Cyber-Security Career Development – Live Class
Lanham– MD – Classes Start August 10 , 2020
Hours: Mon, Tues 7pm-9pm | Sat 9am-11am
(Expect to stay late if class runs over, especially in the first month)
Program Duration: 6-9 Months (depending on your learning capacity)
This is a Comprehensive Classroom Course Unlike any out there in the Industry.
Rather than watching our recorded lessons, this is your chance to receive Mentorship as a Service. Work hand in hand with a real information security professional. In order to stay on schedule, this program requires you dedicate 20 hours per week (on site and remote learning).
Your mentor will teach you information security from the ground up. Our program will give you a competitive edge when you apply for cyber security jobs. Your mentor is an information security professionals that will provide you with practical experiences to put on your resume. Below is our course breakdown:
- Foundation IT Concepts and FISMA Compliance
- We kick this phase off by catering to beginners. We will get you familiarized with basic IT terminologies and concepts.After learning foundation IT concepts, you will learn the process to make a network FISMA compliant. We will do this using the NIST Risk management Framework (RMF) for guidance. Think of FISMA compliance as the documentation side of Information Security (aka Cyber-security Policy). FISMA compliance is a requirement for all networks that hold government data. Learning this skill alone can provide you with a lucrative career!
- Cyber security Engineering and Ethical Hacking
- Once you’re done learning cyber-security policy, you will get some hands on keyboard experience!Phase 2 is where you will develop a home lab and learn how to use the popular security tools such as SPLUNK, Nessus and Wireshark. These are the most popular tools in use by major companies today. Upon learning how to use popular security tools, we will practice our hacking skills using Metasploit Framework, Shellter, and other hacking tools. You will learn to hack wired and wireless networks. If you can think like an hacker, you will be better suited to defend against them. Not to mention is will be impressive to discuss your hacking skills during your job interview ?
- Career Development and Mentoring
-
- Now that you have developed strong foundation skills in compliance and are technical, its time to get some credentials and gain some real world experience. Your mentor will provide you with a real world project to provide cyber security services for a real company. If you don’t have certifications, we will coach you on how to pass one or more of the following: Sec+, CEH and/or CISSP exams.
- You will learn techniques to writing an effective resume
- Learn how to interview for positions
- Access all our resources for job placement.
-
If you’re ready, let’s get started!
Course Features
- Lectures 131
- Quizzes 44
- Skill level All Level
- Language English
- Students 371
- Certificate Yes
- Assessments Self
-
PHASE 1 - CHAPTER 1 - IT FOUNDATIONS
- Chapter 1.1 How to Become a Cyber Security Analyst
- Chapter 1.2 What is a Network
- Career Dev Live – 1.2 Quiz
- Chapter 1.3 Components of an Enterprise Part 1
- 1.3 Questions
- Chapter 1.4 Components of an Enterprise Part 2
- 1.4 Questions
- Chapter 1.5 Components of an Enterprise Network Part 3
- 1.5 Questions
- Chapter 1.6 The Physical Components of a Network Part 4- Bennefits of Servers
- 1.6 Questions
- Chapter 1.7 What is the Internet
- 1.7 Questions
- Chapter 1.8 The Human Component of an Enterprise Network Part 1
