THE 2 MAIN SECTIONS OF THE CYBERSECURITY HANDS-ON COURSE
This course is divided into 2 main sections.
Section 1 (Knowledge, skills, abilities): Covers all the fundamentals of cybersecurity Tools and Virtualization including the knowledge, skills, and abilities needed for you to work in the cybersecurity industry.
Section 2 (Hands-on Experience): This section covers the hands-on training aspect of cybersecurity. You will learn how to build your own cybersecurity lab on your laptop. You will have the opportunity to try your hands on popular cybersecurity tools to include vulnerability scanners, packet capture, SIEM, password cracking, social engineering, and many more.
COURSE STRUCTURE
This program is a self-paced online course.
Work at your own pace. This course is design to fit your work schedule.
WHAT YOU NEED FOR THIS COURSE
Computer/Laptop with at least 4G processer or higher. Storage space of 500GB or higher.
High speed internet is required. You can use Mac book or a Windows computer. Windows computer is preferred.
Courses Offered
Our courses are designed for all levels of professionals (beginners, intermediate, and advanced). Our courses break down complex cybersecurity concepts into simple everyday scenarios that our students can relate to.
Entry-Level Course Curriculum
- Introduction to Hands-on Performance Training (1:43)
- Lesson One: Introduction to Virtual Machines (VMs) (26:47)
- Lesson Two: Risk Associated With Virtual Machine (5:36)
- Lesson Three: Installation of Hypervisors and Virtual Machines (40:27)
- Installation of Metasploitable 3 (17:16)
- Installation of Parrot OS(Similar Kali Linux) (8:38)
- Installation of Windows 10 Virtual Machine (8:38)
- Installation of Windows 8 Virtual Machine (11:27)
- Windows Command Line Basics (23:09)
- Linux Command Line Basics (27:20)
- Lesson Four: Command Line Tools (54:32)
- Lesson Five: Intro To Popular Cybersecurity Tools (8:48)
- Lesson Six: Cybersecurity Collective Tools (17:14)
- Installation of SIEM Tools -Splunk (10:13)
- Installation of Nessus (14:58)
- Installation of Vulnerability Scanning Tool-Qualys (7:40)
- Lesson Seven: Cybersecurity Preventive Tools (6:48)
- Lesson Eight: Password Cracking Tools (2:10)
- Lesson Nine: Exploitation Tools (8:00)
- Lesson Ten: Social Engineering Attack Simulation (0:59)
- Vulnerability Database-CWE, NVD, CVE, CVSS (19:09)
- Nmap-Port/Network Scanner (35:58)
- How to configure FIREWALL, GROUP POLICY, PASSWORD POLICY (26:00)
- Nikto-Web Vulnerability Scanner (17:36)
- Wireshark and Man-in-the-middle Attack (14:20)
- Wireless Network Configuration (17:40)
- Using Nessus-1 (26:07)
- Using Nessus-2 (31:22)
- Splunk Enterprise 1 (60:12)
- Splunk Enterprise 2 (34:34)
- Hands-On Exercise
- Splunk Security Essentials 1 (39:05)
- Splunk Security Essential 2 (12:53)
- Splunk Enterprise Security (Splunk Cloud) (49:59)
- Nikto -Web Vulnerability Scanner (21:00)
- BurpSuite (Web Application Security Testing) (22:24)
- Social Engineering (How to Detect Phishing Attack) (31:09)
- Social Engineering (Credential Harvester Attack) (19:22)