• COURSES
    • Certified Ethical Hacker – Practical
    • Cyber-Security Career Development Program – Online
    • IT Fundamentals
    • CISSP Boot Camp
    • FISMA Compliance
    • All Courses
  • Program Descriptions
  • Membership
    • Member Services
    • Membership Levels
    • Membership Cancel
    • Membership Billing
  • Page
    • Services
    • Become a Mentor
    • Shop
    • About Us
    • Contact
    • Blog
    • FAQs
    Learn How to Become A Cyber Security Analyst, Class starts 1/18/2021.    Limited seats available.    Sign Up Now
    RegisterLogin
    PJ Cyber-Security School
    • COURSES
      • Certified Ethical Hacker – Practical
      • Cyber-Security Career Development Program – Online
      • IT Fundamentals
      • CISSP Boot Camp
      • FISMA Compliance
      • All Courses
    • Program Descriptions
    • Membership
      • Member Services
      • Membership Levels
      • Membership Cancel
      • Membership Billing
    • Page
      • Services
      • Become a Mentor
      • Shop
      • About Us
      • Contact
      • Blog
      • FAQs

      Career Development

      • Home
      • All courses
      • Career Development
      • Cyber-Security Career Development – Online
      CoursesSecurity EngineeringCyber-Security Career Development – Online
      • PHASE 1 - CHAPTER 1 - IT FOUNDATIONS
        23
        • Lecture1.1
          Chapter 1.1 How to Become a Cyber Security Analyst 05 min
        • Lecture1.2
          Chapter 1.2 What is a Network 06 min
        • Quiz1.1
          Career Dev Online 1.2 QUIZ 6 questions
        • Lecture1.3
          Chapter 1.3 Components of an Enterprise Part 1 06 min
        • Quiz1.2
          1.3 Questions 6 questions
        • Lecture1.4
          Chapter 1.4 Components of an Enterprise Part 2 06 min
        • Quiz1.3
          1.4 Questions 5 questions
        • Lecture1.5
          Chapter 1.5 Components of an Enterprise Network Part 3 06 min
        • Quiz1.4
          1.5 Questions 6 questions
        • Lecture1.6
          Chapter 1.6 The Physical Components of a Network Part 4- Bennefits of Servers
        • Quiz1.5
          1.6 Questions 5 questions
        • Lecture1.7
          Chapter 1.7 What is the Internet 04 min
        • Quiz1.6
          1.7 Questions 5 questions
        • Lecture1.8
          Chapter 1.8 The Human Component of an Enterprise Network Part 1 05 min
        • Quiz1.7
          1.8 Questions 5 questions
        • Lecture1.9
          Chapter 1.9 The Human Component of an Enterprise Network Part 2 06 min
        • Quiz1.8
          1.9 Questions 7 questions
        • Lecture1.10
          Chapter 1.10 THE HUMAN COMPONENT OF IT SUPPORT 06 min
        • Quiz1.9
          1.10 Questions 5 questions
        • Lecture1.11
          Chapter 1.11 Introduction to our Simulated Environment- Meet the IT Operations Team 06 min
        • Quiz1.10
          1.11 Questions 5 questions
        • Lecture1.12
          Chapter 1.12 Introduction to our simulated environment- Meet the IT Security Team 06 min
        • Quiz1.11
          1.12 Questions 5 questions
      • PHASE 1 - CHAPTER 2 - RMF STEP 1-3
        40
        • Lecture2.1
          Chapter 2.1 INTRODUCTION TO SECURITY COMPLIANCE AND FISMA REQUIREMENTS 06 min
        • Quiz2.1
          2.1 Questions 5 questions
        • Lecture2.2
          Chapter 2.2 RMF STEP 1 – SECURITY CATEGORIZATION 05 min
        • Quiz2.2
          2.2 Questions 6 questions
        • Lecture2.3
          Chapter 2.3 Security Categorization Part 2 07 min
        • Quiz2.3
          2.3 Questions 6 questions
        • Lecture2.4
          Chapter 2.4 RMF STEP 1- SECURITY CATEGORIZATION PART 3 05 min
        • Quiz2.4
          2.4 Questions 6 questions
        • Lecture2.5
          Chapter 2.5 COMPENTS OF A SYSTEM AND TECHNICAL DESCRIPTION 05 min
        • Quiz2.5
          2.5 Questions 7 questions
        • Lecture2.6
          Chapter 2.6 COMPONENTS OF A SYSTEM TECHNICAL DESCRIPTION PART 2 05 min
