Students will have the opportunity to work on advance cybsersecurity projects (some for real companies others in a simulated environment). After that we will Begin the Certified Ethical Hacker, CISSP and or Security+ exam prep. Once you’re certified and experienced, we will teach you resume writing conduct mach interviews and show you where to apply.

Once you’ve learned cybersecurity policy, engineering and hacking, its time to take things to the next level:

  • In phase 3, you will complete 3 true-to-life cyber security projects. These projects are noteworthy for your resume. We will also show you how to pass the CEH and CISSP certification exams.
  • You will learn techniques to writing an effective resume
  • Learn how to interview for positions
  • Access all our resources for job placement.

Course Curriculum

PHASE 3 - CAREER DEVELOPMENT
CHAPTER 11 - TRUE-TO-LIFE PROJECTS
Chapter 11 INTRODUCTION TO PHASE 3 – CAREER DEVELOPMENT Details 00:00:00
• Our objectives for Phase 3: 1- Complete 3 true-to-life cyber-security projects 2- Show you how to pass certification exams 3- Write an effective resume, 4- Apply and interview for cybersecurity positions.
Chapter 11.1 BRIEF DESCRIPTION OF THE MENTORSHIP PROGRAM Details 00:00:00
• Before we get started on your projects, I want to dedicate an entire video to tell you about what the mentorship experience will be like. I know, I talked about it in the introductory video. But I’ve got a little bit more information to add… feel free to skip ahead if you don’t want to hear it.
Chapter 11.2 INTRO TO YOUR TRUE-TO-LIFE-PROJECTS Details 00:00:00
• In this chapter (Chapter 11), we will focus on our 3 true to life information security projects.
Chapter 11.3 PROJECT 1 – SYSTEM A&A PROJECT Details 00:00:00
Your objective for Project #1 is to complete a system A&A for a network. If you’re in a mentorship program, your mentor will provide you with the system that you will need to assess. If you’re not in the mentorship program, I recommend you attempt one of the following options:
CHAPTER 11.4 PROJECT 2 – VULNERABILITY MANAGEMENT INTRODUCTION Details 00:00:00
Here’s the scenario for your second project: PJ Professional IT services does not have a Vulnerability Management Program (VMP) and we need YOU to create one. The good news is we’ve already drafted a Vulnerability Management Guideline.
Chapter 11.5 POJECT 2 – VMP – VULNERABILITY ANALYSIS Details 00:00:00
• The next item on our todo list is analyzing the scan results: 1. Run vulnerability scans on a weekly basis 2. Analyze the scan results 3. Submit Remediation request to the Configuration Change Board (CCB) 4. Track and follow up on the remediation 5. Draft a vulnerability analysis report
Chapter 11.6 PROJECT 2 – VMP – INTRO TO PIVOT TABLES Details 00:00:00
In this section, I am going to give you a quick lesson on how to use pivot tables. We will not go into deep analysis, but I will teach you enough to become dangerous with pivot tables.
Chapter 11.7 PROJECT 2 – VMP – SUBMITTING CHANGE REQUESTS Details 00:00:00
Chapter 11.8 PROJECT 2 – VMP – TRACK AND FOLLOW UP ON REMEDIATIONS Details 00:00:00
• Now let’s talk about the next action item which is to track and follow up on the remediation.
Chapter 11.9 PROJECT 2 – VMP – DRAFT A VULNERABILITY ANALYSIS REPORT Details 00:00:00
• Last but not least, the last task we identified from the guideline is to Draft a vulnerability analysis report 1. Run vulnerability scans on a weekly basis 2. Analyze the scan results 3. Submit Remediation request to the Configuration Change Board (CCB) 4. Track and follow up on the remediation 5. Draft a vulnerability analysis report • This is a report that will inform middle, upper and executive management on the state of vulnerabilities in the environment. As the author of the report, you will need draft something, and then work with your supervisor to shape the content.
Chapter 11.10 Project 3 – Intro to SPLUNK app for Windows Infrasrtucture Details 00:00:00
Welcome to your 3rd project! You are well on your way to becoming a well oiled security analyzing machine. For you third and final project, I want you to install SPLUNK for Windows Infrastructure.
Chapter 11.11 Pep talk_ Project Expectations Details 00:00:00
Before we take a deep dive into our third project. let’s have a brief pep talk! Yea, we haven’t had one of those in a while…
Chapter 11.12 PROJECT 3 – PLAN AND BUILD YOUR INFRASTRUCTURE FOR DEPLOYMENT Details 00:00:00
The SPLUNK for Windows Infrastructure app will require a more complicated build out because it will require the use of a service account along with other special configurations. Similar to the second project, it will be very important that you understand the concept of a domain. In case you’re still rusty on the concept of a domain, here’s another recap:

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE
20 STUDENTS ENROLLED

Recent Posts

Term : Taxonomy Mismatch: Selected Term does not exist in Taxonomy ! ..more..

About Us

A comprehensive online course unlike any out there in the industry. We teach you information security from the ground up. Our training program takes you from learning theories and concept to real world scenarios that you can visualize and apply. In addition to the on-demand learning, you also have the option to receive one on one mentorship online. Our mentors will help you gain experience by engaging with real-world projects.

top

X