Not sure how to start a career in cyber-security? You’ve finally came to the right place.

This course is packaged into a 3-phasedseries. The entire series cater to beginners that are interested in but are timid about breaking into the field of IT. I counter that apprehension with simplified explanations, a little sense of humor and mentorship-style language. Rather than providing a list of theories and concepts to memorize, you will gain hands on, true-to-life experiences after you’ve completed my course. In addition to this video course, you also have the option to purchase the book (paperback/ebook) on Amazon.com.

Here’s our game plan:

  • Phase 1- I will introduce you to a simulated government agency where you are task with completing their FISMA Compliance work (aka System A&A). In order to do that I will guide you through the RMF process (Steps 1-5). If you don’t know what these acronyms mean, don’t worry, we will break it all down in this course.
  • Phase 2 – In this phase I will introduce you to three popular security tools: SPLUNK, Nessus and Wireshark. After that we will have some fun by learning a few hacking techniques.
  • Phase 3 is where it all comes together, Using the knowledge you’ve gained in phases 1 & 2, you will complete three true-to-life information security projects. After that I will provide you with a game plan to study for your CEH and CISSP exams. Finally, I will show you how to draft your resume, where to apply for cyber-security jobs and how to interview for those jobs

 

If you’re ready, let’s get started!

Course Curriculum

PHASE 1 - CHAPTER 1 - IT FOUNDATIONS
Chapter 1.1 How to Become a Cyber Security Analyst Details FREE 00:06:00
Chapter 1.2 What is a Network Details 00:06:00
1.2 Questions Unlimited
Chapter 1.3 Components of an Enterprise Part 1 Details 00:06:00
1.3 Questions Unlimited
Chapter 1.4 Components of an Enterprise Part 2 Details 00:06:00
1.4 Questions Unlimited
Chapter 1.5 Components of an Enterprise Network Part 3 Details 00:06:00
1.5 Questions Unlimited
Chapter 1.6 The Physical Components of a Network Part 4- Bennefits of Servers Details 00:06:00
1.6 Questions Unlimited
Chapter 1.7 What is the Internet Details 00:04:00
1.7 Questions Unlimited
Chapter 1.8 The Human Component of an Enterprise Network Part 1 Details 00:05:00
1.8 Questions Unlimited
Chapter 1.9 The Human Component of an Enterprise Network Part 2 Details 00:06:00
1.9 Questions Unlimited
Chapter 1.10 THE HUMAN COMPONENT OF IT SUPPORT Details 00:06:00
1.10 Questions Unlimited
Chapter 1.11 Introduction to our Simulated Environment- Meet the IT Operations Team Details 00:06:00
1.11 Questions Unlimited
Chapter 1.12 Introduction to our simulated environment- Meet the IT Security Team Details 00:06:00
1.12 Questions Unlimited
PHASE 1 - CHAPTER 2 - RMF STEP 1-3
Chapter 2.1 INTRODUCTION TO SECURITY COMPLIANCE AND FISMA REQUIREMENTS Details 00:06:00
2.1 Questions Unlimited
Chapter 2.2 RMF STEP 1 – SECURITY CATEGORIZATION Details 00:05:00
2.2 Questions Unlimited
Chapter 2.3 Security Categorization Part 2 Details 00:07:00
2.3 Questions Unlimited
Chapter 2.4 RMF STEP 1- SECURITY CATEGORIZATION PART 3 Details 00:05:00
2.4 Questions Unlimited
Chapter 2.5 COMPENTS OF A SYSTEM AND TECHNICAL DESCRIPTION Details 00:05:00
2.5 Questions Unlimited
Chapter 2.6 COMPONENTS OF A SYSTEM TECHNICAL DESCRIPTION PART 2 Details 00:05:00
2.6 Questions Unlimited
Chapter 2.7 RMF STEP 2 – SELECT SECURITY CONTROLS Details 00:05:00
