• COURSES
    • Certified Ethical Hacker – Practical
    • Cyber-Security Career Development Program – Online
    • IT Fundamentals
    • CISSP Boot Camp
    • FISMA Compliance
    • All Courses
  • Program Descriptions
  • Membership
    • Member Services
    • Membership Levels
    • Membership Cancel
    • Membership Billing
  • Page
    • Services
    • Become a Mentor
    • Shop
    • About Us
    • Contact
    • Blog
    • FAQs
    Learn How to Become A Cyber Security Analyst, Class starts 1/18/2021.    Limited seats available.    Sign Up Now
    RegisterLogin
    PJ Cyber-Security School
    • COURSES
      • Certified Ethical Hacker – Practical
      • Cyber-Security Career Development Program – Online
      • IT Fundamentals
      • CISSP Boot Camp
      • FISMA Compliance
      • All Courses
    • Program Descriptions
    • Membership
      • Member Services
      • Membership Levels
      • Membership Cancel
      • Membership Billing
    • Page
      • Services
      • Become a Mentor
      • Shop
      • About Us
      • Contact
      • Blog
      • FAQs

      Career Development

      • Home
      • All courses
      • Career Development
      • Cyber-Security Career Development – Online
      CoursesSecurity EngineeringCyber-Security Career Development – Online
      • PHASE 1 - CHAPTER 1 - IT FOUNDATIONS
        23
        • Lecture1.1
          Chapter 1.1 How to Become a Cyber Security Analyst 05 min
        • Lecture1.2
          Chapter 1.2 What is a Network 06 min
        • Quiz1.1
          Career Dev Online 1.2 QUIZ 6 questions
        • Lecture1.3
          Chapter 1.3 Components of an Enterprise Part 1 06 min
        • Quiz1.2
          1.3 Questions 6 questions
        • Lecture1.4
          Chapter 1.4 Components of an Enterprise Part 2 06 min
        • Quiz1.3
          1.4 Questions 5 questions
        • Lecture1.5
          Chapter 1.5 Components of an Enterprise Network Part 3 06 min
        • Quiz1.4
          1.5 Questions 6 questions
        • Lecture1.6
          Chapter 1.6 The Physical Components of a Network Part 4- Bennefits of Servers
        • Quiz1.5
          1.6 Questions 5 questions
        • Lecture1.7
          Chapter 1.7 What is the Internet 04 min
        • Quiz1.6
          1.7 Questions 5 questions
        • Lecture1.8
          Chapter 1.8 The Human Component of an Enterprise Network Part 1 05 min
        • Quiz1.7
          1.8 Questions 5 questions
        • Lecture1.9
          Chapter 1.9 The Human Component of an Enterprise Network Part 2 06 min
        • Quiz1.8
          1.9 Questions 7 questions
        • Lecture1.10
          Chapter 1.10 THE HUMAN COMPONENT OF IT SUPPORT 06 min
        • Quiz1.9
          1.10 Questions 5 questions
        • Lecture1.11
          Chapter 1.11 Introduction to our Simulated Environment- Meet the IT Operations Team 06 min
        • Quiz1.10
          1.11 Questions 5 questions
        • Lecture1.12
          Chapter 1.12 Introduction to our simulated environment- Meet the IT Security Team 06 min
        • Quiz1.11
          1.12 Questions 5 questions
      • PHASE 1 - CHAPTER 2 - RMF STEP 1-3
        40
        • Lecture2.1
          Chapter 2.1 INTRODUCTION TO SECURITY COMPLIANCE AND FISMA REQUIREMENTS 06 min
        • Quiz2.1
          2.1 Questions 5 questions
        • Lecture2.2
          Chapter 2.2 RMF STEP 1 – SECURITY CATEGORIZATION 05 min
        • Quiz2.2
          2.2 Questions 6 questions
        • Lecture2.3
          Chapter 2.3 Security Categorization Part 2 07 min
        • Quiz2.3
          2.3 Questions 6 questions
        • Lecture2.4
          Chapter 2.4 RMF STEP 1- SECURITY CATEGORIZATION PART 3 05 min
        • Quiz2.4
          2.4 Questions 6 questions
        • Lecture2.5
          Chapter 2.5 COMPENTS OF A SYSTEM AND TECHNICAL DESCRIPTION 05 min
        • Quiz2.5
          2.5 Questions 7 questions
        • Lecture2.6
          Chapter 2.6 COMPONENTS OF A SYSTEM TECHNICAL DESCRIPTION PART 2 05 min
