Warning: strpos(): Empty needle in /home/customer/www/cover6solutions.com/public_html/wp-content/plugins/buddyboss-platform/bp-core/bp-core-filters.php on line 800
  • Log In
  • Register
  • Account details
  • About
  • Blog
  • Courses
  • Events
  • Shop
  • Jobs Board

    Shopping Cart

    No products in the cart.

    Sign in Sign up
    Cover6 Solutions

    Shopping Cart

    No products in the cart.

    Cover6 Solutions
    • About
    • Blog
    • Courses
    • Events
    • Shop
    • Jobs Board

    • Log In
    • Register
    • Account details

    Category: Webinar

    FREE #Intro2Cyber Cybersecurity Skills Workshop w/ Tyrone E. Wilson

    Through this free beginner's workshop, we offer an intensive, hands-on introduction to cybersecurity.
    cover6 October 8, 2022

    Post-Exploitation Fundamentals w/ Tyrone E. Wilson

    Our discussion of the post-exploitation phase will focus on maintaining access, privilege escalation, domain enumeration, and pivoting.
    cover6 October 1, 2022

    Exploitation Fundamentals w/ Tyrone E. Wilson

    Once the vulnerabilities have been found, their associated exploit(s) can be used on the target system.
    cover6 September 8, 2022
    0 Comments

    Vulnerability Identification & Analysis w/ Tyrone E. Wilson

    Vulnerability testing is discovering flaws in systems and applications that can be leveraged by an attacker.
    cover6 August 20, 2022

    Active Information Gathering w/ Tyrone E. Wilson

    Active information gathering or active reconnaissance moves beyond passive tools and techniques to directly interact with a target.
    cover6 August 13, 2022

    Wireshark Fundamentals w/ Tyrone E. Wilson

    Wireshark is one of the most widely-used tools for examining packets and understanding network traffic.
    cover6 July 9, 2022
    Load More

    Upcoming Virtual Meetups

    • 15 Oct – Beginners Guide to Windows Active Directory Forensics
    • 20 Oct – Incident Handling & Response
    • 29 Oct – Security Onion Setup & Threat Hunting
    • 30 Oct – Cover6 Capture The Flag (CTF)

    Upcoming Training

    • 22-23 – October – Virtual #SOCAnalystPrep Workshop (Live)

    Recent Posts

    • FREE #Intro2Cyber Cybersecurity Skills Workshop w/ Tyrone E. Wilson
    • Post-Exploitation Fundamentals w/ Tyrone E. Wilson
    • Exploitation Fundamentals w/ Tyrone E. Wilson
    • Vulnerability Identification & Analysis w/ Tyrone E. Wilson
    • Active Information Gathering w/ Tyrone E. Wilson
    • Wireshark Fundamentals w/ Tyrone E. Wilson

    Tutorials

    • Breaking Into Cyber w/ Tyrone E. Wilson
    • Home Lab Setup w/ Tyrone E. Wilson
    • Passive Information Gathering w/ Tyrone E. Wilson
    • Common Network Services, Threats, and Attacks w/ Tyrone E. Wilson
    • IPv6 Overview w/ Tyrone E. Wilson
    • Wireshark Fundamentals w/ Tyrone E. Wilson
    • Active Information Gathering w/ Tyrone E. Wilson
    • Vulnerability Identification & Analysis w/ Tyrone E. Wilson

    Most Popular Posts

    • FREE #Intro2Cyber Cybersecurity Skills Workshop w/ Tyrone E. Wilson
    • Home Lab Setup | Building an Effective Cybersecurity Learning Environment
    • Security Onion: How to Gain Hands-On Cybersecurity Experience
    • Passive Information Gathering w/ Tyrone E. Wilson
    • Active Information Gathering w/ Tyrone E. Wilson
    • Exploitation Fundamentals w/ Tyrone E. Wilson
    • IPv6 Overview w/ Tyrone E. Wilson

    Upcoming Training

    • 22-23 – October – Virtual #SOCAnalystPrep Workshop (Live)

    Upcoming Meetups

    • 15 Oct – Beginners Guide to Windows Active Directory Forensics
    • 20 Oct – Incident Handling & Response
    • 29 Oct – Security Onion Setup & Threat Hunting
    • 30 Oct – Cover6 Capture The Flag (CTF)

    YouTube Playlists

    • @DCCyberWarriors Virtual Meetups
    • EC-Council Network Defense (NDE)
    • EC-Council Ethical Hacking Essentials (EHE)
    • EC-Council Digital Forensics Essentials (DFE)
    • #Intro2Cyber
    • Guest Appearances
    © 2023 - Cover6 Solutions