2.7 Questions Unlimited
Chapter 2.8 RMF STEP 3 – IMPLEMENTING SECURITY CONTROLS Details 00:05:00
2.8 Questions Unlimited
Chapter 2.9 Pep Talk-Intro to the SSP simulation Details 00:05:00
2.9 Questions Unlimited
Chapter 2.10 SSP Simulation – Editing the Cover Page Details 00:06:00
2.10 lab Unlimited
Chapter 2.11 SSP Simulation – Editing Security Categorization Details 00:06:00
2.11 Lab Unlimited
Chapter 2.12 How to Determine your Digital Identity Levels – Part 1 Details 00:06:00
The process to determine the level of security placed on your digital identity is quite detailed, but once you understand it, it’s pretty easy to follow. Digital identity considers three different identity categories. These categories are: • IAL • AAL • FAL
2.12 Questions Unlimited
Chapter 2.12.1 How to Determine your Digital Identity Levels – Part 2 Details 00:00:00
In the last video you had learned how to determine your Identity Assurance Level. Now let’s find out what each of the three levels mean. Table 4-1 of the NIST Publication 800-63-3 has a good summary chart of what is required for each IAL. I will give you a high level of each.
Chapter 2.12.2 How to Determine your Digital Identity Levels – Part 3 Details 00:00:00
And now for the last piece of our digital identity puzzle, FAL. This stands for Federal Assurance Level. In case you forgot the definition, here is is again. This category is listed as optional because it is generally used when the relying party (RP) and the identity provider (IdP) are sperate entities. The relying party is the location where the authenticator is used. And an identity provider is the one who makes the authenticator.
Chapter 2.13 SSP Simulation – Completing Digital Identity Details 00:00:00
• Monday 1:30 PM - Let’s get the digital identity section done shall we. You should know how to complete the digital identity worksheet from the last video! Like security categorization, we as analysts and contractors are NOT allowed to decide if the impact categories are low, moderate or high. We will need to interview a full-time DOP mission expert that understands how things may impact the organization’s mission goals. The same mission area experts that answered our security categorization questions should be able to provide impact level recommendations for digital identy. Section 2.3 says that we can use NIST 800-63-3 to guide their decision.
2.13 lab Unlimited
Chapter 2.13.1 SSP Simulation – Completing POC Sections Details 00:00:00
• Let’s move on to section 3 shall we… We will fill out the system owner information on table 3-1. We know this information, so I will enter it here.
Chapter 2.14 SSP Simulation – Completing the General System Description and User Types Details 00:06:00
2.14 lab Unlimited
Chapter 2.15 SSP Simulation – Describing the Network Architecture, Envrionment and Inventory Details 00:05:00
2.15 lab Unlimited
chapter 2.16 Chapter 2.16 SSP Simulation – System interconnection, Laws and regulations Details 00:06:00
2.16 lab Unlimited
Chapter 2.17 SSP Simulation – Selecting Controls-RMF STEP 2 Details 00:04:00
2.17 lab Unlimited
Chapter 2.18_SSP Simulation – Implementing the security controls_RMF Step 3 Details 00:04:00
2.18 lab Unlimited
Chapter 2.19_SSP Simulation – Implementing the security controls part 2 Details 00:00:00
2.19 lab Unlimited
PHASE 1- CHAPTER 3 RMF STEPS 4-5
Chapter 3.1_RMF STEP 4 ASSESSING SECURITY CONTROLS PART 1 Details 00:10:00
