Warning: strpos(): Empty needle in /home/customer/www/cover6solutions.com/public_html/wp-content/plugins/buddyboss-platform/bp-core/bp-core-filters.php on line 800
  • Log In
  • Register
  • Account details
  • About
  • Blog
  • Courses
  • Events
  • Shop
  • Jobs Board

    Shopping Cart

    No products in the cart.

    Sign in Sign up
    Cover6 Solutions

    Shopping Cart

    No products in the cart.

    Cover6 Solutions
    • About
    • Blog
    • Courses
    • Events
    • Shop
    • Jobs Board

    • Log In
    • Register
    • Account details

    Category: Uncategorized

    Supporting the EKCEP Cybersecurity Workforce Development Progam

    EKCEP — the Eastern Kentucky Concentrated Employment Program, Inc. — operates with a mission to prepare, advance, and expand the workforce of Eastern Kentucky. EKCEP…

    cover6 December 10, 2019
    0 Comments

    How will your organization respond to a malware incident?

    How will your organization respond to a malware incident? Your organization has an incident response plan, and it’s updated regularly, at least annually, and when…

    shulerjl December 10, 2019
    0 Comments

    Bio: Joel Shuler

    Joel Shuler, a recent student of the Cover6 Solutions course offerings and someone who is aspiring to contribute more to developing future cybersecuri…
    shulerjl April 24, 2019
    0 Comments

    Cyber Threats to the United States and the U.S. Government Response

    The United States faces a variety of cyber threats, Some attacks are more sophisticated than others, but often we see simple social engineering phishi…
    rickysmith December 4, 2018
    0 Comments

    Bio: Ricky Smith

    It’s a pleasure to be a guest blogger and hopefully inspire, give back, and keep you updated on overall cyber news or anything hot that impacts us a…
    rickysmith October 23, 2018
    0 Comments

    Cybersecurity Risks in Healthcare

    In the last few years, IT security incidents and hacking are increasing steadily, and many healthcare organizations have struggled to defend their net…
    aarthi June 5, 2018
    0 Comments

    Upcoming Virtual Meetups

    • 15 Oct – Beginners Guide to Windows Active Directory Forensics
    • 20 Oct – Incident Handling & Response
    • 29 Oct – Security Onion Setup & Threat Hunting
    • 30 Oct – Cover6 Capture The Flag (CTF)

    Upcoming Training

    • 22-23 – October – Virtual #SOCAnalystPrep Workshop (Live)

    Recent Posts

    • FREE #Intro2Cyber Cybersecurity Skills Workshop w/ Tyrone E. Wilson
    • Post-Exploitation Fundamentals w/ Tyrone E. Wilson
    • Exploitation Fundamentals w/ Tyrone E. Wilson
    • Vulnerability Identification & Analysis w/ Tyrone E. Wilson
    • Active Information Gathering w/ Tyrone E. Wilson
    • Wireshark Fundamentals w/ Tyrone E. Wilson

    Tutorials

    • Breaking Into Cyber w/ Tyrone E. Wilson
    • Home Lab Setup w/ Tyrone E. Wilson
    • Passive Information Gathering w/ Tyrone E. Wilson
    • Common Network Services, Threats, and Attacks w/ Tyrone E. Wilson
    • IPv6 Overview w/ Tyrone E. Wilson
    • Wireshark Fundamentals w/ Tyrone E. Wilson
    • Active Information Gathering w/ Tyrone E. Wilson
    • Vulnerability Identification & Analysis w/ Tyrone E. Wilson

    Most Popular Posts

    • FREE #Intro2Cyber Cybersecurity Skills Workshop w/ Tyrone E. Wilson
    • Home Lab Setup | Building an Effective Cybersecurity Learning Environment
    • Security Onion: How to Gain Hands-On Cybersecurity Experience
    • Passive Information Gathering w/ Tyrone E. Wilson
    • Active Information Gathering w/ Tyrone E. Wilson
    • Exploitation Fundamentals w/ Tyrone E. Wilson
    • IPv6 Overview w/ Tyrone E. Wilson

    Upcoming Training

    • 22-23 – October – Virtual #SOCAnalystPrep Workshop (Live)

    Upcoming Meetups

    • 15 Oct – Beginners Guide to Windows Active Directory Forensics
    • 20 Oct – Incident Handling & Response
    • 29 Oct – Security Onion Setup & Threat Hunting
    • 30 Oct – Cover6 Capture The Flag (CTF)

    YouTube Playlists

    • @DCCyberWarriors Virtual Meetups
    • EC-Council Network Defense (NDE)
    • EC-Council Ethical Hacking Essentials (EHE)
    • EC-Council Digital Forensics Essentials (DFE)
    • #Intro2Cyber
    • Guest Appearances
    © 2023 - Cover6 Solutions