We kick this phase off by catering to beginners. We will get you familiarized with basic IT terminologies and concepts.
After learning foundation IT concepts, you will learn the process to make a network FISMA compliant. We will do this using the Risk management Framework (RMF) for guidance.
Think of FISMA compliance as the documentation side of Information Security (aka Cybersecurity Policy). FISMA compliance is a requirement for all networks that hold government data.
Learning this skill alone can provide you with a lucrative career!
Once you're done learning cybersecurity policy, you will get some hands on keyboard experience!
Phase 2 is where you will develop a home lab and learn how to use the popular security tools such as SPLUNK, Nessus and Wireshark. These are the most popular tools in use by major companies today.
After learning how to use popular security tools, we will practice our hacking skills with Metasploit Framework.
You will learn to hack wired and wireless networks. If you can think like an hacker, you will be better suited to defend against them. Not to mention is will be impressive to discuss your hacking skills during your job interview 😉
Once you've learned cybersecurity policy, engineering and hacking, its time to take things to the next level:
- In phase 3, you will complete 3 true-to-life cyber security projects. These projects are noteworthy for your resume. We will also show you how to pass the CEH and CISSP certification exams.
- You will learn techniques to writing an effective resume
- Learn how to interview for positions
- Access all our resources for job placement.
If you're ready, let's get started!
Optionally, you can work with an information security professional during PHASE 3.
Your mentor is an information security professionals that will provide you with practical experiences to put on your resume. Hire a mentor and start developing a real work history. Spaces are limited and you are required to complete PHASE 1 and PHASE 2 prior.
Paul Oyelakin, founder of PJ IT Pros, is an experienced IT Security Manager with a broad-range of technical and management skills.
He has more than 12 years of Management and IT support experience.
His education include: Master’s in Cyber security, CEH, CISSP, MBA, PMP & PSMI.
Paul has repeatedly served as senior adviser to federal Chief Information Security Officers (CISOs), CIOs and CEOs.
Paul has Strong expertise in providing management leadership for the development and major enhancements to IT policies and operations including: LAN development, SPLUNK, Azure Cloud development, system accreditation (A&A), disaster recovery & security awareness training.
He is Published Author and Instructor. Highest rated Udemy course – Lean FISMA Compliance. Book publication: How to Become a Cyber Security Analyst – Phase 1 & Phase 2
Some of our Courses
- Price Options +