3.1 Questions Unlimited
Chapter 3.2 The Security Assessment Report – From Objective to Assessment Result Details 00:13:00
3.2 Questions Unlimited
Chapter 3.3 THE SECURITY ASSESSMENT REPORT CONTD Details 00:10:00
3.3 Questions Unlimited
Chapter 3.4 RMF STEP 5 AUTHORIZE THE INFORMATION SYSTEM Details 00:08:00
3.4 Questions Unlimited
Chapter 3.5 RMF STEP 5 CONTD & RMF STEP 6 – MONITOR THE SECURITY CONTROLS Details 00:10:00
3.5 Questions Unlimited
Chapter 3.6 Asessment Simulation – Introductions and preparation for the assessment Details 00:10:00
3.6 lab Unlimited
Chapter 3.7 Sample security assessment kick off Meeting Details 00:10:00
3.7 lab Unlimited
Chapter 3.8_Security Assessment Simulation – Completing the SAR Details 00:10:00
Chapter 3.9 Assessment simulation – completing the SAR part 2 Details 00:10:00
3.9 lab Unlimited
Chapter 3.10 Security Assessment simulation – Introduction to the POA&M Details 00:10:00
3.10lab 16:39:00
Chapter 3.11 Security Assessment simulation – POA&M 1- At-3 Details 00:10:00
3.11 lab Unlimited
Chapter 3.12 Security Assessment simulation – Submit the Authorization Package (RMF Step 5) and receive the ATO Details 00:10:00
Chapter 3.13 Phase 1 Completion – Pep Talk! Details 00:10:00
PHASE 2 - SECURITY ENGINEERING & ETHICAL HACKING
Chapter 4.0_Introduction to Phase 2: Security Engineering and Ethical Hacking Details FREE 00:00:00
Chapter 4.1 Introduction to Virtual Machines Details 00:06:00
4.1 Questions Unlimited
Chapter 4.10 Install SPLUNK Forwarders Part 2 Details 00:08:00
4.10 Lab Unlimited
Chapter 4.11 Install SPLUNK Forwarders Part 4 Details 00:05:00
4.11 Lab Unlimited
Chapter 4.12 Searching with SPLUNK Details 00:06:00
4.12 Lab Unlimited
Chapter 4.13 Splunk Report and Dashboard Details 00:06:00
4.13 Lab Unlimited
Chapter 4.2 VMware Installation Details 00:03:00
4.2 Lab Unlimited
Chapter 4.3 Kali Linux Installation Details 00:06:00
4.3 Lab Unlimited
Chapter 4.4 Windows 10 Installation Details 00:07:00
4.4 Lab Unlimited
Chapter 4.5 Introduction to Splunk Details 00:06:00
4.5 Questions Unlimited
Chapter 4.6 Splunk Installation and Splunk App Details 00:07:00
4.6 Lab Unlimited
Chapter 4.7 Introduction to Subnetting Details 00:06:00
4.7 Questions Unlimited
Chapter 4.8 Maping Your Lab Network Details 00:06:00
4.8 Lab Unlimited
Chapter 4.9 Install Splunk Forwarders Part 1 Details 00:06:00
4.9 Lab Unlimited
PHASE 2 - CHAPTER 5 INTRO TO OSI MODEL
Chapter 5.1 Introduction to the OSI Model Using Real World Examples Details 00:06:00
5.1 Questions Unlimited
Chapter 5.2 Data Packets, 3 Way Handshake and ARP Details 00:05:00
5.2 Questions Unlimited
Chapter 5.3 Introduction to WireShark Details 00:04:00
5.3 Questions Unlimited
Chapter 5.4 Install Wireshark and start data capture Details 00:00:00
5.4 Lab Unlimited
Chapter 5.5 Wireshark Filters and Windows Details 00:06:00
5.5 Lab Unlimited
Chapter 5.6 TCP Close Connection, TCP Flags & Intrusion Detection Details 00:05:00
5.6 Questions Unlimited
Chapter 5.7 Isolating Wireshark Traffic and Saving Files Details 00:06:00
5.7 Lab Unlimited
Chapter 5.8 Wireshark Flags SSL traffic Details 00:06:00
5.8 Lab Unlimited
Chapter 5.9 Detecting Attacks with Wireshark Intro to Nmap Details 00:05:00
5.9 Questions Unlimited
Chapter 5.10 Identifying a Host Discovery Scan on Wireshark Details 00:06:00
5.10 Lab Unlimited
CHAPTER 5.11 IDENTIFYING AN PORT SCAN ON WIRESHARK Details 00:06:00
5.11 Lab Unlimited
CHAPTER 5.12 IDENTIFYING AN PORT SCAN ON WIRESHARK PART 2 Details 00:06:00