        • Quiz2.6
          2.6 Questions 5 questions
        • Lecture2.7
          Chapter 2.7 RMF STEP 2 – SELECT SECURITY CONTROLS 05 min
        • Quiz2.7
          2.7 Questions 5 questions
        • Lecture2.8
          Chapter 2.8 RMF STEP 3 – IMPLEMENTING SECURITY CONTROLS 05 min
        • Quiz2.8
          2.8 Questions 5 questions
        • Lecture2.9
          Chapter 2.9 Pep Talk-Intro to the SSP simulation 05 min
        • Quiz2.9
          Career Dev Online Pep talk 4 questions
        • Lecture2.10
          Chapter 2.10 SSP Simulation – Editing the Cover Page 06 min
        • Assignment2.1
          Career Dev Online SSP Cover Lab 0 week
        • Lecture2.11
          Chapter 2.11 SSP Simulation – Editing Security Categorization 06 min
        • Assignment2.2
          Career Dev Online – Sec Categorization Lab 0 week
        • Lecture2.12
          Chapter 2.12 How to Determine your Digital Identity Levels – Part 1 06 min
        • Quiz2.10
          CAREER DEV ONLINE – Digital Identity QUIZ 8 questions
        • Lecture2.13
          Chapter 2.12.1 How to Determine your Digital Identity Levels – Part 2
        • Lecture2.14
          Chapter 2.12.2 How to Determine your Digital Identity Levels – Part 3
        • Lecture2.15
          Chapter 2.13 SSP Simulation – Completing Digital Identity
        • Assignment2.3
          Career Dev Online – Digital Identity Lab 0 week
        • Lecture2.16
          Chapter 2.13.1 SSP Simulation – Completing POC Sections
        • Lecture2.17
          Chapter 2.14 SSP Simulation – Completing the General System Description and User Types 06 min
        • Assignment2.4
          Career Dev Online – General system description Lab 0 week
        • Lecture2.18
          Chapter 2.15 SSP Simulation – Describing the Network Architecture, Envrionment and Inventory 05 min
        • Assignment2.5
          Career Dev Online – System Architecture Lab 0 week
        • Lecture2.19
          Chapter 2.16 SSP Simulation – System interconnection, Laws and regulations 06 min
        • Assignment2.6
          Career Dev Online – System Interconnection Lab 0 week
        • Lecture2.20
          Chapter 2.17 SSP Simulation – Selecting Controls-RMF STEP 2 04 min
        • Assignment2.7
          Career Dev online – Select Security Controls Lab 0 week
        • Lecture2.21
          Chapter 2.18_SSP Simulation – Implementing the security controls_RMF Step 3 04 min
        • Lecture2.22
          Chapter 2.19_SSP Simulation – Implementing the security controls part 2
        • Assignment2.8
          Career Dev Online – Implement Sec Controls Lab 0 week
      • PHASE 1- CHAPTER 3 RMF STEPS 4-5
        21
        • Lecture3.1
          Chapter 3.1_RMF STEP 4 ASSESSING SECURITY CONTROLS PART 1 10 min
        • Quiz3.1
          3.1 Questions 5 questions
        • Lecture3.2
          Chapter 3.2 The Security Assessment Report – From Objective to Assessment Result 13 min
        • Quiz3.2
          3.2 Questions 5 questions
        • Lecture3.3
          Chapter 3.3 THE SECURITY ASSESSMENT REPORT CONTD 10 min
        • Quiz3.3
          3.3 Questions 5 questions
        • Lecture3.4
          Chapter 3.4 RMF STEP 5 AUTHORIZE THE INFORMATION SYSTEM 08 min
        • Quiz3.4
          3.4 Questions 5 questions
        • Lecture3.5
          Chapter 3.5 RMF STEP 5 CONTD & RMF STEP 6 – MONITOR THE SECURITY CONTROLS 10 min
        • Quiz3.5
          3.5 Questions 5 questions
        • Lecture3.6
          Chapter 3.6 Asessment Simulation – Introductions and preparation for the assessment 10 min
        • Lecture3.7
          Chapter 3.7 Sample security assessment kick off Meeting 10 min
        • Assignment3.1
          Career Dev Online – SAP and Kick Off Lab 0 week
        • Lecture3.8
          Chapter 3.8_Security Assessment Simulation – Completing the SAR 10 min
        • Lecture3.9
          Chapter 3.9 Assessment simulation – completing the SAR part 2 10 min
