Hands-on & Virtual Cybersecurity Training

#Intro2Cyber #PentesterPrep #SOCAnalystPrep #SummerCyberCamp

Cover6 Workshops

The next class starts in ...

 
 

About the Training

You have most likely heard the expression ‘it’s never too late…’

In this case, it’s never too early! If you are in high school or early college and interested in a cybersecurity career, this 5-day camp is perfect for you!

This summer program is designed to expose the fundamentals of cybersecurity to rising Sophomores, Juniors, and Seniors in High School. There will be a wide variety of topics that will be covered; from the basics of common computer and network services all the way to network defense and exploitation.

Students will also be exposed to some of the most common industry tools through engaging discussions and lots of hands-on lessons.

We will also:

  1. Cover the powerful tools used by both attackers and defenders.
  2. Provide insight into how cyber attackers think, strategize and execute hacks.
  3. Explore common attack techniques and how to defend against them.
  4. Encourage interpersonal skills through personal and group presentations.
  5. Provide tasks and challenges to keep your student engaged for the entire summer.

Who Should Attend

We understand that as high schoolers, you may not have had real hands-on experience in cybersecurity. Because of this very reason, we have created this program to be an interactive learning environment to enhance your skills!

We foster a fun, collaborative and open environment where trial and error is embraced, failures are utilized as learning tools, and creative thinking is encouraged!

For those with little or no experience, this is a great first step in your cybersecurity career!

Agenda: Day 1

  • Home Lab Setup
  • Passive Information Gathering
  • Windows & Linux OS Familiarization
  • Common Services, Threats & Attacks

Agenda: Day 2

  • Wireless Testing
  • Active Information Gathering
  • Vulnerability Identification & Analysis
  • IPv6 Overview

Agenda: Day 3

  • Wireshark Fundamentals
  • The Metasploit Framework
  • Exploitation
  • Post Exploitation

Agenda: Day 4

  • Windows Forensics
  • IDS / IPS Tools
  • Incident Handling & Response
  • Threat Hunting

Agenda: Day 5

  • Tools of the Trade
  • Capture the Flag (CTF)

The next class starts in ...

 
 

About the Training

Through this comprehensive workshop, we offer an intensive hands-on introduction to cybersecurity. We have designed this for students who want to build a foundation of cyber skills that can be used in schoolwork and in future careers. The coursework starts with understanding the basic tools and techniques and then covers basic and advanced offensive and defensive training. At the conclusion, students participate in a capture-the-flag exercise, a fascinating game that will test everyone's problem-solving abilities. Our course is a fun, collaborative, and open environment where trial and error is embraced, failures are utilized as learning opportunities, and creative thinking is always encouraged. This is a great first step into the world of cybersecurity!

Our one-day program is designed for beginners and covers the fundamentals of cybersecurity. We start with the basics of common computer and network services and end with exploitation and an understanding of attack methodologies and strategies to defend against them. We will also focus on ways to build a home lab along with challenges and educational references to improve your skillset.

This course is for you if you are interested in a cybersecurity career, but you don’t have much hands-on experience yet? 

Who Should Attend

Anyone with a desire to learn offensive attack techniques and how to defend against methods employed by attackers to break into systems.  We foster a fun, collaborative and open environment where trial and error is embraced, failures are utilized as learning tools, and creative thinking is encouraged!

For those with little or no experience, this is a great first step in your cybersecurity career!

Agenda

  • Home Lab Setup
  • Passive Information Gathering
  • Windows Active Directory
  • IPv6 Overview
  • Wireshark Fundamentals
  • Active Information Gathering
  • Vulnerability Identification & Analysis
  • Common Services, Threats & Attacks
  • Exploitation
  • Post Exploitation
  • The Metasploit Framework
  • Capture the Flag

The next class starts in ...

 
 

About the Training

Do you have the desire to go on the offensive? Ever thought about what it would be like to go to work every day as a Penetration Tester (Pentester)? If you want to learn offensive techniques to improve your defensive skill set then this workshop is for you!

Whether you are currently practicing penetration testing and want to learn specific methodologies or have zero knowledge and are just scratching the surface, this is still the workshop for you! Pentester Prep will guide you on the right path on what it takes to become a successful penetration tester.