5.12 Lab Unlimited
CHAPTER 5.13 IDENTIFYING A SERVICE SCAN ON WIRESHARK. Details 00:05:00
5.13 lab Unlimited
Chapter 5.14 Identifying an Aggressive Scan on Wireshark Details 00:06:00
5.14 Lab Unlimited
PHASE 2 - CHAPTER 6 INTRO TO NESSUS
Chapter 6.1 Introduction to Nessus Details 00:05:00
6.1 Questions Unlimited
Chapter 6.2 Host Discovery Scan with Nessus Details 00:07:00
6.2 Lab Unlimited
Chapter 6.3 Host Discovery Scan with Nessus Part 2 Details 00:03:00
6.3 Lab Unlimited
CHAPTER 6.4 BASIC NETWORK SCAN WITH NESSUS Details 00:06:00
6.4 Lab Unlimited
CHAPTER 6.5 Credential Network Scan with Nessus. Details 00:06:00
6.5 Lab Unlimited
CHAPTER 6.6 VULNERABILITY REPORT AND MANAGEMENT Details 00:06:00
6.6 Lab Unlimited
Chapter 6.7 WIN 2016 SERVER VM INSTALLATION. Details 00:06:00
6.7 Lab Unlimited
CHAPTER 6.8 AD INSTALLATION AND TROUBLESHOOTING A SLOW COMPUTER. Details 00:05:00
6.8 Lab Unlimited
CHAPTER 6.9 CREATING AD ACCOUNTS AND MACHINES Details 00:06:00
6.9 Lab Unlimited
PHASE 2 - CHAPTER 7 ETHICAL HACKING
Chapter 7.1 Introduction to Ethical Hacking Details 00:05:00
7.1 Questions Unlimited
Chapter 7.10 How to Create a Computer Virus Details 00:06:00
7.10 Lab Unlimited
Chapter 7.2 Active Passive Recon and Scanning Details 00:05:00
7.2 Questions Unlimited
Chapter 7.3 Introduction to Netcraft Archive PIPL and HTTRACK Details 00:06:00
7.3 Lab Unlimited
Chapter 7.4 Introduction to Maltego Details 00:06:00
7.4 Lab Unlimited
Chapter 7.5 Introduction to NAT Details 00:06:00
7.5 Questions Unlimited
Chapter 7.6 Metagoofil and Email Tracker Details 00:06:00
7.6 Lab Unlimited
chapter 7.7 Nmap Basic Scan (Review) Details 00:05:00
7.7 Lab Unlimited
Chapter 7.8 Nmap Scripting Engine Details 00:05:00
7.8 Lab Unlimited
Chapter 7.9 Fun Hack x264 Details 00:04:00
7.9 Questions Unlimited
PHASE 2 - CHAPTER 8 METASPLOIT, VELT AND SHELLTER
Chapter 8.1 Intro to Metasploit, veil and Shellter Details 00:05:00
8.1 Questions Unlimited
Chapter 8.2 Backdoor Preparation OS Update and Veil Install Details 00:05:00
Chapter 8.3 Reverse TCP Exploit (backdoor) Using Veil and Mestasploit Details 00:06:00
8.3 Lab Unlimited
Chapter 8.4 Reverse TCP (Backdoor) exploit with AV off Details 00:04:00
8.4 Lab Unlimited
Chapter 8.5 Backdoor exploit with AV turned on Details 00:06:00
8.5 Lab Unlimited
Chapter 8.6 Meterpreter command examples after gaining access Details 00:06:00
8.6 Lab Unlimited
Chapter 8.7 Introduction to wireless technology Details 00:05:00
8.7 Questions Unlimited
Chapter 8.8 Hacking a Hidden SSID Details 00:06:00
8.8 Lab Unlimited
PHASE 2 - CHAPTER 9 PERSISTENCE CONNECTION AND DHCP
Chapter 9.1 Intro to Persistence Connection and DHCP Details 00:05:00
9.1 Questions Unlimited
Chapter 9.2 Persistence Connection part 1 Details 00:04:00
9.2 Lab Unlimited
Chapter 9.3 Hacking Pep Talk and explanations Details 00:06:00
9.3 Lab Unlimited
Chapter 9.4 Persistence Connection using MOF Details 00:06:00
9.4 Lab Unlimited
Chapter 9.5 Intro to Cracking Wireless Security Protocols (WEP, WPA, WPA2) Details 00:05:00
9.5 Questions Unlimited
Chapter 9.6 Cracking Wireless (WPA2) Passwords Details 00:04:00
9.6 Lab Unlimited
PHASE 2 - CHAPTER 10 COVERING TRACKS
Chapter 10.1 Introduction to Covering Tracks Details 00:06:00
10.1 Questions Unlimited
Chapter 10.2 Clearing event logs Details 00:06:00
10.2 Lab Unlimited
Chapter 10.3 Combining your payload with Jpeg Details 00:05:00
10.3 Lab Unlimited