        • Assignment3.2
          Career Dev Online – Security Assessment Lab 0 week
        • Lecture3.10
          Chapter 3.10 Security Assessment simulation – Introduction to the POA&M 10 min
        • Lecture3.11
          Chapter 3.11 Security Assessment simulation – POA&M Review part 2 10 min
        • Assignment3.3
          Career Dev Online – POA&M Lab 0 week
        • Lecture3.12
          Chapter 3.12 Security Assessment simulation – Submit the Authorization Package (RMF Step 5) and receive the ATO 10 min
        • Lecture3.13
          Chapter 3.13 Phase 1 Completion – Pep Talk! 10 min
      • PHASE 2 - SECURITY ENGINEERING & ETHICAL HACKING
        28
        • Lecture4.1
          Chapter 4.0_Introduction to Phase 2: Security Engineering and Ethical Hacking 05 min
        • Lecture4.2
          Chapter 4.1 Introduction to Virtual Machines 06 min
        • Quiz4.1
          4.1 Questions 5 questions
        • Lecture4.3
          Chapter 4.2 VMware Installation 03 min
        • Assignment4.1
          4.2lab 0 week
        • Lecture4.4
          Chapter 4.3 Kali Linux Installation 06 min
        • Assignment4.2
          4.3 Lab 0 week
        • Lecture4.5
          Chapter 4.4 Windows 10 Installation 07 min
        • Assignment4.3
          4.4 Lab 0 week
        • Lecture4.6
          Chapter 4.5 Introduction to Splunk 06 min
        • Quiz4.2
          4.5 Questions 5 questions
        • Lecture4.7
          Chapter 4.6 Splunk Installation and Splunk App 07 min
        • Assignment4.4
          4.6 Lab 0 week
        • Lecture4.8
          Career Dev Online Introduction to Subnetting Part 1 06 min
        • Lecture4.9
          Career Dev Live Introduction to Subnetting Part 2
        • Quiz4.3
          4.7 Questions 5 questions
        • Lecture4.10
          Chapter 4.8 Maping Your Lab Network 06 min
        • Assignment4.5
          4.8 Lab 0 week
        • Lecture4.11
          Chapter 4.9 Install Splunk Forwarders Part 1 06 min
        • Assignment4.6
          4.9 Lab 0 week
        • Lecture4.12
          Chapter 4.10 Install SPLUNK Forwarders Part 2 08 min
        • Assignment4.7
          4.10 Lab 0 week
        • Lecture4.13
          Chapter 4.11 Install SPLUNK Forwarders Part 4 05 min
        • Assignment4.8
          4.11 lab 3 days
        • Lecture4.14
          Chapter 4.12 Searching with SPLUNK 06 min
        • Assignment4.9
          4.12 Lab 0 week
        • Lecture4.15
          Chapter 4.13 Splunk Report and Dashboard 06 min
        • Assignment4.10
          4.13 Lab 0 week
      • PHASE 2 - CHAPTER 5 INTRO TO OSI MODEL
        28
        • Lecture5.1
          Chapter 5.1 Introduction to the OSI Model Using Real World Examples 06 min
        • Quiz5.1
          5.1 Questions 8 questions
        • Lecture5.2
          Chapter 5.2 Data Packets, 3 Way Handshake and ARP 05 min
        • Quiz5.2
          5.2 Questions 6 questions
        • Lecture5.3
          Chapter 5.3 Introduction to WireShark 04 min
        • Quiz5.3
          5.3 Questions 4 questions
        • Lecture5.4
          Chapter 5.4 Install Wireshark and start data capture
        • Assignment5.1
          5.4 Lab 0 week
        • Lecture5.5
          Chapter 5.5 Wireshark Filters and Windows 06 min
        • Assignment5.2
          5.5 Lab 0 week
        • Lecture5.6
          Chapter 5.6 TCP Close Connection, TCP Flags & Intrusion Detection 05 min
        • Quiz5.4
          5.6 Questions 8 questions
        • Lecture5.7
          Chapter 5.7 Isolating Wireshark Traffic and Saving Files 06 min
        • Assignment5.3
          5.7 Lab 0 week
        • Lecture5.8
          Chapter 5.8 Wireshark Flags SSL traffic 06 min
        • Assignment5.4
          5.8 Lab 0 week
        • Lecture5.9
          Chapter 5.9 Detecting Attacks with Wireshark Intro to Nmap 05 min
        • Quiz5.5
          5.9 Questions 9 questions
        • Lecture5.10
          Chapter 5.10 Identifying a Host Discovery Scan on Wireshark 06 min