        • Quiz2.6
          2.6 Questions 5 questions
        • Lecture2.7
          Chapter 2.7 RMF STEP 2 – SELECT SECURITY CONTROLS 05 min
        • Quiz2.7
          2.7 Questions 5 questions
        • Lecture2.8
          Chapter 2.8 RMF STEP 3 – IMPLEMENTING SECURITY CONTROLS 05 min
        • Quiz2.8
          2.8 Questions 5 questions
        • Lecture2.9
          Chapter 2.9 Pep Talk-Intro to the SSP simulation 05 min
        • Quiz2.9
          Career Dev Online Pep talk 4 questions
        • Lecture2.10
          Chapter 2.10 SSP Simulation – Editing the Cover Page 06 min
        • Assignment2.1
          Career Dev Online SSP Cover Lab 0 week
        • Lecture2.11
          Chapter 2.11 SSP Simulation – Editing Security Categorization 06 min
        • Assignment2.2
          Career Dev Online – Sec Categorization Lab 0 week
        • Lecture2.12
          Chapter 2.12 How to Determine your Digital Identity Levels – Part 1 06 min
        • Quiz2.10
          CAREER DEV ONLINE – Digital Identity QUIZ 8 questions
        • Lecture2.13
          Chapter 2.12.1 How to Determine your Digital Identity Levels – Part 2
        • Lecture2.14
          Chapter 2.12.2 How to Determine your Digital Identity Levels – Part 3
        • Lecture2.15
          Chapter 2.13 SSP Simulation – Completing Digital Identity
        • Assignment2.3
          Career Dev Online – Digital Identity Lab 0 week
        • Lecture2.16
          Chapter 2.13.1 SSP Simulation – Completing POC Sections
        • Lecture2.17
          Chapter 2.14 SSP Simulation – Completing the General System Description and User Types 06 min
        • Assignment2.4
          Career Dev Online – General system description Lab 0 week
        • Lecture2.18
          Chapter 2.15 SSP Simulation – Describing the Network Architecture, Envrionment and Inventory 05 min
        • Assignment2.5
          Career Dev Online – System Architecture Lab 0 week
        • Lecture2.19
          Chapter 2.16 SSP Simulation – System interconnection, Laws and regulations 06 min
        • Assignment2.6
          Career Dev Online – System Interconnection Lab 0 week
        • Lecture2.20
          Chapter 2.17 SSP Simulation – Selecting Controls-RMF STEP 2 04 min
        • Assignment2.7
          Career Dev online – Select Security Controls Lab 0 week
        • Lecture2.21
          Chapter 2.18_SSP Simulation – Implementing the security controls_RMF Step 3 04 min
        • Lecture2.22
          Chapter 2.19_SSP Simulation – Implementing the security controls part 2
        • Assignment2.8
          Career Dev Online – Implement Sec Controls Lab 0 week
      • PHASE 1- CHAPTER 3 RMF STEPS 4-5
        21
        • Lecture3.1
          Chapter 3.1_RMF STEP 4 ASSESSING SECURITY CONTROLS PART 1 10 min
        • Quiz3.1
          3.1 Questions 5 questions
        • Lecture3.2
          Chapter 3.2 The Security Assessment Report – From Objective to Assessment Result 13 min
        • Quiz3.2
          3.2 Questions 5 questions
        • Lecture3.3
          Chapter 3.3 THE SECURITY ASSESSMENT REPORT CONTD 10 min
        • Quiz3.3
          3.3 Questions 5 questions
        • Lecture3.4
          Chapter 3.4 RMF STEP 5 AUTHORIZE THE INFORMATION SYSTEM 08 min
        • Quiz3.4
          3.4 Questions 5 questions
        • Lecture3.5
          Chapter 3.5 RMF STEP 5 CONTD & RMF STEP 6 – MONITOR THE SECURITY CONTROLS 10 min
        • Quiz3.5
          3.5 Questions 5 questions
        • Lecture3.6
          Chapter 3.6 Asessment Simulation – Introductions and preparation for the assessment 10 min
        • Lecture3.7
          Chapter 3.7 Sample security assessment kick off Meeting 10 min
        • Assignment3.1
          Career Dev Online – SAP and Kick Off Lab 0 week
        • Lecture3.8
          Chapter 3.8_Security Assessment Simulation – Completing the SAR 10 min
        • Lecture3.9
          Chapter 3.9 Assessment simulation – completing the SAR part 2 10 min
