Cover6 Solutions has a passion for teaching and a love for information security; we strive to provide premium training without the premium cost. #Intro2Cyber #PentesterPrep #SOCAnalystPrep

Intro to Cyber Workshop

About the Training

Are you interested in a cybersecurity career, but you don’t have any real-world experience yet? Maybe you know a little about cyber, and you want to gain hands-on skills? This course is for you!

Our one-day program is designed for beginners and covers the fundamentals of cybersecurity starting with the basics of common computer and network services. You will also gain a knowledge base of some of the most common terms and industry lingo in lessons and break-out discussions throughout the day.

Next, we investigate some of the powerful tools used by both attackers and defenders. Throughout the day we’ll provide insight into how cyber attackers think, strategize and execute hacks. We'll also explore common attack techniques and how to defend against them.

Who Should Attend

Anyone with a desire to learn offensive hacking and how to defend against methods employed by attackers to break into systems.  We foster a fun, collaborative and open environment where trial and error is embraced, failures are utilized as learning tools and creative thinking is encouraged!

For those with little or no experience, this is a great first step in your cybersecurity career!

Agenda

  • Windows Active Directory
  • Passive Information Gathering
  • Common Services, Threats & Attacks
  • IPv6 Overview
  • Wireshark Fundamentals
  • Active Information Gathering
  • Vulnerability Identification & Analysis
  • Exploitation
  • Post Exploitation
  • The Metasploit Framework
  • Capture the Flag

PENTESTER PREP

About the Training

Do you have the desire to go on the offensive? Ever thought about what it would be like to go to work every day as a Penetration Tester (Pentester)? If you want to learn offensive techniques to improve your defensive skill set then this workshop is for you!

Whether you are currently practicing penetration testing and want to learn specific methodologies or have zero knowledge and are just scratching the surface, this is still the workshop for you! Pentester Prep will guide you on the right path on what it takes to become a successful penetration tester.

Agenda Day 1

  • Passive Information Gathering
  • Active Information Gathering
  • Wireshark Fundamentals
  • IPv6 Overview
  • Vulnerability Identification & Analysis
  • Common Services, Threats & Attacks
  • Exploitation
  • Post Exploitation

Agenda Day 2

  • The Metasploit Framework
  • Privilege Escalation Techniques
  • Password Attacks
  • Antivirus & Firewall Evasion
  • Pivoting
  • Wireless Testing
  • Intro to Web Exploitation
  • Buffer Overflows

This workshop does not cover every penetration testing tool, topic and technique in existence, but serves as a comprehensive means to begin the necessary research and self-study in order to continue and maintain a successful understanding of penetration testing and the evolution of vulnerabilities and exploits. We hope you enjoy all the provided content and look forward to working with you in the future.

SOC ANALYST PREP

About the Training

Are you an aspiring SOC Analyst? SOC (Security Operations Center) Analysts specialize in identifying and utilizing defensive skills and techniques. SOC Analysts are highly sought after in the Cybersecurity field. SOC Analysts identify compromised machines and malicious actors. They also help mitigate any damage that may have occurred.

Students will be in charge of a network that is currently under attack and will be taught techniques that will prepare them to defend against several attack scenarios. In addition to windows forensics, this workshop will feature popular tools such as Splunk, Security Onion, Wireshark, and Nessus. All software can be used at home and installed for free. Setup and instruction material will be provided to all participants.

Agenda Day 1

  • SOC Analyst Fundamentals
  • Passive Information Gathering (OSINT)
  • Wireshark Fundamentals
  • Windows Active Directory
  • Active Information Gathering
  • Vulnerability Identification & Analysis
  • Common Services, Threats, and Attacks

Agenda Day 2

  • IPv6 Overview
  • IDS/IPS Tools
  • Windows Forensics
  • Incident Handling & Response
  • Threat Hunting
  • Intro to Malware Analysis
  • Intro to Memory Forensics
$349.00

Virtual Training: Pentester Prep

About the Training

If you ever wanted to become a Penetration Tester (Pentester) or if you want to learn offensive techniques to improve your defensive skill set then this workshop is for you. Whether you are new to penetration testing or have zero knowledge this is still the workshop for you. This workshop will guide you on the right path on what it takes to become a successful penetration tester.

By no means will we be able to address all of the penetration testing topics, tools, techniques and methodologies in the allotted time. As always, it is up to you to perform the additional research and self-study in order to continue and maintain a successful understanding of penetration testing. We hope you enjoy all the provided content and look forward to working with you in the future.