        • Assignment5.5
          5.10 Lab 0 week
        • Lecture5.11
          CHAPTER 5.11 IDENTIFYING A PORT SCAN ON WIRESHARK 06 min
        • Assignment5.6
          5.11 Lab 0 week
        • Lecture5.12
          CHAPTER 5.12 IDENTIFYING AN PORT SCAN ON WIRESHARK PART 2 06 min
        • Assignment5.7
          5.12 Lab 0 week
        • Lecture5.13
          CHAPTER 5.13 IDENTIFYING A SERVICE SCAN ON WIRESHARK. 05 min
        • Assignment5.8
          5.13 lab 0 week
        • Lecture5.14
          Chapter 5.14 Identifying an Aggressive Scan on Wireshark 06 min
        • Assignment5.9
          5.14 Lab 0 week
      • PHASE 2 - CHAPTER 6 INTRO TO NESSUS
        18
        • Lecture6.1
          Chapter 6.1 Introduction to Nessus 05 min
        • Quiz6.1
          6.1 Questions 5 questions
        • Lecture6.2
          Chapter 6.2 Host Discovery Scan with Nessus 07 min
        • Assignment6.1
          6.2 Lab 0 week
        • Lecture6.3
          Chapter 6.3 Host Discovery Scan with Nessus Part 2 03 min
        • Assignment6.2
          6.3 Lab 0 week
        • Lecture6.4
          CHAPTER 6.4 BASIC NETWORK SCAN WITH NESSUS 06 min
        • Assignment6.3
          6.4 Lab 0 week
        • Lecture6.5
          CHAPTER 6.5 Credential Network Scan with Nessus. 06 min
        • Assignment6.4
          6.5 Lab 0 week
        • Lecture6.6
          CHAPTER 6.6 VULNERABILITY REPORT AND MANAGEMENT 06 min
        • Assignment6.5
          6.6 Lab 0 week
        • Lecture6.7
          Chapter 6.7 WIN 2016 SERVER VM INSTALLATION. 06 min
        • Assignment6.6
          6.7 Lab 0 week
        • Lecture6.8
          CHAPTER 6.8 AD INSTALLATION AND TROUBLESHOOTING A SLOW COMPUTER. 05 min
        • Assignment6.7
          6.8 Lab 0 week
        • Lecture6.9
          CHAPTER 6.9 CREATING AD ACCOUNTS AND MACHINES 06 min
        • Assignment6.8
          6.9 Lab 0 week
      • PHASE 2 - CHAPTER 7 ETHICAL HACKING
        20
        • Lecture7.1
          Chapter 7.1 Introduction to Ethical Hacking 05 min
        • Quiz7.1
          7.1 Questions 5 questions
        • Lecture7.2
          Chapter 7.2 Active Passive Recon and Scanning 05 min
        • Quiz7.2
          7.2 Questions 5 questions
        • Lecture7.3
          Chapter 7.3 Introduction to Netcraft Archive PIPL and HTTRACK 06 min
        • Assignment7.1
          7.3 Lab 0 week
        • Lecture7.4
          Chapter 7.4 Introduction to Maltego 06 min
        • Assignment7.2
          7.4 Lab 0 week
        • Lecture7.5
          Chapter 7.5 Introduction to NAT 06 min
        • Quiz7.3
          7.5 Questions 6 questions
        • Lecture7.6
          Chapter 7.6 Metagoofil and Email Tracker 06 min
        • Assignment7.3
          7.6 Lab 0 week
        • Lecture7.7
          chapter 7.7 Nmap Basic Scan (Review) 05 min
        • Assignment7.4
          7.7 Lab 0 week
        • Lecture7.8
          Chapter 7.8 Nmap Scripting Engine 05 min
        • Assignment7.5
          7.8 Lab 0 week
        • Lecture7.9
          Chapter 7.9 Introduction To Malware 04 min
        • Quiz7.4
          7.9 Questions 6 questions
        • Lecture7.10
          Chapter 7.10 How to Create a Computer Virus 06 min
        • Assignment7.6
          7.10 Lab 0 week
      • PHASE 2 - CHAPTER 8 METASPLOIT, VELT AND SHELLTER
        15
        • Lecture8.1
          Chapter 8.1 Intro to Metasploit, veil and Shellter 05 min
        • Quiz8.1
          8.1 Questions 5 questions
        • Lecture8.2
          Chapter 8.2 Backdoor Preparation OS Update and Veil Install 05 min
        • Lecture8.3
          Chapter 8.3 Reverse TCP Exploit (backdoor) Using Veil and Mestasploit 06 min
        • Assignment8.1
          8.3 Lab 0 week
        • Lecture8.4
          Chapter 8.4 Reverse TCP (Backdoor) exploit with AV off 04 min
        • Assignment8.2
          8.4 Lab 0 week
        • Lecture8.5
          Chapter 8.5 Backdoor exploit with AV turned on 06 min
        • Assignment8.3