        • Assignment3.2
          Career Dev Online – Security Assessment Lab 0 week
        • Lecture3.10
          Chapter 3.10 Security Assessment simulation – Introduction to the POA&M 10 min
        • Lecture3.11
          Chapter 3.11 Security Assessment simulation – POA&M Review part 2 10 min
        • Assignment3.3
          Career Dev Online – POA&M Lab 0 week
        • Lecture3.12
          Chapter 3.12 Security Assessment simulation – Submit the Authorization Package (RMF Step 5) and receive the ATO 10 min
        • Lecture3.13
          Chapter 3.13 Phase 1 Completion – Pep Talk! 10 min
      • PHASE 2 - SECURITY ENGINEERING & ETHICAL HACKING
        28
        • Lecture4.1
          Chapter 4.0_Introduction to Phase 2: Security Engineering and Ethical Hacking 05 min
        • Lecture4.2
          Chapter 4.1 Introduction to Virtual Machines 06 min
        • Quiz4.1
          4.1 Questions 5 questions
        • Lecture4.3
          Chapter 4.2 VMware Installation 03 min
        • Assignment4.1
          4.2lab 0 week
        • Lecture4.4
          Chapter 4.3 Kali Linux Installation 06 min
        • Assignment4.2
          4.3 Lab 0 week
        • Lecture4.5
          Chapter 4.4 Windows 10 Installation 07 min
        • Assignment4.3
          4.4 Lab 0 week
        • Lecture4.6
          Chapter 4.5 Introduction to Splunk 06 min
        • Quiz4.2
          4.5 Questions 5 questions
        • Lecture4.7
          Chapter 4.6 Splunk Installation and Splunk App 07 min
        • Assignment4.4
          4.6 Lab 0 week
        • Lecture4.8
          Career Dev Online Introduction to Subnetting Part 1 06 min
        • Lecture4.9
          Career Dev Live Introduction to Subnetting Part 2
        • Quiz4.3
          4.7 Questions 5 questions
        • Lecture4.10
          Chapter 4.8 Maping Your Lab Network 06 min
        • Assignment4.5
          4.8 Lab 0 week
        • Lecture4.11
          Chapter 4.9 Install Splunk Forwarders Part 1 06 min
        • Assignment4.6
          4.9 Lab 0 week
        • Lecture4.12
          Chapter 4.10 Install SPLUNK Forwarders Part 2 08 min
        • Assignment4.7
          4.10 Lab 0 week
        • Lecture4.13
          Chapter 4.11 Install SPLUNK Forwarders Part 4 05 min
        • Assignment4.8
          4.11 lab 3 days
        • Lecture4.14
          Chapter 4.12 Searching with SPLUNK 06 min
        • Assignment4.9
          4.12 Lab 0 week
        • Lecture4.15
          Chapter 4.13 Splunk Report and Dashboard 06 min
        • Assignment4.10
          4.13 Lab 0 week
      • PHASE 2 - CHAPTER 5 INTRO TO OSI MODEL
        28
        • Lecture5.1
          Chapter 5.1 Introduction to the OSI Model Using Real World Examples 06 min
        • Quiz5.1
          5.1 Questions 8 questions
        • Lecture5.2
          Chapter 5.2 Data Packets, 3 Way Handshake and ARP 05 min
        • Quiz5.2
          5.2 Questions 6 questions
        • Lecture5.3
          Chapter 5.3 Introduction to WireShark 04 min
        • Quiz5.3
          5.3 Questions 4 questions
        • Lecture5.4
          Chapter 5.4 Install Wireshark and start data capture
        • Assignment5.1
          5.4 Lab 0 week
        • Lecture5.5
          Chapter 5.5 Wireshark Filters and Windows 06 min
        • Assignment5.2
          5.5 Lab 0 week
        • Lecture5.6
          Chapter 5.6 TCP Close Connection, TCP Flags & Intrusion Detection 05 min
        • Quiz5.4
          5.6 Questions 8 questions
        • Lecture5.7
          Chapter 5.7 Isolating Wireshark Traffic and Saving Files 06 min
        • Assignment5.3
          5.7 Lab 0 week
        • Lecture5.8
          Chapter 5.8 Wireshark Flags SSL traffic 06 min
        • Assignment5.4
          5.8 Lab 0 week
        • Lecture5.9
          Chapter 5.9 Detecting Attacks with Wireshark Intro to Nmap 05 min
        • Quiz5.5
          5.9 Questions 9 questions
        • Lecture5.10
