Warning: strpos(): Empty needle in /home/customer/www/cover6solutions.com/public_html/wp-content/plugins/buddyboss-platform/bp-core/bp-core-filters.php on line 800
  • Log In
  • Register
  • Account details
  • About
  • Blog
  • Courses
  • Events
  • Shop
  • Jobs Board

    Shopping Cart

    No products in the cart.

    Sign in Sign up
    Cover6 Solutions

    Shopping Cart

    No products in the cart.

    Cover6 Solutions
    • About
    • Blog
    • Courses
    • Events
    • Shop
    • Jobs Board

    • Log In
    • Register
    • Account details

    Category: Penetration Testing

    Pentesting with BeEF and Social Engineering Techniques w/ Juan Araya

    Want to learn more about social engineering, the Browser Exploitation Framework (BeEF), and how to use them to perform penetration testing (#pentestin…
    cover6 February 4, 2021
    0 Comments

    Common Network Services, Threats & Attacks w/ Tyrone E. Wilson

    It’s critical for anyone learning cybersecurity to understand the common services and threats they will encounter every day on the job.
    cover6 January 28, 2021

    A Day in the Life of a Web App Pentester w/ Christian Elston

    Christian Elston discusses hacking software as a job, the certifications needed, and building a resume for that job.
    cover6 January 26, 2021
    0 Comments

    IPv6 Enumeration & Attacks

    No more avoiding it, it's time to learn what IPv6 is and what tools you can use to enumerate and attack the protocol.
    cover6 January 19, 2021

    Home Lab Setup | Building an Effective Cybersecurity Learning Environment

    Having a home or online lab is crucial for the advancement of your career in information security (#infosec). It is also a great way to gain hands-on …
    cover6 January 13, 2021

    Network Emulation & Virtual Environments with EVE-NG

    You can create a network lab with devices from Cisco, Juniper, Citrix, Arista, A10, Alcatel, Checkpoint, F5, Palo Alto, PFSense, SonicWALL, Trend Micr…
    cover6 April 22, 2020
    0 Comments
    Load More

    Upcoming Virtual Meetups

    • 15 Oct – Beginners Guide to Windows Active Directory Forensics
    • 20 Oct – Incident Handling & Response
    • 29 Oct – Security Onion Setup & Threat Hunting
    • 30 Oct – Cover6 Capture The Flag (CTF)

    Upcoming Training

    • 22-23 – October – Virtual #SOCAnalystPrep Workshop (Live)

    Recent Posts

    • FREE #Intro2Cyber Cybersecurity Skills Workshop w/ Tyrone E. Wilson
    • Post-Exploitation Fundamentals w/ Tyrone E. Wilson
    • Exploitation Fundamentals w/ Tyrone E. Wilson
    • Vulnerability Identification & Analysis w/ Tyrone E. Wilson
    • Active Information Gathering w/ Tyrone E. Wilson
    • Wireshark Fundamentals w/ Tyrone E. Wilson

    Tutorials

    • Breaking Into Cyber w/ Tyrone E. Wilson
    • Home Lab Setup w/ Tyrone E. Wilson
    • Passive Information Gathering w/ Tyrone E. Wilson
    • Common Network Services, Threats, and Attacks w/ Tyrone E. Wilson
    • IPv6 Overview w/ Tyrone E. Wilson
    • Wireshark Fundamentals w/ Tyrone E. Wilson
    • Active Information Gathering w/ Tyrone E. Wilson
    • Vulnerability Identification & Analysis w/ Tyrone E. Wilson

    Most Popular Posts

    • FREE #Intro2Cyber Cybersecurity Skills Workshop w/ Tyrone E. Wilson
    • Home Lab Setup | Building an Effective Cybersecurity Learning Environment
    • Security Onion: How to Gain Hands-On Cybersecurity Experience
    • Passive Information Gathering w/ Tyrone E. Wilson
    • Active Information Gathering w/ Tyrone E. Wilson
    • Exploitation Fundamentals w/ Tyrone E. Wilson
    • IPv6 Overview w/ Tyrone E. Wilson

    Upcoming Training

    • 22-23 – October – Virtual #SOCAnalystPrep Workshop (Live)

    Upcoming Meetups

    • 15 Oct – Beginners Guide to Windows Active Directory Forensics
    • 20 Oct – Incident Handling & Response
    • 29 Oct – Security Onion Setup & Threat Hunting
    • 30 Oct – Cover6 Capture The Flag (CTF)

    YouTube Playlists

    • @DCCyberWarriors Virtual Meetups
    • EC-Council Network Defense (NDE)
    • EC-Council Ethical Hacking Essentials (EHE)
    • EC-Council Digital Forensics Essentials (DFE)
    • #Intro2Cyber
    • Guest Appearances
    © 2023 - Cover6 Solutions