If you are interested in establishing a foundation of skills for a successful information security career, then this workshop is for you!
This Beginner-Intermediate, eight-week (every Tuesday night) workshop encompasses the skills of both a Penetration Tester (Pentester) and a Security Operations Center (SOC) Analyst. Throughout the course, we will address and discuss various offensive topics, tools, technologies, and methodologies used in the industry. Also, participants will learn how to respond to a network that is currently under attack—using industry technologies such as Nmap, Windows Sysinternals, Security Onion, Wireshark, Splunk, and Nessus. Students will learn numerous strategies to help defend against several attack scenarios.
A Pentester develops and uses offensive skills and techniques to identify weaknesses for exploitation. SOC Analysts identify compromised machines and malicious actors. These highly sought-after individuals utilize defensive security skills and techniques that are commonly used in the industry while working to mitigate any damages that may have occurred.
The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback, as well.
Our team has worked hard to create a course that provides a unique learning experience that you won’t find anywhere else. This will be challenging but it will be worth it. It will jump-start your career in cybersecurity and give you an outstanding foundation for the future!
If you have any additional questions outside of the FAQs, please do not hesitate to reach out to firstname.lastname@example.org and we will be happy to assist you.
This course is also tailored to help you prepare for the following certifications.
- CEH Practical
Agenda – Day/Week 1
- Home Lab Setup
- Passive Information Gathering
- Common Services, Threats, and Attacks
Agenda – Day/Week 2
- Wireshark for Attackers & Defenders
- IPv6 Overview, Enumeration & Attacks
- Active Information Gathering
Agenda – Day/Week 3
- The Metasploit Framework
- Post-Exploitation & Privilege Escalation
Agenda – Day/Week 4
- Intro to Web Exploitation
- Buffer Overflows
Agenda – Day/Week 5
- Windows Forensics
- Vulnerability Identification & Analysis
- Incident Handling & Response
Agenda – Day/Week 6
- Threat Hunting w/ Security Onion
Agenda – Day/Week 7
- Splunk Fundamentals
Agenda – Day 8
- Tools of the Trade
- #AttackNDefend Capture the Flag (CTF)
Mr. Tyrone E. Wilson is a passionate information security professional with 24 years of experience in information technology and has a mission to improve as many lives as possible through education in cybersecurity. Wilson also has extensive knowledge in computer network defense, vulnerability assessments, cyber threat analysis, and incident response. As a former cybersecurity analyst for the United States Army, Wilson developed security structures to ensure American intelligence systems were protected from foreign threats. Currently, Wilson is the Founder and President of Cover6 Solutions, LLC; which teaches companies and professionals various aspects of information security, penetration testing, and IPv6.
Wilson is also the organizer of The D.C. Cyber Security Professionals. With over 8,000 members, it is the largest #Cybersecurity meetup group in the United States. In addition, Wilson is also on the Review Board of BSides NoVA and Howard University and has recently presented and/or taught classes at major conferences and events such as BSidesNoVA 2020, BSidesNoVA 2019, BSidesDC 2018, ISACA GWDC Cybersecurity & Risk Conference, ISSA Mid Atlantic Security Conference, BSides NoVA 2017, BSides DC 2017, and DCCyberWeek 2017. Wilson was also a Keynote Speaker at the Hacker Halted 2019.
Tyrone E. Wilson
Founder & President
Net+, Sec+, CEH, eJPT