- 1.8 Questions
- Chapter 1.9 The Human Component of an Enterprise Network Part 2
- 1.9 Questions
- Chapter 1.10 THE HUMAN COMPONENT OF IT SUPPORT
- 1.10 Questions
- Chapter 1.11 Introduction to our Simulated Environment- Meet the IT Operations Team
- 1.11 Questions
- Chapter 1.12 Introduction to our simulated environment- Meet the IT Security Team
- 1.12 Questions
-
PHASE 1 - CHAPTER 2 - RMF STEP 1-3
- Chapter 2.1 INTRODUCTION TO SECURITY COMPLIANCE AND FISMA REQUIREMENTS
- 2.1 Questions
- Chapter 2.2 RMF STEP 1 – SECURITY CATEGORIZATION
- 2.2 Questions
- Chapter 2.3 Security Categorization Part 2
- 2.3 Questions
- Chapter 2.4 RMF STEP 1- SECURITY CATEGORIZATION PART 3
- 2.4 Questions
- Chapter 2.5 COMPENTS OF A SYSTEM AND TECHNICAL DESCRIPTION
- 2.5 Questions
- Chapter 2.6 COMPONENTS OF A SYSTEM TECHNICAL DESCRIPTION PART 2
- 2.6 Questions
- Chapter 2.7 RMF STEP 2 – SELECT SECURITY CONTROLS
- 2.7 Questions
- Chapter 2.8 RMF STEP 3 – IMPLEMENTING SECURITY CONTROLS
- 2.8 Questions
- Chapter 2.9 Pep Talk-Intro to the SSP simulation
- Career Dev Live – Pep Talk
- Chapter 2.10 SSP Simulation – Editing the Cover Page
- Career Dev Live – SSP Cover Lab
- Chapter 2.11 SSP Simulation – Editing Security Categorization
- Career Dev Live – Security categorization Lab
- Chapter 2.12 How to Determine your Digital Identity Levels – Part 1
- Career Dev Live – Digital Identity QUIZ
- Chapter 2.12.1 How to Determine your Digital Identity Levels – Part 2
- Chapter 2.12.2 How to Determine your Digital Identity Levels – Part 3
- Chapter 2.13 SSP Simulation – Completing Digital Identity
- Career Dev Live – Digital Identity Lab
- Chapter 2.13.1 SSP Simulation – Completing POC Sections
- Chapter 2.14 SSP Simulation – Completing the General System Description and User Types
- Career Dev Live – General system description Lab
- Chapter 2.15 SSP Simulation – Describing the Network Architecture, Envrionment and Inventory
- Career Dev Live – System Architecture Lab
- Chapter 2.16 SSP Simulation – System interconnection, Laws and regulations
- Career Dev Live – System Interconnection Lab
- Chapter 2.17 SSP Simulation – Selecting Controls-RMF STEP 2
- Career Dev Live – Select Security Controls Lab
- Chapter 2.18_SSP Simulation – Implementing the security controls_RMF Step 3
- Chapter 2.19_SSP Simulation – Implementing the security controls part 2
- Career Dev Live Implement Sec Controls Lab
-
PHASE 1- CHAPTER 3 RMF STEPS 4-5
- Chapter 3.1_RMF STEP 4 ASSESSING SECURITY CONTROLS PART 1
- 3.1 Questions
- Chapter 3.2 The Security Assessment Report – From Objective to Assessment Result
- 3.2 Questions
- Chapter 3.3 THE SECURITY ASSESSMENT REPORT CONTD
- 3.3 Questions
- Chapter 3.4 RMF STEP 5 AUTHORIZE THE INFORMATION SYSTEM
- 3.4 Questions
- Chapter 3.5 RMF STEP 5 CONTD & RMF STEP 6 – MONITOR THE SECURITY CONTROLS
- 3.5 Questions
- Chapter 3.6 Asessment Simulation – Introductions and preparation for the assessment
- Chapter 3.7 Sample security assessment kick off Meeting
- Career Dev Live – SAP and Kick Off Lab
- Chapter 3.8_Security Assessment Simulation – Completing the SAR
- Chapter 3.9 Assessment simulation – completing the SAR part 2
- Career Dev Live – Security Assessment Lab
- Chapter 3.10 Security Assessment simulation – Introduction to the POA&M
- Chapter 3.11 Security Assessment simulation – POA&M Review Part 2
- Career Dev Live – POA&M Lab
- Chapter 3.12 Security Assessment simulation – Submit the Authorization Package (RMF Step 5) and receive the ATO
- Chapter 3.13 Phase 1 Completion – Pep Talk!
