/or CISSP exams.
          • You will learn techniques to writing an effective resume
          • Learn how to interview for positions
          • Access all our resources for job placement.

      If you’re ready, let’s get started!

      Course Features

      • Lectures 131
      • Quizzes 44
      • Skill level All Level
      • Language English
      • Students 371
      • Certificate Yes
      • Assessments Self
      CoursesSecurity EngineeringCyber-Security Career Development – Live Class
      • PHASE 1 - CHAPTER 1 - IT FOUNDATIONS 23

        • Lecture1.1
          Chapter 1.1 How to Become a Cyber Security Analyst 05 min
        • Lecture1.2
          Chapter 1.2 What is a Network 06 min
        • Quiz1.1
          Career Dev Live – 1.2 Quiz 6 questions
        • Lecture1.3
          Chapter 1.3 Components of an Enterprise Part 1 06 min
        • Quiz1.2
          1.3 Questions 6 questions
        • Lecture1.4
          Chapter 1.4 Components of an Enterprise Part 2 06 min
        • Quiz1.3
          1.4 Questions 5 questions
        • Lecture1.5
          Chapter 1.5 Components of an Enterprise Network Part 3 06 min
        • Quiz1.4
          1.5 Questions 6 questions
        • Lecture1.6
          Chapter 1.6 The Physical Components of a Network Part 4- Bennefits of Servers
        • Quiz1.5
          1.6 Questions 5 questions
        • Lecture1.7
          Chapter 1.7 What is the Internet 04 min
        • Quiz1.6
          1.7 Questions 5 questions
        • Lecture1.8
          Chapter 1.8 The Human Component of an Enterprise Network Part 1 05 min
        • Quiz1.7
          1.8 Questions 5 questions
        • Lecture1.9
          Chapter 1.9 The Human Component of an Enterprise Network Part 2 06 min
        • Quiz1.8
          1.9 Questions 7 questions
        • Lecture1.10
          Chapter 1.10 THE HUMAN COMPONENT OF IT SUPPORT 06 min
        • Quiz1.9
          1.10 Questions 5 questions
        • Lecture1.11
          Chapter 1.11 Introduction to our Simulated Environment- Meet the IT Operations Team 06 min
        • Quiz1.10
          1.11 Questions 5 questions
        • Lecture1.12
          Chapter 1.12 Introduction to our simulated environment- Meet the IT Security Team 06 min
        • Quiz1.11
          1.12 Questions 5 questions
      • PHASE 1 - CHAPTER 2 - RMF STEP 1-3 40

        • Lecture2.1
          Chapter 2.1 INTRODUCTION TO SECURITY COMPLIANCE AND FISMA REQUIREMENTS 06 min
        • Quiz2.1
          2.1 Questions 5 questions
        • Lecture2.2
          Chapter 2.2 RMF STEP 1 – SECURITY CATEGORIZATION 05 min
        • Quiz2.2
          2.2 Questions 6 questions
        • Lecture2.3
          Chapter 2.3 Security Categorization Part 2 07 min
        • Quiz2.3
          2.3 Questions 6 questions
        • Lecture2.4
          Chapter 2.4 RMF STEP 1- SECURITY CATEGORIZATION PART 3 05 min
        • Quiz2.4
          2.4 Questions 6 questions
        • Lecture2.5
          Chapter 2.5 COMPENTS OF A SYSTEM AND TECHNICAL DESCRIPTION 05 min
        • Quiz2.5
          2.5 Questions 7 questions
        • Lecture2.6
          Chapter 2.6 COMPONENTS OF A SYSTEM TECHNICAL DESCRIPTION PART 2 05 min
        • Quiz2.6
          2.6 Questions 5 questions
        • Lecture2.7
          Chapter 2.7 RMF STEP 2 – SELECT SECURITY CONTROLS 05 min
        • Quiz2.7
          2.7 Questions 5 questions
        • Lecture2.8
          Chapter 2.8 RMF STEP 3 – IMPLEMENTING SECURITY CONTROLS 05 min
        • Quiz2.8
          2.8 Questions 5 questions
        • Lecture2.9
          Chapter 2.9 Pep Talk-Intro to the SSP simulation 05 min
        • Quiz2.9
          Career Dev Live – Pep Talk 4 questions
        • Lecture2.10
          Chapter 2.10 SSP Simulation – Editing the Cover Page 06 min
        • Assignment2.1
          Career Dev Live – SSP Cover Lab 0 day
        • Lecture2.11
          Chapter 2.11 SSP Simulation – Editing Security Categorization 06 min
        • Assignment2.2
          Career Dev Live – Security categorization Lab 0 day
        • Lecture2.12
          Chapter 2.12 How to Determine your Digital Identity Levels – Part 1 06 min
        • Quiz2.10
          Career Dev Live – Digital Identity QUIZ 8 questions
        • Lecture2.13
          Chapter 2.12.1 How to Determine your Digital Identity Levels – Part 2
        • Lecture2.14
          Chapter 2.12.2 How to Determine your Digital Identity Levels – Part 3
        • Lecture2.15
          Chapter 2.13 SSP Simulation – Completing Digital Identity
        • Assignment2.3
          Career Dev Live – Digital Identity Lab 0 day
        • Lecture2.16
          Chapter 2.13.1 SSP Simulation – Completing POC Sections
        • Lecture2.17
          Chapter 2.14 SSP Simulation – Completing the General System Description and User Types 06 min
        • Assignment2.4
          Career Dev Live – General system description Lab 0 day
        • Lecture2.18
          Chapter 2.15 SSP Simulation – Describing the Network Architecture, Envrionment and Inventory 05 min
        • Assignment2.5
          Career Dev Live – System Architecture Lab 0 day
        • Lecture2.19
          Chapter 2.16 SSP Simulation – System interconnection, Laws and regulations 06 min
        • Assignment2.6
          Career Dev Live – System Interconnection Lab 0 day
        • Lecture2.20
          Chapter 2.17 SSP Simulation – Selecting Controls-RMF STEP 2 04 min
        • Assignment2.7
          Career Dev Live – Select Security Controls Lab 0 day
        • Lecture2.21
          Chapter 2.18_SSP Simulation – Implementing the security controls_RMF Step 3 04 min
        • Lecture2.22
          Chapter 2.19_SSP Simulation – Implementing the security controls part 2
        • Assignment2.8
          Career Dev Live Implement Sec Controls Lab 0 day
      • PHASE 1- CHAPTER 3 RMF STEPS 4-5 21

        • Lecture3.1
          Chapter 3.1_RMF STEP 4 ASSESSING SECURITY CONTROLS PART 1 10 min
        • Quiz3.1
          3.1 Questions 5 questions
        • Lecture3.2
          Chapter 3.2 The Security Assessment Report – From Objective to Assessment Result 13 min
        • Quiz3.2
          3.2 Questions 5 questions
        • Lecture3.3
          Chapter 3.3 THE SECURITY ASSESSMENT REPORT CONTD 10 min
        • Quiz3.3
          3.3 Questions 5 questions
        • Lecture3.4
          Chapter 3.4 RMF STEP 5 AUTHORIZE THE INFORMATION SYSTEM 08 min
        • Quiz3.4
          3.4 Questions 5 questions
        • Lecture3.5
          Chapter 3.5 RMF STEP 5 CONTD & RMF STEP 6 – MONITOR THE SECURITY CONTROLS 10 min
        • Quiz3.5
          3.5 Questions 5 questions
        • Lecture3.6
          Chapter 3.6 Asessment Simulation – Introductions and preparation for the assessment 10 min
        • Lecture3.7
          Chapter 3.7 Sample security assessment kick off Meeting 10 min
        • Assignment3.1
          Career Dev Live – SAP and Kick Off Lab 0 day
        • Lecture3.8
          Chapter 3.8_Security Assessment Simulation – Completing the SAR 10 min
        • Lecture3.9
          Chapter 3.9 Assessment simulation – completing the SAR part 2 10 min
        • Assignment3.2
          Career Dev Live – Security Assessment Lab 0 day
        • Lecture3.10
          Chapter 3.10 Security Assessment simulation – Introduction to the POA&M 10 min
        • Lecture3.11
          Chapter 3.11 Security Assessment simulation – POA&M Review Part 2 10 min
        • Assignment3.3
          Career Dev Live – POA&M Lab 0 day
        • Lecture3.12
          Chapter 3.12 Security Assessment simulation – Submit the Authorization Package (RMF Step 5) and receive the ATO 10 min
        • Lecture3.13
          Chapter 3.13 Phase 1 Completion – Pep Talk! 10 min
      • PHASE 2 - SECURITY ENGINEERING & ETHICAL HACKING 28

