Cover6 Solutions has a passion for teaching and a love for information security; we strive to provide premium training without the premium cost. #Intro2Cyber #PentesterPrep #SOCAnalystPrep

Intro to Cyber Workshop

Through this comprehensive workshop, we offer an intensive hands-on introduction to cybersecurity. We have designed this for students who want to build a foundation of cyber skills that can be used in schoolwork and in future careers. The coursework starts with understanding the basic tools and techniques and then covers basic and advanced offensive and defensive training. At the conclusion, students participate in a capture-the-flag exercise, a fascinating game that will test everyone's problem-solving abilities. Our course is a fun, collaborative, and open environment where trial and error is embraced, failures are utilized as learning opportunities, and creative thinking is always encouraged. This is a great first step into the world of cybersecurity! Our one-day program is designed for beginners and covers the fundamentals of cybersecurity. We start with the basics of common computer and network services and end with exploitation and an understanding of attack methodologies and strategies to defend against them. We will also focus on ways to build a home lab along with challenges and educational references to improve your skillset. This course is for you if you are interested in a cybersecurity career, but you don’t have much hands-on experience yet?  Who Should Attend Anyone with a desire to learn offensive attack techniques and how to defend against methods employed by attackers to break into systems.  We foster a fun, collaborative and open environment where trial and error is embraced, failures are utilized as learning tools, and creative thinking is encouraged! For those with little or no experience, this is a great first step in your cybersecurity career! Agenda
  • Home Lab Setup
  • Passive Information Gathering
  • Windows Active Directory
  • IPv6 Overview
  • Wireshark Fundamentals
  • Active Information Gathering
  • Vulnerability Identification & Analysis
  • Common Services, Threats & Attacks
  • Exploitation
  • Post Exploitation
  • The Metasploit Framework
  • Capture the Flag

PENTESTER PREP

About the Training

Do you have the desire to go on the offensive? Ever thought about what it would be like to go to work every day as a Penetration Tester (Pentester)? If you want to learn offensive techniques to improve your defensive skill set then this workshop is for you!

Whether you are currently practicing penetration testing and want to learn specific methodologies or have zero knowledge and are just scratching the surface, this is still the workshop for you! Pentester Prep will guide you on the right path on what it takes to become a successful penetration tester.

Agenda Day 1

  • Passive Information Gathering
  • Active Information Gathering
  • Wireshark Fundamentals
  • IPv6 Overview
  • Vulnerability Identification & Analysis
  • Common Services, Threats & Attacks
  • