The next class starts in ...
About the Training
Ever wondered what it is like to be on the front line of defense in the Cybersecurity industry? If so, you may be interested in becoming a Security Operations Center (SOC) Analyst.
SOC Analysts are highly sought-after individuals, who identify compromised machines and malicious actors. These individuals utilize defensive security skills and techniques that are commonly used in the industry, while working to mitigate any damages that may have occurred.
In this training, participants will oversee a network that is currently under attack. They will be taught various strategies to help defend against several attack scenarios. A few of the tools and technologies that participants will explore includes Security Onion, Wireshark, Splunk and Nessus. By no means is the course and its objectives all encompassing. As a participant, it is highly recommended that you perform additional research and self-study to continue and maintain your established knowledge and toolkit.
The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback as well.
If you have any additional questions outside of the FAQs, please do not hesitate to reach out to email@example.com and we will be happy to assist you.
The course is tailored to the four primary exam objectives for the CompTIA CySA+ Certification which are:
- Threat Management
- Vulnerability Management
- Cyber Incident Response
- Security Architecture and Tool Sets
Note: This is NOT an official CompTIA Training but preparation for real world scenarios as a cybersecurity analyst and the Cybersecurity Analyst+ certification exam. Various tools, techniques and procedures will be covered thus those listed are just examples and are not limited to only those, as material is subject to change.
- SOC Analyst Fundamentals
- Common Services, Threats, & Attacks
- Passive Information Gathering (OSINT)
- Wireshark Fundamentals
- Windows Active Directory
- Vulnerability Identification & Analysis
- Active Information Gathering
- IPv6 Overview
- IDS/IPS Tools
- Windows Forensics
- Incident Handling & Response
- Threat Hunting
- Security Onion
- Capture The Flag (CTF)
Frequently Asked Questions
- Knowledge of operating systems along with ports and protocols are very helpful.
- Materials to Read Ahead: It is HIGHLY SUGGESTED that you read the background information provided in this link to have a successful Cover6 Solutions training experience - https://www.cover6solutions.com/read-ahead/
To have an enjoyable hardware experience, we suggest the following:
- Processor – 64-bit i5 or higher
- RAM – 8 GB or higher
- Memory – 40 GB or higher
- Operating System – this is your choice as long as you are comfortable
To have an enjoyable software experience, we suggest the latest version of any of the following:
- Hypervisor – VirtualBox, VMWare Player, VMWare Workstation, or VMWare Fusion
5-Days (Tuesday nights). Allnights of training will occur from 6 pm to 9 pm EST.
Yes, the sessions will be recorded.
We have mapped our training to the CompTIA CySA+ Exam Objectives.
Yes, but in a good way that will grow your skills. We recommend coming with a VERY open mind to the material and other participants so that the learning experience is a positive and enjoyable one. We encourage questions and getting to know other professionals who are also enrolled in the training.
As always, it is up to you to “get” the job. However, Cover6 Solutions has built a platform that will assist you with very viable knowledge that can be used on the job. In addition, we can assist you with resume services to showcase and enhance your newly acquired skills.
Yes. Additionally, all alumni receive a 20% discount after completion of their first Cover6 training. We also have an affiliate program that allows you to earn cash by sharing links to Cover6 products.
Yes. 16 CEUs are available for this course.
Absolutely! Our relationship does not end with this training. All alumni are treated like family and we will do all we can to ensure you become a successful security professional.
A survey will be sent out during and after the training for you to provide your questions, comments, and concerns.
About the Instructor
Tyrone E. Wilson
Founder / PResident
"I've been blessed to have a platform where I can use my expertise in cybersecurity to help provide a better future for others."
"We may never play in the NBA or NFL but there is nothing stopping us from being a CTO, CISO, etc."
"To anyone who ever considered giving up... DON'T"
Mr. Tyrone E. Wilson is an information security professional with over 20 years of experience in information technology and systems configuration, including information systems and network security. Wilson also has extensive knowledge in computer network defense, vulnerability assessments, cyber threat analysis, and incident response. Currently, Wilson is the Founder and President of Cover6 Solutions; which teaches companies and professionals various aspects of information security, penetration testing, and IPv6. Wilson is also the organizer of a 7,000+ person Information Security meetup group called The D.C. Cybersecurity Professionals.
In addition to conducting over 100 meetups, Wilson is also on the Review Board of BSides NoVA and has recently presented and/or taught classes at major conferences and events such as BSidesNoVA 2019, BSides DC 2018, ISACA-GWDC Cybersecurity & Risk Conference, ISSA Mid Atlantic Security Conference, BSides NoVA 2017, BSides DC 2017, and DCCyberWeek 2017. Mr. Wilson will also be a Keynote Speaker at Hacker Halted 2019.
Aside from being the Founder of Cover6 Solutions, Mr. Wilson's professional experience includes leading roles at agencies such as INSCOM, RCERT-SWA, JTF-GNO/USCYBERCOM, Dept. of Energy, and the FBI.More about Cover6 Solutions More about The D.C. Cyber Security Professionals