        • Lecture4.1
          Chapter 4.0_Introduction to Phase 2: Security Engineering and Ethical Hacking 05 min
        • Lecture4.2
          Chapter 4.1 Introduction to Virtual Machines 06 min
        • Quiz4.1
          4.1 Questions 5 questions
        • Lecture4.3
          Chapter 4.2 VMware Installation 03 min
        • Assignment4.1
          4.2lab 0 day
        • Lecture4.4
          Chapter 4.3 Kali Linux Installation 06 min
        • Assignment4.2
          4.3 Lab 0 day
        • Lecture4.5
          Chapter 4.4 Windows 10 Installation 07 min
        • Assignment4.3
          4.4 Lab 0 day
        • Lecture4.6
          Chapter 4.5 Introduction to Splunk 06 min
        • Quiz4.2
          4.5 Questions 5 questions
        • Lecture4.7
          Chapter 4.6 Splunk Installation and Splunk App 07 min
        • Assignment4.4
          4.6 Lab 0 day
        • Lecture4.8
          Career Dev Live Introduction to Subnetting Part 1 06 min
        • Lecture4.9
          Career Dev Live Introduction to Subnetting Part 2 06 min
        • Quiz4.3
          4.7 Questions 5 questions
        • Lecture4.10
          Chapter 4.8 Maping Your Lab Network 06 min
        • Assignment4.5
          4.8 Lab 0 day
        • Lecture4.11
          Chapter 4.9 Install Splunk Forwarders Part 1 06 min
        • Assignment4.6
          4.9 Lab 0 day
        • Lecture4.12
          Chapter 4.10 Install SPLUNK Forwarders Part 2 08 min
        • Assignment4.7
          4.10 Lab 0 day
        • Lecture4.13
          Chapter 4.11 Install SPLUNK Forwarders Part 4 05 min
        • Assignment4.8
          4.11 lab 3 days
        • Lecture4.14
          Chapter 4.12 Searching with SPLUNK 06 min
        • Assignment4.9
          4.12 Lab 0 day
        • Lecture4.15
          Chapter 4.13 Splunk Report and Dashboard 06 min
        • Assignment4.10
          4.13 Lab 0 day
      • PHASE 2 - CHAPTER 5 INTRO TO OSI MODEL 28

        • Lecture5.1
          Chapter 5.1 Introduction to the OSI Model Using Real World Examples 06 min
        • Quiz5.1
          5.1 Questions 8 questions
        • Lecture5.2
          Chapter 5.2 Data Packets, 3 Way Handshake and ARP 05 min
        • Quiz5.2
          5.2 Questions 6 questions
        • Lecture5.3
          Chapter 5.3 Introduction to WireShark 04 min
        • Quiz5.3
          5.3 Questions 4 questions
        • Lecture5.4
          Chapter 5.4 Install Wireshark and start data capture
        • Assignment5.1
          5.4 Lab 0 day
        • Lecture5.5
          Chapter 5.5 Wireshark Filters and Windows 06 min
        • Assignment5.2
          5.5 Lab 0 day
        • Lecture5.6
          Chapter 5.6 TCP Close Connection, TCP Flags & Intrusion Detection 05 min
        • Quiz5.4
          5.6 Questions 8 questions
        • Lecture5.7
          Chapter 5.7 Isolating Wireshark Traffic and Saving Files 06 min
        • Assignment5.3
          5.7 Lab 0 day
        • Lecture5.8
          Chapter 5.8 Wireshark Flags SSL traffic 06 min
        • Assignment5.4
          5.8 Lab 0 day
        • Lecture5.9
          Chapter 5.9 Detecting Attacks with Wireshark Intro to Nmap 05 min
        • Quiz5.5
          5.9 Questions 9 questions
        • Lecture5.10
          Chapter 5.10 Identifying a Host Discovery Scan on Wireshark 06 min
        • Assignment5.5
          5.10 Lab 0 day
        • Lecture5.11
          CHAPTER 5.11 IDENTIFYING A PORT SCAN ON WIRESHARK 06 min
        • Assignment5.6
          5.11 Lab 0 day
        • Lecture5.12
          CHAPTER 5.12 IDENTIFYING AN PORT SCAN ON WIRESHARK PART 2 06 min
        • Assignment5.7
          5.12 Lab 0 day
        • Lecture5.13
          CHAPTER 5.13 IDENTIFYING A SERVICE SCAN ON WIRESHARK. 05 min
        • Assignment5.8
          5.13 lab 0 day
        • Lecture5.14
          Chapter 5.14 Identifying an Aggressive Scan on Wireshark 06 min
        • Assignment5.9
          5.14 Lab 0 day
      • PHASE 2 - CHAPTER 6 INTRO TO NESSUS 18