Chapter 10.4 Combining your payload with Excel Details 00:06:00
10.4 Lab Unlimited
Chapter 10.5 Phishing Wifi Password with Wifiphisher Details 00:06:00
10.5 Lab Unlimited
Chapter 10.6 Phishing Wifi Password with Wifiphisher Part 2 Details 00:06:00
PHASE 3 - CAREER DEVELOPMENT
Chapter 11 INTRODUCTION TO PHASE 3 – CAREER DEVELOPMENT Details 00:00:00
• Our objectives for Phase 3: 1- Complete 3 true-to-life cyber-security projects 2- Show you how to pass certification exams 3- Write an effective resume, 4- Apply and interview for cybersecurity positions.
Chapter 11.1 BRIEF DESCRIPTION OF THE MENTORSHIP PROGRAM Details 00:00:00
• Before we get started on your projects, I want to dedicate an entire video to tell you about what the mentorship experience will be like. I know, I talked about it in the introductory video. But I’ve got a little bit more information to add… feel free to skip ahead if you don’t want to hear it.
Chapter 11.2 INTRO TO YOUR TRUE-TO-LIFE-PROJECTS Details 00:00:00
• In this chapter (Chapter 11), we will focus on our 3 true to life information security projects.
Chapter 11.3 PROJECT 1 – SYSTEM A&A PROJECT Details 00:00:00
Your objective for Project #1 is to complete a system A&A for a network. If you’re in a mentorship program, your mentor will provide you with the system that you will need to assess. If you’re not in the mentorship program, I recommend you attempt one of the following options:
CHAPTER 11.4 PROJECT 2 – VULNERABILITY MANAGEMENT INTRODUCTION Details 00:00:00
Here’s the scenario for your second project: PJ Professional IT services does not have a Vulnerability Management Program (VMP) and we need YOU to create one. The good news is we’ve already drafted a Vulnerability Management Guideline.
Chapter 11.5 POJECT 2 – VMP – VULNERABILITY ANALYSIS Details 00:00:00
• The next item on our todo list is analyzing the scan results: 1. Run vulnerability scans on a weekly basis 2. Analyze the scan results 3. Submit Remediation request to the Configuration Change Board (CCB) 4. Track and follow up on the remediation 5. Draft a vulnerability analysis report
Chapter 11.6 PROJECT 2 – VMP – INTRO TO PIVOT TABLES Details 00:00:00
In this section, I am going to give you a quick lesson on how to use pivot tables. We will not go into deep analysis, but I will teach you enough to become dangerous with pivot tables.
Chapter 11.7 PROJECT 2 – VMP – SUBMITTING CHANGE REQUESTS Details 00:00:00
Chapter 11.8 PROJECT 2 – VMP – TRACK AND FOLLOW UP ON REMEDIATIONS Details 00:00:00
• Now let’s talk about the next action item which is to track and follow up on the remediation.
Chapter 11.9 PROJECT 2 – VMP – DRAFT A VULNERABILITY ANALYSIS REPORT Details 00:00:00
• Last but not least, the last task we identified from the guideline is to Draft a vulnerability analysis report 1. Run vulnerability scans on a weekly basis 2. Analyze the scan results 3. Submit Remediation request to the Configuration Change Board (CCB) 4. Track and follow up on the remediation 5. Draft a vulnerability analysis report • This is a report that will inform middle, upper and executive management on the state of vulnerabilities in the environment. As the author of the report, you will need draft something, and then work with your supervisor to shape the content.
Chapter 11.10 Part 1 – Intro to Project 3 – SPLUNK App for Windows Infrastructure Details 00:00:00