          Chapter 5.10 Identifying a Host Discovery Scan on Wireshark 06 min
        • Assignment5.5
          5.10 Lab 0 week
        • Lecture5.11
          CHAPTER 5.11 IDENTIFYING A PORT SCAN ON WIRESHARK 06 min
        • Assignment5.6
          5.11 Lab 0 week
        • Lecture5.12
          CHAPTER 5.12 IDENTIFYING AN PORT SCAN ON WIRESHARK PART 2 06 min
        • Assignment5.7
          5.12 Lab 0 week
        • Lecture5.13
          CHAPTER 5.13 IDENTIFYING A SERVICE SCAN ON WIRESHARK. 05 min
        • Assignment5.8
          5.13 lab 0 week
        • Lecture5.14
          Chapter 5.14 Identifying an Aggressive Scan on Wireshark 06 min
        • Assignment5.9
          5.14 Lab 0 week
      • PHASE 2 - CHAPTER 6 INTRO TO NESSUS
        18
        • Lecture6.1
          Chapter 6.1 Introduction to Nessus 05 min
        • Quiz6.1
          6.1 Questions 5 questions
        • Lecture6.2
          Chapter 6.2 Host Discovery Scan with Nessus 07 min
        • Assignment6.1
          6.2 Lab 0 week
        • Lecture6.3
          Chapter 6.3 Host Discovery Scan with Nessus Part 2 03 min
        • Assignment6.2
          6.3 Lab 0 week
        • Lecture6.4
          CHAPTER 6.4 BASIC NETWORK SCAN WITH NESSUS 06 min
        • Assignment6.3
          6.4 Lab 0 week
        • Lecture6.5
          CHAPTER 6.5 Credential Network Scan with Nessus. 06 min
        • Assignment6.4
          6.5 Lab 0 week
        • Lecture6.6
          CHAPTER 6.6 VULNERABILITY REPORT AND MANAGEMENT 06 min
        • Assignment6.5
          6.6 Lab 0 week
        • Lecture6.7
          Chapter 6.7 WIN 2016 SERVER VM INSTALLATION. 06 min
        • Assignment6.6
          6.7 Lab 0 week
        • Lecture6.8
          CHAPTER 6.8 AD INSTALLATION AND TROUBLESHOOTING A SLOW COMPUTER. 05 min
        • Assignment6.7
          6.8 Lab 0 week
        • Lecture6.9
          CHAPTER 6.9 CREATING AD ACCOUNTS AND MACHINES 06 min
        • Assignment6.8
          6.9 Lab 0 week
      • PHASE 2 - CHAPTER 7 ETHICAL HACKING
        20
        • Lecture7.1
          Chapter 7.1 Introduction to Ethical Hacking 05 min
        • Quiz7.1
          7.1 Questions 5 questions
        • Lecture7.2
          Chapter 7.2 Active Passive Recon and Scanning 05 min
        • Quiz7.2
          7.2 Questions 5 questions
        • Lecture7.3
          Chapter 7.3 Introduction to Netcraft Archive PIPL and HTTRACK 06 min
        • Assignment7.1
          7.3 Lab 0 week
        • Lecture7.4
          Chapter 7.4 Introduction to Maltego 06 min
        • Assignment7.2
          7.4 Lab 0 week
        • Lecture7.5
          Chapter 7.5 Introduction to NAT 06 min
        • Quiz7.3
          7.5 Questions 6 questions
        • Lecture7.6
          Chapter 7.6 Metagoofil and Email Tracker 06 min
        • Assignment7.3
          7.6 Lab 0 week
        • Lecture7.7
          chapter 7.7 Nmap Basic Scan (Review) 05 min
        • Assignment7.4
          7.7 Lab 0 week
        • Lecture7.8
          Chapter 7.8 Nmap Scripting Engine 05 min
        • Assignment7.5
          7.8 Lab 0 week
        • Lecture7.9
          Chapter 7.9 Introduction To Malware 04 min
        • Quiz7.4
          7.9 Questions 6 questions
        • Lecture7.10
          Chapter 7.10 How to Create a Computer Virus 06 min
        • Assignment7.6
          7.10 Lab 0 week
      • PHASE 2 - CHAPTER 8 METASPLOIT, VELT AND SHELLTER
        15
        • Lecture8.1
          Chapter 8.1 Intro to Metasploit, veil and Shellter 05 min
        • Quiz8.1
          8.1 Questions 5 questions
        • Lecture8.2
          Chapter 8.2 Backdoor Preparation OS Update and Veil Install 05 min
        • Lecture8.3
          Chapter 8.3 Reverse TCP Exploit (backdoor) Using Veil and Mestasploit 06 min
        • Assignment8.1
          8.3 Lab 0 week
        • Lecture8.4
          Chapter 8.4 Reverse TCP (Backdoor) exploit with AV off 04 min
        • Assignment8.2
          8.4 Lab 0 week
        • Lecture8.5
