Students will have the opportunity to work on advance cybsersecurity projects (some for real companies others in a simulated environment). After that we will Begin the Certified Ethical Hacker, CISSP and or Security+ exam prep. Once you’re certified and experienced, we will teach you resume writing conduct mach interviews and show you where to apply.

NOTE: This course starts at Chapter 11. The preceding chapters  (Chapter 1-7) is ONLY required IF you are looking to use this course to gain experience in Cyber-Security.

TAKE THIS COURSE

Refer to This course provides you with mentorship style guidance on how to gain a career in cyber-security. We realize that a lot of beginners are frustrated because  they don’t have experience and certifications. Some are not sure how to write an effective resume and interview for a cyber-security job. Well… you’ve finally came to the right place because this course offers effective solutions to all these problems.

In this course, you will:

  • Complete 3 true-to-life cyber security projects. These projects are noteworthy for your resume.
  • We will show how to have a very high probability of passing the CEH and CISSP exams
  • You will learn techniques to writing an effective resume that are sure to have employers spamming your inbox
  • Learn how to interview for positions
  • Access all our resources for job placement assistance

Course Curriculum

PHASE 3 - CAREER DEVELOPMENT
CHAPTER 11 - TRUE-TO-LIFE PROJECTS
Chapter 11 INTRODUCTION TO PHASE 3 – CAREER DEVELOPMENT Details 00:00:00
• Our objectives for Phase 3: 1- Complete 3 true-to-life cyber-security projects 2- Show you how to pass certification exams 3- Write an effective resume, 4- Apply and interview for cybersecurity positions.
Chapter 11.1 BRIEF DESCRIPTION OF THE MENTORSHIP PROGRAM Details 00:00:00
• Before we get started on your projects, I want to dedicate an entire video to tell you about what the mentorship experience will be like. I know, I talked about it in the introductory video. But I’ve got a little bit more information to add… feel free to skip ahead if you don’t want to hear it.
Chapter 11.2 INTRO TO YOUR TRUE-TO-LIFE-PROJECTS Details 00:00:00
• In this chapter (Chapter 11), we will focus on our 3 true to life information security projects.
Chapter 11.3 PROJECT 1 – SYSTEM A&A PROJECT Details 00:00:00
Your objective for Project #1 is to complete a system A&A for a network. If you’re in a mentorship program, your mentor will provide you with the system that you will need to assess. If you’re not in the mentorship program, I recommend you attempt one of the following options:
CHAPTER 11.4 PROJECT 2 – VULNERABILITY MANAGEMENT INTRODUCTION Details 00:00:00
Here’s the scenario for your second project: PJ Professional IT services does not have a Vulnerability Management Program (VMP) and we need YOU to create one. The good news is we’ve already drafted a Vulnerability Management Guideline.
Chapter 11.5 POJECT 2 – VMP – VULNERABILITY ANALYSIS Details 00:00:00
• The next item on our todo list is analyzing the scan results: 1. Run vulnerability scans on a weekly basis 2. Analyze the scan results 3. Submit Remediation request to the Configuration Change Board (CCB) 4. Track and follow up on the remediation 5. Draft a vulnerability analysis report
Chapter 11.6 PROJECT 2 – VMP – INTRO TO PIVOT TABLES Details 00:00:00
In this section, I am going to give you a quick lesson on how to use pivot tables. We will not go into deep analysis, but I will teach you enough to become dangerous with pivot tables.
Chapter 11.7 PROJECT 2 – VMP – SUBMITTING CHANGE REQUESTS Details 00:00:00
Chapter 11.8 PROJECT 2 – VMP – TRACK AND FOLLOW UP ON REMEDIATIONS Details 00:00:00
• Now let’s talk about the next action item which is to track and follow up on the remediation.
Chapter 11.9 PROJECT 2 – VMP – DRAFT A VULNERABILITY ANALYSIS REPORT Details 00:00:00
• Last but not least, the last task we identified from the guideline is to Draft a vulnerability analysis report 1. Run vulnerability scans on a weekly basis 2. Analyze the scan results 3. Submit Remediation request to the Configuration Change Board (CCB) 4. Track and follow up on the remediation 5. Draft a vulnerability analysis report • This is a report that will inform middle, upper and executive management on the state of vulnerabilities in the environment. As the author of the report, you will need draft something, and then work with your supervisor to shape the content.
Chapter 11.10 Part 1 – Intro to Project 3 – SPLUNK App for Windows Infrastructure Details 00:00:00
Welcome to your 3rd project! You are well on your way to becoming a well oiled security analyzing machine. For you third and final project, I want you to install SPLUNK for Windows Infrastructure.
Chapter 11.10.1 Part 2 – Intro to Project 3 – SPLUNK App for Windows Infrastructure Details 00:00:00
Here’s our configuration game plan: 1- Plan and Build your Infrastructure for Deployment: 2- Creating the SPLUNK account: 3- Install SPLUNK Enterprise: 4- Set up basic infrastructure 5- Get Windows Data: 6- Get Active Directory and DNS data: 7- Deploy the Splunk app for windows Infrastructure: Hope you’re excited for project 3, let’s get Splunking!
Chapter 11.11 Pep talk_ Project Expectations Details 00:00:00
Before we take a deep dive into our third project. let’s have a brief pep talk! Yea, we haven’t had one of those in a while…
Chapter 11.12 PROJECT 3 – PLAN AND BUILD YOUR INFRASTRUCTURE FOR DEPLOYMENT Details 00:00:00
The SPLUNK for Windows Infrastructure app will require a more complicated build out because it will require the use of a service account along with other special configurations. Similar to the second project, it will be very important that you understand the concept of a domain. In case you’re still rusty on the concept of a domain, here’s another recap:
Chapter 11.3 Project 3 – Creating the SPLUNK service account and configure with group policy Details 00:00:00
Now that you have your infrastructure set up, we will need to create and configure the SPLUNK service account on our AD servicer for SPLUNK to use. As I explained in project 2, service accounts work the same way as a domain account. They are generally used by applications to provide a service. In this case, the service account will give SPLUNK the authority to retrieve event log data from other domain joined devices on the network. We will use group policy to make sure that the splunk service account has the appropriate permissions and restriction settings to do its job.
Chapter 11.14 Project 3 – Install SPLUNK Enterprise and Add the Splunk License Details 00:00:00
• After your SPLUNK account has been created, you can go ahead and install splunk enterprise on your splunk server. This license you will download will allow you to ingest up to 10GB of data per day for 6 months! I will provide you with specific instructions for this task.
Chapter 11.15 Project 3 – Set up Basic Infrastructure Details 00:00:00
• At this point, you have completed the following tasks: o Built your servers/workstation(s) and domain joined them. o Created your splunk account and set permissions and restrictions via group policy settings o Installed Splunk on the second server (not the AD server) • Now it’s time to set up your basic infrastructure by completing the following: o Install and Configure the SPLUNK Platform Indexer o configure the deployment server o install our new universal forwarders on the AD and windows 10 machines o use the deployment server to control our universal forwarders’ configurations. By creating a server class.

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

About Us

A comprehensive online course unlike any out there in the industry. We teach you information security from the ground up. Our training program takes you from learning theories and concept to real world scenarios that you can visualize and apply. In addition to the on-demand learning, you also have the option to receive one on one mentorship online. Our mentors will help you gain experience by engaging with real-world projects.

X