• COURSES
    • Certified Ethical Hacker – Practical
    • Cyber-Security Career Development Program – Online
    • IT Fundamentals
    • CISSP Boot Camp
    • FISMA Compliance
    • All Courses
  • Program Descriptions
  • Membership
    • Member Services
    • Membership Levels
    • Membership Cancel
    • Membership Billing
  • Page
    • Services
    • Become a Mentor
    • Shop
    • About Us
    • Contact
    • Blog
    • FAQs
    Learn How to Become A Cyber Security Analyst, Class starts 1/18/2021.    Limited seats available.    Sign Up Now
    RegisterLogin
    PJ Cyber-Security SchoolPJ Cyber-Security School
    • COURSES
      • Certified Ethical Hacker – Practical
      • Cyber-Security Career Development Program – Online
      • IT Fundamentals
      • CISSP Boot Camp
      • FISMA Compliance
      • All Courses
    • Program Descriptions
    • Membership
      • Member Services
      • Membership Levels
      • Membership Cancel
      • Membership Billing
    • Page
      • Services
      • Become a Mentor
      • Shop
      • About Us
      • Contact
      • Blog
      • FAQs

      Security Engineering

      • Home
      • All courses
      • Security Engineering
      • Security Engineering

      Security Engineering

      POyelakin
      Security Engineering
      (0 review)
      Free
      Buy Membership
      • Overview
      • Curriculum
      • Instructor
      • Reviews

      This is where we develop your technical skills. You will learn popular security tools such as SPLUNK, Nessus and Wireshark.

      Prior to this course, you should have your home lab set up and ready to go. You will need the to have the following virtual machines set up:

      • Windows 10
      • Linux (Debian/Kali)

      For the best Experience in this course, you will need to have a computer where you can download software. We recommend you to have a computer that meet the following specifications:

      • i5 CPU (i7 even better)
      • 8GB RAM (12-16 even better)
      • Solid State Drive

      You can get away with lower specs but you risk computer freezing when you run multiple virtual machines… that can create a frustrating experience with your labs.

       

      Course Features

      • Lectures 29
      • Quizzes 8
      • Skill level All Beginner
      • Language English
      • Students 290
      • Certificate No
      • Assessments Self
      CoursesSecurity EngineeringSecurity Engineering
      • Chapter 4 17

        • Lecture1.1
          SEC ENG – Introduction to Security Engineering 05 min
        • Lecture1.2
          SEC ENG – Introduction to SPLUNK 06 min
        • Quiz1.1
          SEC ENG – Intro to SPLUNK Quiz 10 questions
        • Lecture1.3
          SEC ENG – Splunk Installation and Splunk App 07 min
        • Quiz1.2
          SEC ENG – Splunk Installation Quiz 0 question
        • Lecture1.4
          Chapter 4.8 Maping Your Lab Network 06 min
        • Assignment1.1
          4.8 Lab 0 day
        • Lecture1.5
          SEC ENG – Install Splunk Forwarders Part 1 06 min
        • Assignment1.2
          4.9 Lab 0 day
        • Lecture1.6
          SEC ENG – Install SPLUNK Forwarders Part 2 08 min
        • Assignment1.3
          4.10 Lab 0 day
        • Lecture1.7
          Install SPLUNK Forwarders Part 3 05 min
        • Assignment1.4
          4.11 lab 3 days
        • Lecture1.8
          Chapter 4.12 Searching with SPLUNK 06 min
        • Assignment1.5
          4.12 Lab 0 day
        • Lecture1.9
          Chapter 4.13 Splunk Report and Dashboard 06 min
        • Assignment1.6
          4.13 Lab 0 day
      • Chapter 5 28