Agenda Day 1

  • Passive Information Gathering
  • Active Information Gathering
  • Wireshark Fundamentals
  • IPv6 Overview
  • Vulnerability Identification & Analysis
  • Common Services, Threats & Attacks
  • Exploitation
  • Post Exploitation

Agenda Day 2

  • The Metasploit Framework
  • Privilege Escalation Techniques
  • Password Attacks
  • Antivirus & Firewall Evasion
  • Pivoting
  • Wireless Testing
  • Intro to Web Exploitation
  • Buffer Overflows

This workshop does not cover every penetration testing tool, topic and technique in existence, but serves as a comprehensive means to begin the necessary research and self-study in order to continue and maintain a successful understanding of penetration testing and the evolution of vulnerabilities and exploits. We hope you enjoy all the provided content and look forward to working with you in the future.

The next class starts in...

 
 

About the Training

Ever wondered what it is like to be on the front line of defense in the Cybersecurity industry? If so, you may be interested in becoming a Security Operations Center (SOC) Analyst.

SOC Analysts are highly sought-after individuals, who identify compromised machines and malicious actors. These individuals utilize defensive security skills and techniques that are commonly used in the industry, while working to mitigate any damages that may have occurred.

In this training, participants will oversee a network that is currently under attack. They will be taught various strategies to help defend against several attack scenarios. A few of the tools and technologies that participants will explore includes Security Onion, Wireshark, Splunk and Nessus. By no means is the course and its objectives all encompassing. As a participant, it is highly recommended that you perform additional research and self-study to continue and maintain your established knowledge and toolkit.  

The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback as well. 

If you have any additional questions outside of the FAQs, please do not hesitate to reach out to info@cover6solutions.com and we will be happy to assist you.

Course Outline

The course is tailored to the four primary exam objectives for the CompTIA CySA+ Certification which are:

  1. Threat Management
  2. Vulnerability Management
  3. Cyber Incident Response
  4. Security Architecture and Tool Sets 

Note: This is NOT an official CompTIA Training but preparation for real world scenarios as a cybersecurity analyst and the Cybersecurity Analyst+ certification exam. Various tools, techniques and procedures will be covered thus those listed are just examples and are not limited to only those, as material is subject to change.

Agenda Day 1

  • SOC Analyst Fundamentals
  • Passive Information Gathering (OSINT)
  • Wireshark Fundamentals
  • Windows Active Directory
  • Active Information Gathering
  • Vulnerability Identification & Analysis
  • Common Services, Threats, and Attacks

Agenda Day 2

  • IPv6 Overview
  • IDS/IPS Tools
  • Windows Forensics
  • Incident Handling & Response
  • Threat Hunting
  • Security Onion
  • Splunk

Frequently Asked Questions

What do I need to know before attending the class?
  • Knowledge of operating systems along with ports and protocols are very helpful.  
  • Materials to Read Ahead: It is HIGHLY SUGGESTED that you read the background information provided in this link to have a successful Cover6 Solutions training experience - https://www.cover6solutions.com/read-ahead/ 
What are the recommended hardware specifications?

To have an enjoyable hardware experience, we suggest the following: 

  • Processor – 64-bit i5 or higher 
  • RAM – 8 GB or higher 
  • Memory – 40 GB or higher 
  • Operating System – this is your choice as long as you are comfortable 
What are the recommended software specifications?

To have an enjoyable software experience, we suggest the latest version of any of the following: 

  • Hypervisor – VirtualBox, VMWare Player, VMWare Workstation, or VMWare Fusion 
How often do we meet?

2-Days, Saturday and Sunday. Both days of training will occur from 9 am to 5 pm.

If I miss a session, will there be a recording?

No, the sessions will not be recorded.

Will I be challenged during the training?

Yes, but in a good way that will grow your skills. We recommend coming with a VERY open mind to the material and other participants so that the learning experience is a positive and enjoyable one. We encourage questions and getting to know other professionals who are also enrolled in the training.

Will this training help me get a job?

As always, it is up to you to “get” the job. However, Cover6 Solutions has built a platform that will assist you with very viable knowledge that can be used on the job. In addition, we can assist you with resume services to showcase and enhance your newly acquired skills.

Are disounts available?

Yes. Additionally, all alumni receive a 20% discount after completion of their first Cover6 training. We also have an affiliate program that allows you to earn cash by sharing links to Cover6 products.

Are there Continuing Education Units (CEUs) available?

Yes. 16 CEUs are available for this course.

Can I contact you after the training is oer if I need additional assistance with materials?

Absolutely! Our relationship does not end with this training. All alumni are treated like family and we will do all we can to ensure you become a successful security professional.

Where can I give my feedback on the course?

A survey will be sent out during and after the training for you to provide your questions, comments and concerns. 

The next class starts in ...

 
 

About the Training

Have you ever wanted to learn about what it takes to be a Penetration Tester? 

If so, then this 5-day, hands-on workshop may suit your curiosity on what it takes to fulfill your journey as a successful #Pentester. Whether you are a beginner or a seasoned professional, this training will teach you offensive techniques to improve upon defensive skills that are used in the Offensive Security field. 

Throughout the course, we will address and discuss various penetration testing topics, tools, technologies and methodologies that are commonly used in the industry. By no means is the course and its objectives all encompassing. As a participant, it is highly recommended that you perform additional research and self-study to continue and maintain your established knowledge and toolkit.  

The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback as well.  

If you have any additional questions outside of the FAQs, please do not hesitate to reach out to info@cover6solutions.com and we will be happy to assist you. 

Course Outline 

The course is tailored to the five primary exam objectives for the CompTIA Pentest+ Certification which are: 

  1. Planning and Scoping 
  2. Information Gathering and Vulnerability Identification 
  3. Attacks and Exploits 
  4. Penetration Testing Tools 
  5. Reporting and Communication 

Note: This is NOT an official CompTIA Training but preparation for real world scenario pentesting engagements and the Pentest+ certification exam. Various tools, techniques and procedures will be covered thus those listed are just examples and are not limited to only those, as material is subject to change. 

Day/Week 1 - Planning & Scoping

  • Pentesting Overview & Methodologies
  • Pentest Lab Setup & Familiarization
  • Common Services, Threats & Attacks
  • IPv6 Overview

Day/Week 2 - Information Gathering & Vulnerability Identification

  • Passive Information Gathering
  • Active Information Gathering
  • Vulnerability Identification & Analysis

Day/Week 3 - Attacks & Exploits

  • Exploitation
  • Privilege Escalation Techniques
  • Password Attacks
  • Pivoting

Day/Week 4 - Penetration Testing Tools

  • Wireshark Fundamentals
  • Wireless Testing
  • Web App Testing

Day/Week 5 - Reporting & Communication

  • Buffer Overflows
  • Capture the Flag (CTF)

Frequently Asked Questions

What do I need to know before attending the class?
  • Knowledge of operating systems along with ports and protocols are very helpful.  
  • Materials to Read Ahead: It is HIGHLY SUGGESTED that you read the background information provided in this link to have a successful Cover6 Solutions training experience - https://www.cover6solutions.com/read-ahead/ 
What are the recommended hardware specifications?

To have an enjoyable hardware experience, we suggest the following: 

  • Processor – 64-bit i5 or higher 
  • RAM – 8 GB or higher 
  • Memory – 100 GB or higher 
  • Operating System – this is your choice as long as you are comfortable 
What are the recommended software specifications?

To have an enjoyable software experience, we suggest the latest version of any of the following: 

  • Hypervisor – VirtualBox, VMWare Player, VMWare Workstation, or VMWare Fusion 
How often do we meet?

Every Tuesday from 6-9 PM EST for 5 weeks. 

If I miss a session, will there be a recording?

Yes, the sessions are recorded and placed on the website for easy access.

Will I be challenged during the training?

Yes, but in a good way that will grow your skills. We recommend coming with a VERY open mind to the material and other participants so that the learning experience is a positive and enjoyable one. We encourage questions and getting to know other professionals who are also enrolled in the training.

Will this training help me get a job?

As always, it is up to you to “get” the job. However, Cover6 Solutions has built a platform that will assist you with very viable knowledge that can be used on the job. In addition, we can assist you with resume services to showcase and enhance your newly acquired skills.

Are disounts available?

Yes. Additionally, all alumni receive a 20% discount after completion of their first Cover6 training. We also have an affiliate program that allows you to earn cash by sharing links to Cover6 products.

Are there Continuing Education Units (CEUs) available?

Yes. 16 CEUs are available for this course.

Can I contact you after the training is oer if I need additional assistance with materials?

Absolutely! Our relationship does not end with this training. All alumni are treated like family and we will do all we can to ensure you become a successful security professional.

Where can I give my feedback on the course?

A survey will be sent out during and after the training for you to provide your questions, comments and concerns. 

The next class starts in ...

 
 

About the Training

Ever wondered what it is like to be on the front line of defense in the Cybersecurity industry? If so, you may be interested in becoming a Security Operations Center (SOC) Analyst.

SOC Analysts are highly sought-after individuals, who identify compromised machines and malicious actors. These individuals utilize defensive security skills and techniques that are commonly used in the industry, while working to mitigate any damages that may have occurred.

In this training, participants will oversee a network that is currently under attack. They will be taught various strategies to help defend against several attack scenarios. A few of the tools and technologies that participants will explore includes Security Onion, Wireshark, Splunk and Nessus. By no means is the course and its objectives all encompassing. As a participant, it is highly recommended that you perform additional research and self-study to continue and maintain your established knowledge and toolkit.  

The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback as well. 

If you have any additional questions outside of the FAQs, please do not hesitate to reach out to info@cover6solutions.com and we will be happy to assist you.

Course Outline

The course is tailored to the four primary exam objectives for the CompTIA CySA+ Certification which are:

  1. Threat Management
  2. Vulnerability Management
  3. Cyber Incident Response
  4. Security Architecture and Tool Sets 

Note: This is NOT an official CompTIA Training but preparation for real world scenarios as a cybersecurity analyst and the Cybersecurity Analyst+ certification exam. Various tools, techniques and procedures will be covered thus those listed are just examples and are not limited to only those, as material is subject to change.

Day/Week 1

  • SOC Analyst Fundamentals
  • Common Services, Threats, & Attacks
  • Passive Information Gathering (OSINT)

Day/Week 2

  • Wireshark Fundamentals
  • Windows Active Directory
  • Vulnerability Identification & Analysis

Day/Week 3

  • Active Information Gathering
  • IPv6 Overview
  • IDS/IPS Tools

Day/Week 4

  • Windows Forensics
  • Incident Handling & Response
  • Threat Hunting

Day/Week  5

  • Security Onion
  • Splunk
  • Capture The Flag (CTF)

Frequently Asked Questions

What do I need to know before attending the class?
  • Knowledge of operating systems along with ports and protocols are very helpful.  
  • Materials to Read Ahead: It is HIGHLY SUGGESTED that you read the background information provided in this link to have a successful Cover6 Solutions training experience - https://www.cover6solutions.com/read-ahead/ 
What are the recommended hardware specifications?

To have an enjoyable hardware experience, we suggest the following: 

  • Processor – 64-bit i5 or higher 
  • RAM – 8 GB or higher 
  • Memory – 40 GB or higher 
  • Operating System – this is your choice as long as you are comfortable 
What are the recommended software specifications?

To have an enjoyable software experience, we suggest the latest version of any of the following: 

  • Hypervisor – VirtualBox, VMWare Player, VMWare Workstation, or VMWare Fusion 
How often do we meet?

5-Days (Tuesday nights). Allnights of training will occur from 6 pm to 9 pm EST.

If I miss a session, will there be a recording?

Yes, the sessions will be recorded.

Will I be challenged during the training?

Yes, but in a good way that will grow your skills. We recommend coming with a VERY open mind to the material and other participants so that the learning experience is a positive and enjoyable one. We encourage questions and getting to know other professionals who are also enrolled in the training.

Will this training help me get a job?

As always, it is up to you to “get” the job. However, Cover6 Solutions has built a platform that will assist you with very viable knowledge that can be used on the job. In addition, we can assist you with resume services to showcase and enhance your newly acquired skills.

Are disounts available?

Yes. Additionally, all alumni receive a 20% discount after completion of their first Cover6 training. We also have an affiliate program that allows you to earn cash by sharing links to Cover6 products.

Are there Continuing Education Units (CEUs) available?

Yes. 16 CEUs are available for this course.

Can I contact you after the training is over if I need additional assistance with materials?

Absolutely! Our relationship does not end with this training. All alumni are treated like family and we will do all we can to ensure you become a successful security professional.

Where can I give my feedback on the course?

A survey will be sent out during and after the training for you to provide your questions, comments, and concerns. 

Upcoming Trainiing

Workshop Location

@Cover6Solutions