        • Lecture6.1
          Chapter 6.1 Introduction to Nessus 05 min
        • Quiz6.1
          6.1 Questions 5 questions
        • Lecture6.2
          Chapter 6.2 Host Discovery Scan with Nessus 07 min
        • Assignment6.1
          6.2 Lab 0 day
        • Lecture6.3
          Chapter 6.3 Host Discovery Scan with Nessus Part 2 03 min
        • Assignment6.2
          6.3 Lab 0 day
        • Lecture6.4
          CHAPTER 6.4 BASIC NETWORK SCAN WITH NESSUS 06 min
        • Assignment6.3
          6.4 Lab 0 day
        • Lecture6.5
          CHAPTER 6.5 Credential Network Scan with Nessus. 06 min
        • Assignment6.4
          6.5 Lab 0 day
        • Lecture6.6
          CHAPTER 6.6 VULNERABILITY REPORT AND MANAGEMENT 06 min
        • Assignment6.5
          6.6 Lab 0 day
        • Lecture6.7
          Chapter 6.7 WIN 2016 SERVER VM INSTALLATION. 06 min
        • Assignment6.6
          6.7 Lab 0 day
        • Lecture6.8
          CHAPTER 6.8 AD INSTALLATION AND TROUBLESHOOTING A SLOW COMPUTER. 05 min
        • Assignment6.7
          6.8 Lab 0 day
        • Lecture6.9
          CHAPTER 6.9 CREATING AD ACCOUNTS AND MACHINES 06 min
        • Assignment6.8
          6.9 Lab 0 day
      • PHASE 2 - CHAPTER 7 ETHICAL HACKING 20

        • Lecture7.1
          Chapter 7.1 Introduction to Ethical Hacking 05 min
        • Quiz7.1
          7.1 Questions 5 questions
        • Lecture7.2
          Chapter 7.2 Active Passive Recon and Scanning 05 min
        • Quiz7.2
          7.2 Questions 5 questions
        • Lecture7.3
          Chapter 7.3 Introduction to Netcraft Archive PIPL and HTTRACK 06 min
        • Assignment7.1
          7.3 Lab 0 day
        • Lecture7.4
          Chapter 7.4 Introduction to Maltego 06 min
        • Assignment7.2
          7.4 Lab 0 day
        • Lecture7.5
          Chapter 7.5 Introduction to NAT 06 min
        • Quiz7.3
          7.5 Questions 6 questions
        • Lecture7.6
          Chapter 7.6 Metagoofil and Email Tracker 06 min
        • Assignment7.3
          7.6 Lab 0 day
        • Lecture7.7
          chapter 7.7 Nmap Basic Scan (Review) 05 min
        • Assignment7.4
          7.7 Lab 0 day
        • Lecture7.8
          Chapter 7.8 Nmap Scripting Engine 05 min
        • Assignment7.5
          7.8 Lab 0 day
        • Lecture7.9
          Chapter 7.9 Introduction To Malware 04 min
        • Quiz7.4
          7.9 Questions 6 questions
        • Lecture7.10
          Chapter 7.10 How to Create a Computer Virus 06 min
        • Assignment7.6
          7.10 Lab 0 day
      • PHASE 2 - CHAPTER 8 METASPLOIT, VELT AND SHELLTER 15