-
PHASE 2 - SECURITY ENGINEERING & ETHICAL HACKING
- Chapter 4.0_Introduction to Phase 2: Security Engineering and Ethical Hacking
- Chapter 4.1 Introduction to Virtual Machines
- 4.1 Questions
- Chapter 4.2 VMware Installation
- 4.2lab
- Chapter 4.3 Kali Linux Installation
- 4.3 Lab
- Chapter 4.4 Windows 10 Installation
- 4.4 Lab
- Chapter 4.5 Introduction to Splunk
- 4.5 Questions
- Chapter 4.6 Splunk Installation and Splunk App
- 4.6 Lab
- Career Dev Live Introduction to Subnetting Part 1
- Career Dev Live Introduction to Subnetting Part 2
- 4.7 Questions
- Chapter 4.8 Maping Your Lab Network
- 4.8 Lab
- Chapter 4.9 Install Splunk Forwarders Part 1
- 4.9 Lab
- Chapter 4.10 Install SPLUNK Forwarders Part 2
- 4.10 Lab
- Chapter 4.11 Install SPLUNK Forwarders Part 4
- 4.11 lab
- Chapter 4.12 Searching with SPLUNK
- 4.12 Lab
- Chapter 4.13 Splunk Report and Dashboard
- 4.13 Lab
-
PHASE 2 - CHAPTER 5 INTRO TO OSI MODEL
- Chapter 5.1 Introduction to the OSI Model Using Real World Examples
- 5.1 Questions
- Chapter 5.2 Data Packets, 3 Way Handshake and ARP
- 5.2 Questions
- Chapter 5.3 Introduction to WireShark
- 5.3 Questions
- Chapter 5.4 Install Wireshark and start data capture
- 5.4 Lab
- Chapter 5.5 Wireshark Filters and Windows
- 5.5 Lab
- Chapter 5.6 TCP Close Connection, TCP Flags & Intrusion Detection
- 5.6 Questions
- Chapter 5.7 Isolating Wireshark Traffic and Saving Files
- 5.7 Lab
- Chapter 5.8 Wireshark Flags SSL traffic
- 5.8 Lab
- Chapter 5.9 Detecting Attacks with Wireshark Intro to Nmap
- 5.9 Questions
- Chapter 5.10 Identifying a Host Discovery Scan on Wireshark
- 5.10 Lab
- CHAPTER 5.11 IDENTIFYING A PORT SCAN ON WIRESHARK
- 5.11 Lab
- CHAPTER 5.12 IDENTIFYING AN PORT SCAN ON WIRESHARK PART 2
- 5.12 Lab
- CHAPTER 5.13 IDENTIFYING A SERVICE SCAN ON WIRESHARK.
- 5.13 lab
- Chapter 5.14 Identifying an Aggressive Scan on Wireshark
- 5.14 Lab
-
PHASE 2 - CHAPTER 6 INTRO TO NESSUS
- Chapter 6.1 Introduction to Nessus
- 6.1 Questions
- Chapter 6.2 Host Discovery Scan with Nessus
- 6.2 Lab
- Chapter 6.3 Host Discovery Scan with Nessus Part 2
- 6.3 Lab
- CHAPTER 6.4 BASIC NETWORK SCAN WITH NESSUS
- 6.4 Lab
- CHAPTER 6.5 Credential Network Scan with Nessus.
- 6.5 Lab
- CHAPTER 6.6 VULNERABILITY REPORT AND MANAGEMENT
- 6.6 Lab
- Chapter 6.7 WIN 2016 SERVER VM INSTALLATION.
- 6.7 Lab
- CHAPTER 6.8 AD INSTALLATION AND TROUBLESHOOTING A SLOW COMPUTER.