          8.5 Lab 0 week
        • Lecture8.6
          Chapter 8.6 Meterpreter command examples after gaining access 06 min
        • Assignment8.4
          8.6 Lab 0 week
        • Lecture8.7
          Chapter 8.7 Introduction to wireless technology 05 min
        • Quiz8.2
          8.7 Questions 6 questions
        • Lecture8.8
          Chapter 8.8 Hacking a Hidden SSID 06 min
        • Assignment8.5
          8.8 Lab 0 week
      • PHASE 2 - CHAPTER 9 PERSISTENCE CONNECTION AND DHCP
        12
        • Lecture9.1
          Chapter 9.1 Intro to Persistence Connection and DHCP 05 min
        • Quiz9.1
          9.1 Questions 6 questions
        • Lecture9.2
          Chapter 9.2 Persistence Connection part 1 04 min
        • Assignment9.1
          9.2 Lab 0 week
        • Lecture9.3
          Chapter 9.3 Hacking Pep Talk and explanations 06 min
        • Assignment9.2
          9.3 Lab 0 week
        • Lecture9.4
          Chapter 9.4 Persistence Connection using MOF 06 min
        • Assignment9.3
          9.4 Lab 0 week
        • Lecture9.5
          Chapter 9.5 Intro to Cracking Wireless Security Protocols (WEP, WPA, WPA2) 05 min
        • Quiz9.2
          9.5 Questions 5 questions
        • Lecture9.6
          Chapter 9.6 Cracking Wireless (WPA2) Passwords 04 min
        • Assignment9.4
          9.6 Lab 0 week
      • PHASE 2 - CHAPTER 10 COVERING TRACKS
        10
        • Lecture10.1
          Chapter 10.1 Introduction to Covering Tracks 06 min
        • Quiz10.1
          10.1 Questions 5 questions
        • Lecture10.2
          Chapter 10.2 Clearing event logs 06 min
        • Assignment10.1
          10.2 Lab 0 week
        • Lecture10.3
          Chapter 10.3 Combining your payload with Jpeg 05 min
        • Assignment10.2
          10.3 Lab 0 week
        • Lecture10.4
          Chapter 10.4 Combining your payload with Excel 06 min
        • Assignment10.3
          10.4 Lab 0 week
        • Lecture10.5
          Chapter 10.5 Phishing Wifi Password with Wifiphisher 06 min
        • Assignment10.4
          10.5 Lab 0 week
      • PHASE 3 - CAREER DEVELOPMENT
        17
        • Lecture11.1
          Chapter 11 INTRODUCTION TO PHASE 3 – CAREER DEVELOPMENT
        • Lecture11.2
          Chapter 11.1 BRIEF DESCRIPTION OF THE MENTORSHIP PROGRAM
        • Lecture11.3
          Chapter 11.2 INTRO TO YOUR TRUE-TO-LIFE-PROJECTS
        • Lecture11.4
          Chapter 11.3 PROJECT 1 – SYSTEM A&A PROJECT
        • Lecture11.5
          CHAPTER 11.4 PROJECT 2 – VULNERABILITY MANAGEMENT INTRODUCTION
        • Lecture11.6
          Chapter 11.5 POJECT 2 – VMP – VULNERABILITY ANALYSIS
        • Lecture11.7
          Chapter 11.6 PROJECT 2 – VMP – INTRO TO PIVOT TABLES
        • Lecture11.8
          Chapter 11.7 PROJECT 2 – VMP – SUBMITTING CHANGE REQUESTS
        • Lecture11.9
          Chapter 11.8 PROJECT 2 – VMP – TRACK AND FOLLOW UP ON REMEDIATIONS
        • Lecture11.10
          Chapter 11.9 PROJECT 2 – VMP – DRAFT A VULNERABILITY ANALYSIS REPORT
        • Lecture11.11
          Chapter 11.10 Part 1 – Intro to Project 3 – SPLUNK App for Windows Infrastructure
        • Lecture11.12
          Chapter 11.10.1 Part 2 – Intro to Project 3 – SPLUNK App for Windows Infrastructure
        • Lecture11.13
          Chapter 11.11 Pep talk_ Project Expectations
        • Lecture11.14
          Chapter 11.12 PROJECT 3 – PLAN AND BUILD YOUR INFRASTRUCTURE FOR DEPLOYMENT
        • Lecture11.15
          Chapter 11.13 Project 3 – Creating the SPLUNK service account and configure with group policy
        • Lecture11.16
          Chapter 11.14 Project 3 – Install SPLUNK Enterprise and Add the Splunk License
        • Lecture11.17
          Chapter 11.15 Project 3 – Set up Basic Infrastructure
        This content is protected, please login and enroll course to view this content!
        Prev Chapter 8.1 Intro to Metasploit, veil and Shellter
        Next Chapter 8.2 Backdoor Preparation OS Update and Veil Install