        • Lecture8.1
          Chapter 8.1 Intro to Metasploit, veil and Shellter 05 min
        • Quiz8.1
          8.1 Questions 5 questions
        • Lecture8.2
          Chapter 8.2 Backdoor Preparation OS Update and Veil Install 05 min
        • Lecture8.3
          Chapter 8.3 Reverse TCP Exploit (backdoor) Using Veil and Mestasploit 06 min
        • Assignment8.1
          8.3 Lab 0 day
        • Lecture8.4
          Chapter 8.4 Reverse TCP (Backdoor) exploit with AV off 04 min
        • Assignment8.2
          8.4 Lab 0 day
        • Lecture8.5
          Chapter 8.5 Backdoor exploit with AV turned on 06 min
        • Assignment8.3
          8.5 Lab 0 day
        • Lecture8.6
          Chapter 8.6 Meterpreter command examples after gaining access 06 min
        • Assignment8.4
          8.6 Lab 0 day
        • Lecture8.7
          Chapter 8.7 Introduction to wireless technology 05 min
        • Quiz8.2
          8.7 Questions 6 questions
        • Lecture8.8
          Chapter 8.8 Hacking a Hidden SSID 06 min
        • Assignment8.5
          8.8 Lab 0 day
      • PHASE 2 - CHAPTER 9 PERSISTENCE CONNECTION AND DHCP 12

        • Lecture9.1
          Chapter 9.1 Intro to Persistence Connection and DHCP 05 min
        • Quiz9.1
          9.1 Questions 6 questions
        • Lecture9.2
          Chapter 9.2 Persistence Connection part 1 04 min
        • Assignment9.1
          9.2 Lab 0 day
        • Lecture9.3
          Chapter 9.3 Hacking Pep Talk and explanations 06 min
        • Assignment9.2
          9.3 Lab 0 day
        • Lecture9.4
          Chapter 9.4 Persistence Connection using MOF 06 min
        • Assignment9.3
          9.4 Lab 0 day
        • Lecture9.5
          Chapter 9.5 Intro to Cracking Wireless Security Protocols (WEP, WPA, WPA2) 05 min
        • Quiz9.2
          9.5 Questions 5 questions
        • Lecture9.6
          Chapter 9.6 Cracking Wireless (WPA2) Passwords 04 min
        • Assignment9.4
          9.6 Lab 0 day
      • PHASE 2 - CHAPTER 10 COVERING TRACKS 10

        • Lecture10.1
          Chapter 10.1 Introduction to Covering Tracks 06 min
        • Quiz10.1
          10.1 Questions 5 questions
        • Lecture10.2
          Chapter 10.2 Clearing event logs 06 min
        • Assignment10.1
          10.2 Lab 0 day
        • Lecture10.3
          Chapter 10.3 Combining your payload with Jpeg 05 min
        • Assignment10.2
          10.3 Lab 0 day
        • Lecture10.4
          Chapter 10.4 Combining your payload with Excel 06 min
        • Assignment10.3
          10.4 Lab 0 day
        • Lecture10.5
          Chapter 10.5 Phishing Wifi Password with Wifiphisher 06 min
        • Assignment10.4
          10.5 Lab 0 day
      • PHASE 3 - CAREER DEVELOPMENT 23

