Cover6 Solutions / BIC – Introduction to #Cybersecurity Workshop

Cover6 Solutions / Blacks in Cyber (BIC) Winter Conference 2021 - Introduction to #Cybersecurity Workshop

This guide prepares you for the Blacks in Cyber (BIC) Winter Conference 2021 - Introduction to #Cybersecurity training.

This one-day program is designed for beginners and covers the fundamentals of cybersecurity. We start with the basics of common computer and network services and end with exploitation and an understanding of attack methodologies and strategies to defend against them. We will also focus on ways to build a home lab along with challenges and educational references to improve your skillset.

Mr. Tyrone E. Wilson is a passionate information security professional with 24 years of experience in information technology and has a mission to improve as many lives as possible through education in cybersecurity. Wilson also has extensive knowledge in computer network defense, vulnerability assessments, cyber threat analysis, and incident response. Currently, Wilson is the Founder and CEO of Cover6 Solutions, LLC; which teaches companies and professionals various aspects of information security, penetration testing, and IPv6.  

Wilson is also the organizer of The D.C. Cyber Security Professionals. With over 9,000 members, it is the largest #Cybersecurity meetup group in the United States. In addition, Wilson is also on the Review Board of BSides NoVA, Howard University, and Hacker Halted and has presented and/or taught classes at many of the major tech conferences.

Tyrone E. Wilson

Founder & President

Workshop Read Ahead
Workshop Summaries

Today the demand for cybersecurity professionals has never been higher, and the need for skilled defensive (blue team) analysts is especially urgent. At Cover6 we will provide the training you need to find your place in cyber. We focus on the fundamentals of network defense through real-world, hands-on instruction, and our workshop will offer you a path to a successful career as a Security Operations Center (SOC) Analyst.

SOC Analysts are highly sought-after professionals who identify compromised machines and respond to malicious activity. They use defensive security skills and techniques while working to mitigate any damage that may have occurred.

Our Virtual SOC Analyst Prep Workshop offers a comprehensive introduction to defensive tactics, techniques, and procedures. Students will learn various strategies to help defend against several attack scenarios.

A few of the tools and technologies that participants will explore include; Security Onion, Wireshark, Splunk, and Nessus. Also, our course is designed to help you prepare for the CySA+ exam and reflects the current exam objectives.

In this workshop students will:

  • Analyze .pcap files and logs to identify Indicators of Compromise (IOC’s)
  • Perform various incident handling and response procedures
  • Use tools to implement initial threat hunting techniques
  • Be prepared to work in a SOC on day 1

Are you interested in learning the skills needed to test the defense of computers and networks around the world? Penetration testing or pentesting is one of the most challenging and rewarding areas of cybersecurity. At Cover6 Solutions, we do pentesting every day and we’re ready to share our knowledge with you if you’re ready to learn!

Welcome to our all-new Pentester Prep Workshop, where you’ll be exposed to the latest tools and technologies available for offensive cyber. Our intensive two-day workshop (Saturday & Sunday 9-5 PM ET) covers everything you need to get started in the red-hot field of pentesting.

You may be brand-new to cyber or maybe you already have some experience; either way, you will be getting your hands dirty and acquiring new skills to succeed in this high-demand field. That’s right, this is a very hands-on course and we have created challenging new labs and a brand-new virtual environment that will closely simulate actual pentesting engagements. We can’t wait for you to try it, we believe this will offer the most realistic pentesting training available today!

This workshop is tailored to prepare students to pass all major pentesting certification exams, including the CompTIA Pentest+, eJPT, and the CEH Practical. The only prerequisites for this workshop are curiosity and enthusiasm: you will need both!

The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback as well.  

If you have any additional questions outside of the FAQs, please do not hesitate to reach out to [email protected] and we will be happy to assist you. 

Course Outline 

This course is tailored to assist with the preparation for all offensive (practical) exams. It also includes the five primary exam objectives for the CompTIA Pentest+ Certification which are: 

  1. Planning and Scoping 
  2. Information Gathering and Vulnerability Identification 
  3. Attacks and Exploits 
  4. Penetration Testing Tools 
  5. Reporting and Communication 

Please note This is NOT an official CompTIA or CEH training class, but rather a preparation course for real scenarios you may encounter in pentesting engagements or on a certification exam. Various tools, techniques, and procedures will be covered during the sessions, so those listed in the syllabus above are just examples. This material is subject to change.

 

If you are interested in establishing a foundation of skills for a successful information security career, then this workshop is for you!

This Beginner-Intermediate, eight-week (every Tuesday night) workshop encompasses the skills of both a Penetration Tester (Pentester) and a Security Operations Center (SOC) Analyst. Throughout the course, we will address and discuss various offensive topics, tools, technologies, and methodologies used in the industry. Also, participants will learn how to respond to a network that is currently under attack—using industry technologies such as Nmap, Windows Sysinternals, Security Onion, Wireshark, Splunk, and Nessus. Students will learn numerous strategies to help defend against several attack scenarios. 

A Pentester develops and uses offensive skills and techniques to identify weaknesses for exploitation. SOC Analysts identify compromised machines and malicious actors. These highly sought-after individuals utilize defensive security skills and techniques that are commonly used in the industry while working to mitigate any damages that may have occurred.

The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback, as well. 

Our team has worked hard to create a course that provides a unique learning experience that you won’t find anywhere else. This will be challenging but it will be worth it. It will jump-start your career in cybersecurity and give you an outstanding foundation for the future!

If you have any additional questions outside of the FAQs, please do not hesitate to reach out to [email protected] and we will be happy to assist you.

This course is also tailored to help you prepare for the following certifications.

  1. CySA+
  2. eJPT
  3. CEH Practical

Helpful Videos to Prepare you for Class

Breaking into Cybersecurity w/ Tyrone E. Wilson

Home Lab Setup | Building an Effective Cybersecurity Learning Environment

Passive Information Gathering

Active Information Gathering

Understanding the Metasploit Database

Incident Handling & Threat Hunting w/ Security Onion: Gain Hands-On Cybersecurity Experience

IPv6 Enumeration & Attacks

Virtual Security Operations Center (SOC) Analyst Prep Workshop (Live) – FREE Session

Additional Educational References

Virtual SOC Analyst Prep Workshop (Live) – February 20th & 21st, 2021
10:00 AM – 4:00 PM EST

Virtual SOC Analyst Prep Workshop (Live) – March 6th & 7th, 2021
10:00 AM – 4:00 PM EST

Attack & Defend Workshop (Live) – Starting March 9th 2021
6:00 PM – 9:00 PM EST