          Chapter 8.5 Backdoor exploit with AV turned on 06 min
        • Assignment8.3
          8.5 Lab 0 week
        • Lecture8.6
          Chapter 8.6 Meterpreter command examples after gaining access 06 min
        • Assignment8.4
          8.6 Lab 0 week
        • Lecture8.7
          Chapter 8.7 Introduction to wireless technology 05 min
        • Quiz8.2
          8.7 Questions 6 questions
        • Lecture8.8
          Chapter 8.8 Hacking a Hidden SSID 06 min
        • Assignment8.5
          8.8 Lab 0 week
      • PHASE 2 - CHAPTER 9 PERSISTENCE CONNECTION AND DHCP
        12
        • Lecture9.1
          Chapter 9.1 Intro to Persistence Connection and DHCP 05 min
        • Quiz9.1
          9.1 Questions 6 questions
        • Lecture9.2
          Chapter 9.2 Persistence Connection part 1 04 min
        • Assignment9.1
          9.2 Lab 0 week
        • Lecture9.3
          Chapter 9.3 Hacking Pep Talk and explanations 06 min
        • Assignment9.2
          9.3 Lab 0 week
        • Lecture9.4
          Chapter 9.4 Persistence Connection using MOF 06 min
        • Assignment9.3
          9.4 Lab 0 week
        • Lecture9.5
          Chapter 9.5 Intro to Cracking Wireless Security Protocols (WEP, WPA, WPA2) 05 min
        • Quiz9.2
          9.5 Questions 5 questions
        • Lecture9.6
          Chapter 9.6 Cracking Wireless (WPA2) Passwords 04 min
        • Assignment9.4
          9.6 Lab 0 week
      • PHASE 2 - CHAPTER 10 COVERING TRACKS
        10
        • Lecture10.1
          Chapter 10.1 Introduction to Covering Tracks 06 min
        • Quiz10.1
          10.1 Questions 5 questions
        • Lecture10.2
          Chapter 10.2 Clearing event logs 06 min
        • Assignment10.1
          10.2 Lab 0 week
        • Lecture10.3
          Chapter 10.3 Combining your payload with Jpeg 05 min
        • Assignment10.2
          10.3 Lab 0 week
        • Lecture10.4
          Chapter 10.4 Combining your payload with Excel 06 min
        • Assignment10.3
          10.4 Lab 0 week
        • Lecture10.5
          Chapter 10.5 Phishing Wifi Password with Wifiphisher 06 min
        • Assignment10.4
          10.5 Lab 0 week
      • PHASE 3 - CAREER DEVELOPMENT
        17
        • Lecture11.1
          Chapter 11 INTRODUCTION TO PHASE 3 – CAREER DEVELOPMENT
        • Lecture11.2
          Chapter 11.1 BRIEF DESCRIPTION OF THE MENTORSHIP PROGRAM
        • Lecture11.3
          Chapter 11.2 INTRO TO YOUR TRUE-TO-LIFE-PROJECTS
        • Lecture11.4
          Chapter 11.3 PROJECT 1 – SYSTEM A&A PROJECT
        • Lecture11.5
          CHAPTER 11.4 PROJECT 2 – VULNERABILITY MANAGEMENT INTRODUCTION
        • Lecture11.6
          Chapter 11.5 POJECT 2 – VMP – VULNERABILITY ANALYSIS
        • Lecture11.7
          Chapter 11.6 PROJECT 2 – VMP – INTRO TO PIVOT TABLES
        • Lecture11.8
          Chapter 11.7 PROJECT 2 – VMP – SUBMITTING CHANGE REQUESTS
        • Lecture11.9
          Chapter 11.8 PROJECT 2 – VMP – TRACK AND FOLLOW UP ON REMEDIATIONS
        • Lecture11.10
          Chapter 11.9 PROJECT 2 – VMP – DRAFT A VULNERABILITY ANALYSIS REPORT
        • Lecture11.11
          Chapter 11.10 Part 1 – Intro to Project 3 – SPLUNK App for Windows Infrastructure
        • Lecture11.12
          Chapter 11.10.1 Part 2 – Intro to Project 3 – SPLUNK App for Windows Infrastructure
        • Lecture11.13
          Chapter 11.11 Pep talk_ Project Expectations
        • Lecture11.14
          Chapter 11.12 PROJECT 3 – PLAN AND BUILD YOUR INFRASTRUCTURE FOR DEPLOYMENT
        • Lecture11.15
          Chapter 11.13 Project 3 – Creating the SPLUNK service account and configure with group policy
        • Lecture11.16
          Chapter 11.14 Project 3 – Install SPLUNK Enterprise and Add the Splunk License
        • Lecture11.17
          Chapter 11.15 Project 3 – Set up Basic Infrastructure
        This content is protected, please login and enroll course to view this content!
        Prev 4.11 lab
        Next 4.12 Lab