        • Lecture11.1
          Chapter 11 INTRODUCTION TO PHASE 3 – CAREER DEVELOPMENT
        • Lecture11.2
          Chapter 11.1 BRIEF DESCRIPTION OF THE MENTORSHIP PROGRAM
        • Lecture11.3
          Chapter 11.2 INTRO TO YOUR TRUE-TO-LIFE-PROJECTS
        • Lecture11.4
          Chapter 11.3 PROJECT 1 – SYSTEM A&A PROJECT
        • Lecture11.5
          CHAPTER 11.4 PROJECT 2 – VULNERABILITY MANAGEMENT INTRODUCTION
        • Assignment11.1
          VMP introduction Assignment 3 days
        • Lecture11.6
          Chapter 11.5 POJECT 2 – VMP – VULNERABILITY ANALYSIS
        • Assignment11.2
          VMP Vulnerability Analysis Assignment 3 days
        • Lecture11.7
          Chapter 11.6 PROJECT 2 – VMP – INTRO TO PIVOT TABLES
        • Assignment11.3
          VMP – PIVOT Table Assignment 3 days
        • Lecture11.8
          Chapter 11.7 PROJECT 2 – VMP – SUBMITTING CHANGE REQUESTS
        • Assignment11.4
          VMP – Change Request Assingment 3 days
        • Lecture11.9
          Chapter 11.8 PROJECT 2 – VMP – TRACK AND FOLLOW UP ON REMEDIATIONS
        • Assignment11.5
          VMP Remediation follow up Assignment 3 days
        • Lecture11.10
          Chapter 11.9 PROJECT 2 – VMP – DRAFT A VULNERABILITY ANALYSIS REPORT
        • Assignment11.6
          VMP Vulnerability Report Assignment 3 days
        • Lecture11.11
          Chapter 11.10 Part 1 – Intro to Project 3 – SPLUNK App for Windows Infrastructure
        • Lecture11.12
          Chapter 11.10.1 Part 2 – Intro to Project 3 – SPLUNK App for Windows Infrastructure
        • Lecture11.13
          Chapter 11.11 Pep talk_ Project Expectations
        • Lecture11.14
          Chapter 11.12 PROJECT 3 – PLAN AND BUILD YOUR INFRASTRUCTURE FOR DEPLOYMENT
        • Lecture11.15
          Chapter 11.13 Project 3 – Creating the SPLUNK service account and configure with group policy
        • Lecture11.16
          Chapter 11.14 Project 3 – Install SPLUNK Enterprise and Add the Splunk License
        • Lecture11.17
          Chapter 11.15 Project 3 – Set up Basic Infrastructure
      POyelakin

      Reviews

      Average Rating

      5
      1 rating

      Detailed Rating

      5
      100%
      4
      0%
      3
      0%
      2
      0%
      1
      0%
      • Victoria Okoro

        Excellent and Best Program

        I am happily rating PJ pros 5star. I must say this is an awesome program I will recommend to anyone. The fluency and style of teaching helps anyone on different level understand cyber security. Great and intelligent instructors make learning interesting with a mentorship scheme that guides you all the way I am truly happy.

      • Overview
      • Curriculum
      • Instructor
      • Reviews
      $6,999.99 $4,000.00
      Buy Membership
      • Share:

      You May Like

      Certified Ethical Hacker – Practical Read More
      POyelakin

      Certified Ethical Hacker - Practical

      1
      0
      $3,000.00 $2,500.00
      Cyber-Security LAB Preparation Read More
      POyelakin

      Cyber-Security LAB Preparation

      215
      0
      Free
      Fundamentals of IT and Cyber-Security Support Read More
      POyelakin

      Fundamentals of IT and Cyber-Security Support

      650
      0
      Free
      CISSP Boot Camp Read More
      Ezenta Nwagwu

      CISSP Boot Camp

      60
      0
      $6,000.00 $3,500.00
      Security+ Boot Camp Read More
      Jerran

      Security+ Boot Camp

      70
      0
      $3,900.00 $2,500.00

      Leave A Reply Cancel reply

      Your email address will not be published. Required fields are marked *

      All Courses

      • Career Development
      • Certification Studies
      • Ethical Hacking
      • IT Foundations
      • Learn Fisma Compliance
      • Live Class
      • Security Compliance
      • Security Engineering

      Latest Courses

      Certified Ethical Hacker – Practical

      Certified Ethical Hacker – Practical

      $3,000.00 $2,500.00
      Cyber-Security LAB Preparation

      Cyber-Security LAB Preparation

      Free
      Fundamentals of IT and Cyber-Security Support

      Fundamentals of IT and Cyber-Security Support

      Free
      301-576-2977
      info@pjpros.com

      8401 Good Luck Rd.
      Rm 202 Lanham, MD 20706

      Facebook-f
      Youtube
      Linkedin
      Twitter
      Instagram

      Company

      • About Us
      • Blog
      • Contact
      • Become a Mentor

      Links

      • Courses
      • Events
      • Gallery
      • FAQs

      Support

      • Member Services
      • Forums
      • Technical Support
      • Billing

      Services

      • Information Security Services
      • IT Project management
      • Cybersecurity Training
      • Mentorship

      © Copyright - PJ Professional IT Services 

      • Privacy
      • Terms

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account

      Are you a member? Login now

      Modal title

      Message modal