Welcome to your 3rd project! You are well on your way to becoming a well oiled security analyzing machine. For you third and final project, I want you to install SPLUNK for Windows Infrastructure.
Chapter 11.10.1 Part 2 – Intro to Project 3 – SPLUNK App for Windows Infrastructure Details 00:00:00
Here’s our configuration game plan: 1- Plan and Build your Infrastructure for Deployment: 2- Creating the SPLUNK account: 3- Install SPLUNK Enterprise: 4- Set up basic infrastructure 5- Get Windows Data: 6- Get Active Directory and DNS data: 7- Deploy the Splunk app for windows Infrastructure: Hope you’re excited for project 3, let’s get Splunking!
Chapter 11.11 Pep talk_ Project Expectations Details 00:00:00
Before we take a deep dive into our third project. let’s have a brief pep talk! Yea, we haven’t had one of those in a while…
Chapter 11.12 PROJECT 3 – PLAN AND BUILD YOUR INFRASTRUCTURE FOR DEPLOYMENT Details 00:00:00
The SPLUNK for Windows Infrastructure app will require a more complicated build out because it will require the use of a service account along with other special configurations. Similar to the second project, it will be very important that you understand the concept of a domain. In case you’re still rusty on the concept of a domain, here’s another recap:
Chapter 11.3 Project 3 – Creating the SPLUNK service account and configure with group policy Details 00:00:00
Now that you have your infrastructure set up, we will need to create and configure the SPLUNK service account on our AD servicer for SPLUNK to use. As I explained in project 2, service accounts work the same way as a domain account. They are generally used by applications to provide a service. In this case, the service account will give SPLUNK the authority to retrieve event log data from other domain joined devices on the network. We will use group policy to make sure that the splunk service account has the appropriate permissions and restriction settings to do its job.
Chapter 11.14 Project 3 – Install SPLUNK Enterprise and Add the Splunk License Details 00:00:00
• After your SPLUNK account has been created, you can go ahead and install splunk enterprise on your splunk server. This license you will download will allow you to ingest up to 10GB of data per day for 6 months! I will provide you with specific instructions for this task.
Chapter 11.15 Project 3 – Set up Basic Infrastructure Details 00:00:00
• At this point, you have completed the following tasks: o Built your servers/workstation(s) and domain joined them. o Created your splunk account and set permissions and restrictions via group policy settings o Installed Splunk on the second server (not the AD server) • Now it’s time to set up your basic infrastructure by completing the following: o Install and Configure the SPLUNK Platform Indexer o configure the deployment server o install our new universal forwarders on the AD and windows 10 machines o use the deployment server to control our universal forwarders’ configurations. By creating a server class.

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

About Us

A comprehensive online course unlike any out there in the industry. We teach you information security from the ground up. Our training program takes you from learning theories and concept to real world scenarios that you can visualize and apply. In addition to the on-demand learning, you also have the option to receive one on one mentorship online. Our mentors will help you gain experience by engaging with real-world projects.

X