Agenda Day 1

  • Passive Information Gathering
  • Wireshark Fundamentals
  • Active Information Gathering
  • The Metasploit Framework

Agenda Day 2

  • IPv6 Overview
  • Vulnerability Identification & Analysis
  • Common Services, Threats & Attacks
  • Exploitation

Agenda Day 3

  • Post Exploitation
  • Privilege Escalation Techniques
  • Password Attacks
  • Antivirus & Firewall Evasion
  • Pivoting

Agenda Day 4

  • Wireless Testing
  • Intro to Web Exploitation
  • Buffer Overflows
  • Capture the Flag


Tyrone E. Wilson
Founder / PResident

"I've been blessed to have a platform where I can use my expertise in cybersecurity to help provide a better future for others."

"We may never play in the NBA or NFL but there is nothing stopping us from being a CTO, CISO, etc."

"To anyone who ever considered giving up... DON'T"

Mr. Tyrone E. Wilson is an information security professional with over 20 years of experience in information technology and systems configuration, including information systems and network security. Wilson also has extensive knowledge in computer network defense, vulnerability assessments, cyber threat analysis, and incident response. Currently, Wilson is the Founder and President of Cover6 Solutions; which teaches companies and professionals various aspects of information security, penetration testing, and IPv6. Wilson is also the organizer of a 6,000+ person Information Security meetup group called The D.C. Cybersecurity Professionals.

In addition, aside from conducting over 100 meetups, Wilson is also on the Review Board of BSides NoVA and has recently presented and/or taught classes at major conferences and events such as BSidesNoVA 2019, BSides DC 2018, ISACA-GWDC Cybersecurity & Risk ConferenceISSA Mid Atlantic Security Conference, BSides NoVA 2017BSides DC 2017, and DCCyberWeek 2017

Aside from being the Founder of Cover6 Solutions, Mr. Wilson's professional experience includes leading roles at agencies such as INSCOM, RCERT-SWA, JTF-GNO/USCYBERCOM, Dept. of Energy, and the FBI. 

More about Cover6 Solutions More about The D.C. Cyber Security Professionals

Virtual Wireshark Training by Marcelle Lee

Overview
Analysis of network traffic can provide a wealth of forensic data and is an essential aspect of many fields of cybersecurity work, including incident response, security operations, and malware analysis. Artifacts obtained through network traffic analysis can reveal hacker techniques and methodologies, such as the use of malware, network traversal, privilege escalation, the establishment of persistence, and data exfiltration. Even relatively “normal” traffic can reveal eye-opening data about user activity.

In this series of training sessions, we will cover the basics of network traffic flow, including topics such as the OSI model and TCP/IP stack, ports and protocols, and packet headers. From there, we will dive into using Wireshark to examine custom packet captures showing a variety of network activity. Participants will learn how to capture their own traffic, and will also be provided with the custom captures and solutions.

Sessions will be recorded so don’t worry if you cannot attend them all. We will also have a Slack site for student chat and resource sharing.

Requirements
No special equipment is required for this training, just access to a computer and Wireshark, which is available for Mac, Linux, and Windows.

Schedule

  • Session 1: Introduction, networking fundamentals, getting started with Wireshark, application layer
  • Session 2: Assignment review, review of transport layer
  • Session 3: Assignment review, review of internet layer
  • Session 4: Assignment review, review of network access layer, capstone challenge
New


Marcelle Lee
CEO / Founding partner
Fractal Security Group, LLC

Marcelle Lee is a threat researcher with WhiteOps, an adjunct professor in digital forensics and network security, and she also provides security consulting and training services through her company, Fractal Security Group, LLC.  She specializes in network traffic analysis, malware analysis, phishing, and threat hunting. She is involved with many industry organizations, working groups, and boards, including the Women’s Society of Cyberjutsu, the NIST Cyber Competitions Working Group, and the Cybersecurity Association of Maryland Advisory Board.  She also both builds and participates in cyber competitions, and shares her work through her Github site.

Marcelle has earned the CISSP, CSX-P, GCFA, GCIA, GCIH, GPEN, GISF, GSEC, GCCC, C|EH, CCNA, PenTest+, Security+, Network+, and ACE industry certifications.  She holds four degrees, including a master’s degree in cybersecurity. She has received the Chesapeake Regional Tech Council Women in Tech (WIT) Award and the Volunteer of the Year award from the Women’s Society of Cyberjutsu. Marcelle frequently presents at conferences and training events, and is an active volunteer in the cybersecurity community.

More about Fractal Security Group, LLC Github - Marcelle Lee

Workshop Location

Upcoming Training