- 6.8 Lab
- CHAPTER 6.9 CREATING AD ACCOUNTS AND MACHINES
- 6.9 Lab
-
PHASE 2 - CHAPTER 7 ETHICAL HACKING
- Chapter 7.1 Introduction to Ethical Hacking
- 7.1 Questions
- Chapter 7.2 Active Passive Recon and Scanning
- 7.2 Questions
- Chapter 7.3 Introduction to Netcraft Archive PIPL and HTTRACK
- 7.3 Lab
- Chapter 7.4 Introduction to Maltego
- 7.4 Lab
- Chapter 7.5 Introduction to NAT
- 7.5 Questions
- Chapter 7.6 Metagoofil and Email Tracker
- 7.6 Lab
- chapter 7.7 Nmap Basic Scan (Review)
- 7.7 Lab
- Chapter 7.8 Nmap Scripting Engine
- 7.8 Lab
- Chapter 7.9 Introduction To Malware
- 7.9 Questions
- Chapter 7.10 How to Create a Computer Virus
- 7.10 Lab
-
PHASE 2 - CHAPTER 8 METASPLOIT, VELT AND SHELLTER
- Chapter 8.1 Intro to Metasploit, veil and Shellter
- 8.1 Questions
- Chapter 8.2 Backdoor Preparation OS Update and Veil Install
- Chapter 8.3 Reverse TCP Exploit (backdoor) Using Veil and Mestasploit
- 8.3 Lab
- Chapter 8.4 Reverse TCP (Backdoor) exploit with AV off
- 8.4 Lab
- Chapter 8.5 Backdoor exploit with AV turned on
- 8.5 Lab
- Chapter 8.6 Meterpreter command examples after gaining access
- 8.6 Lab
- Chapter 8.7 Introduction to wireless technology
- 8.7 Questions
- Chapter 8.8 Hacking a Hidden SSID
- 8.8 Lab
-
PHASE 2 - CHAPTER 9 PERSISTENCE CONNECTION AND DHCP
- Chapter 9.1 Intro to Persistence Connection and DHCP
- 9.1 Questions
- Chapter 9.2 Persistence Connection part 1
- 9.2 Lab
- Chapter 9.3 Hacking Pep Talk and explanations
- 9.3 Lab
- Chapter 9.4 Persistence Connection using MOF
- 9.4 Lab
- Chapter 9.5 Intro to Cracking Wireless Security Protocols (WEP, WPA, WPA2)
- 9.5 Questions
- Chapter 9.6 Cracking Wireless (WPA2) Passwords
- 9.6 Lab
-
PHASE 2 - CHAPTER 10 COVERING TRACKS
-
PHASE 3 - CAREER DEVELOPMENT
- Chapter 11 INTRODUCTION TO PHASE 3 – CAREER DEVELOPMENT
- Chapter 11.1 BRIEF DESCRIPTION OF THE MENTORSHIP PROGRAM
- Chapter 11.2 INTRO TO YOUR TRUE-TO-LIFE-PROJECTS
- Chapter 11.3 PROJECT 1 – SYSTEM A&A PROJECT
- CHAPTER 11.4 PROJECT 2 – VULNERABILITY MANAGEMENT INTRODUCTION
- VMP introduction Assignment
- Chapter 11.5 POJECT 2 – VMP – VULNERABILITY ANALYSIS
- VMP Vulnerability Analysis Assignment
- Chapter 11.6 PROJECT 2 – VMP – INTRO TO PIVOT TABLES
- VMP – PIVOT Table Assignment
- Chapter 11.7 PROJECT 2 – VMP – SUBMITTING CHANGE REQUESTS
- VMP – Change Request Assingment
- Chapter 11.8 PROJECT 2 – VMP – TRACK AND FOLLOW UP ON REMEDIATIONS
- VMP Remediation follow up Assignment
- Chapter 11.9 PROJECT 2 – VMP – DRAFT A VULNERABILITY ANALYSIS REPORT
- VMP Vulnerability Report Assignment
- Chapter 11.10 Part 1 – Intro to Project 3 – SPLUNK App for Windows Infrastructure
- Chapter 11.10.1 Part 2 – Intro to Project 3 – SPLUNK App for Windows Infrastructure
- Chapter 11.11 Pep talk_ Project Expectations
- Chapter 11.12 PROJECT 3 – PLAN AND BUILD YOUR INFRASTRUCTURE FOR DEPLOYMENT
- Chapter 11.13 Project 3 – Creating the SPLUNK service account and configure with group policy
- Chapter 11.14 Project 3 – Install SPLUNK Enterprise and Add the Splunk License
- Chapter 11.15 Project 3 – Set up Basic Infrastructure
-
Victoria Okoro
Excellent and Best Program
I am happily rating PJ pros 5star. I must say this is an awesome program I will recommend to anyone. The fluency and style of teaching helps anyone on different level understand cyber security. Great and intelligent instructors make learning interesting with a mentorship scheme that guides you all the way I am truly happy.