          9 Comments

        1. TayoOgun
          March 29, 2020

          I’ve already spent a fortune learning the NIST RMF and can be sure that I certainly will get a better understanding of how i=the industry works in real life by joining your course.

          I hope to call you tomorrow @301 576 2977

          Thanks!

          • POyelakin
            March 29, 2020

            Thanks so much Tayo! I really appreciate it! yes give us a call anytime!!

        2. Dctonyburley
          May 29, 2020

          I am curious of there a checklist that lists the ATO activities, the various inputs & outputs (deliverable\artifacts) in chronological order? Like a “dummies” guide to RMF that explains the to my Senior Management the steps and required artifacts so I can illustrate the to properly resource an AWS ATO project?

        All Courses

        • Career Development
        • Certification Studies
        • Ethical Hacking
        • IT Foundations
        • Learn Fisma Compliance
        • Live Class
        • Security Compliance
        • Security Engineering

        Latest Courses

        Certified Ethical Hacker – Practical

        Certified Ethical Hacker – Practical

        $3,000.00 $2,500.00
        Cyber-Security LAB Preparation

        Cyber-Security LAB Preparation

        Free
        Fundamentals of IT

        Fundamentals of IT

        Free
        301-576-2977
        info@pjpros.com

        8401 Good Luck Rd.
        Rm 202 Lanham, MD 20706

        Facebook-f
        Youtube
        Linkedin
        Twitter
        Instagram

        Company

        • About Us
        • Blog
        • Contact
        • Become a Mentor

        Links

        • Courses
        • Events
        • Gallery
        • FAQs

        Support

        • Member Services
        • Forums
        • Technical Support
        • Billing

        Services

        • Information Security Services
        • IT Project management
        • Cybersecurity Training
        • Mentorship

        © Copyright - PJ Professional IT Services 

        • Privacy
        • Terms

        Login with your site account

        Lost your password?

        Not a member yet? Register now

        Register a new account

        Are you a member? Login now

        Modal title

        Message modal