        • Lecture2.1
          Chapter 5.1 Introduction to the OSI Model Using Real World Examples 06 min
        • Quiz2.1
          5.1 Questions 8 questions
        • Lecture2.2
          Chapter 5.2 Data Packets, 3 Way Handshake and ARP 05 min
        • Quiz2.2
          5.2 Questions 6 questions
        • Lecture2.3
          Chapter 5.3 Introduction to WireShark 04 min
        • Quiz2.3
          5.3 Questions 4 questions
        • Lecture2.4
          Chapter 5.4 Install Wireshark and start data capture
        • Assignment2.1
          5.4 Lab 0 day
        • Lecture2.5
          Chapter 5.5 Wireshark Filters and Windows 06 min
        • Assignment2.2
          5.5 Lab 0 day
        • Lecture2.6
          Chapter 5.6 TCP Close Connection, TCP Flags & Intrusion Detection 05 min
        • Quiz2.4
          5.6 Questions 8 questions
        • Lecture2.7
          Chapter 5.7 Isolating Wireshark Traffic and Saving Files 06 min
        • Assignment2.3
          5.7 Lab 0 day
        • Lecture2.8
          Chapter 5.8 Wireshark Flags SSL traffic 06 min
        • Assignment2.4
          5.8 Lab 0 day
        • Lecture2.9
          Chapter 5.9 Detecting Attacks with Wireshark Intro to Nmap 05 min
        • Quiz2.5
          5.9 Questions 9 questions
        • Lecture2.10
          Chapter 5.10 Identifying a Host Discovery Scan on Wireshark 06 min
        • Assignment2.5
          5.10 Lab 0 day
        • Lecture2.11
          CHAPTER 5.11 IDENTIFYING A PORT SCAN ON WIRESHARK 06 min
        • Assignment2.6
          5.11 Lab 0 day
        • Lecture2.12
          CHAPTER 5.12 IDENTIFYING AN PORT SCAN ON WIRESHARK PART 2 06 min
        • Assignment2.7
          5.12 Lab 0 day
        • Lecture2.13
          CHAPTER 5.13 IDENTIFYING A SERVICE SCAN ON WIRESHARK. 05 min
        • Assignment2.8
          5.13 lab 0 day
        • Lecture2.14
          Chapter 5.14 Identifying an Aggressive Scan on Wireshark 06 min
        • Assignment2.9
          5.14 Lab 0 day
      • Chapter 6 11

        • Lecture3.1
          Chapter 6.1 Introduction to Nessus 05 min
        • Quiz3.1
          6.1 Questions 5 questions
        • Lecture3.2
          Chapter 6.2 Host Discovery Scan with Nessus 07 min
        • Assignment3.1
          6.2 Lab 0 day
        • Lecture3.3
          Chapter 6.3 Host Discovery Scan with Nessus Part 2 03 min
        • Assignment3.2
          6.3 Lab 0 day
        • Lecture3.4
          CHAPTER 6.4 BASIC NETWORK SCAN WITH NESSUS 06 min
        • Assignment3.3
          6.4 Lab 0 day
        • Lecture3.5
          CHAPTER 6.5 Credential Network Scan with Nessus. 06 min
        • Assignment3.4
          6.5 Lab 0 day
        • Lecture3.6
          CHAPTER 6.6 VULNERABILITY REPORT AND MANAGEMENT 06 min
      POyelakin

      Reviews

      Average Rating

      0
      0 rating

      Detailed Rating

      5
      0%
      4
      0%
      3
      0%
      2
      0%
      1
      0%
      • Overview
      • Curriculum
      • Instructor
      • Reviews
      Free
      Buy Membership
      • Share:

      You May Like

      Certified Ethical Hacker – Practical Read More
      POyelakin

      Certified Ethical Hacker - Practical

      1
      0
      $3,000.00 $2,500.00
      Cyber-Security LAB Preparation Read More
      POyelakin

      Cyber-Security LAB Preparation

      215
      0
      Free
      Fundamentals of IT and Cyber-Security Support Read More
      POyelakin

      Fundamentals of IT and Cyber-Security Support

      650
      0
      Free
      CISSP Boot Camp Read More
      Ezenta Nwagwu

      CISSP Boot Camp

      60
      0
      $6,000.00 $3,500.00
      Security+ Boot Camp Read More
      Jerran

      Security+ Boot Camp

      70
      0
      $3,900.00 $2,500.00

      Leave A Reply Cancel reply

      Your email address will not be published. Required fields are marked *

      All Courses

      • Career Development
      • Certification Studies
      • Ethical Hacking
      • IT Foundations
      • Learn Fisma Compliance
      • Live Class
      • Security Compliance
      • Security Engineering

      Latest Courses

      Certified Ethical Hacker – Practical

      Certified Ethical Hacker – Practical

      $3,000.00 $2,500.00
      Cyber-Security LAB Preparation

      Cyber-Security LAB Preparation

      Free
      Fundamentals of IT and Cyber-Security Support

      Fundamentals of IT and Cyber-Security Support

      Free
      301-576-2977
      info@pjpros.com

      8401 Good Luck Rd.
      Rm 202 Lanham, MD 20706

      Facebook-f
      Youtube
      Linkedin
      Twitter
      Instagram

      Company

      • About Us
      • Blog
      • Contact
      • Become a Mentor

      Links

      • Courses
      • Events
      • Gallery
      • FAQs

      Support

      • Member Services
      • Forums
      • Technical Support
      • Billing

      Services

      • Information Security Services
      • IT Project management
      • Cybersecurity Training
      • Mentorship

      © Copyright - PJ Professional IT Services 

      • Privacy
      • Terms

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account

      Are you a member? Login now

      Modal title

      Message modal