        Leave A Reply Cancel reply

        Your email address will not be published. Required fields are marked *

          9 Comments

        1. TayoOgun
          March 29, 2020

          I’ve already spent a fortune learning the NIST RMF and can be sure that I certainly will get a better understanding of how i=the industry works in real life by joining your course.

          I hope to call you tomorrow @301 576 2977

          Thanks!

          • POyelakin
            March 29, 2020

            Thanks so much Tayo! I really appreciate it! yes give us a call anytime!!

        2. Dctonyburley
          May 29, 2020

          I am curious of there a checklist that lists the ATO activities, the various inputs & outputs (deliverable\artifacts) in chronological order? Like a “dummies” guide to RMF that explains the to my Senior Management the steps and required artifacts so I can illustrate the to properly resource an AWS ATO project?

        All Courses

        • Career Development
        • Certification Studies
        • Ethical Hacking
        • IT Foundations
        • Learn Fisma Compliance
        • Live Class
        • Security Compliance
        • Security Engineering

        Latest Courses

        Certified Ethical Hacker – Practical

        Certified Ethical Hacker – Practical

        $3,000.00 $2,500.00
        Cyber-Security LAB Preparation

        Cyber-Security LAB Preparation

        Free
        Fundamentals of IT

        Fundamentals of IT

        Free
        301-576-2977
        info@pjpros.com

        8401 Good Luck Rd.
        Rm 202 Lanham, MD 20706

        Facebook-f
        Youtube
        Linkedin
        Twitter
        Instagram

        Company

        • About Us
        • Blog
        • Contact
        • Become a Mentor

        Links

        • Courses
        • Events
        • Gallery
        • FAQs

        Support

        • Member Services
        • Forums
        • Technical Support
        • Billing

        Services

        • Information Security Services
        • IT Project management
        • Cybersecurity Training
        • Mentorship

        © Copyright - PJ Professional IT Services 

        • Privacy
        • Terms

        Login with your site account

        Lost your password?

        Not a member yet? Register now

        Register a new account

        Are you a member? Login now

        Modal title

        Message modal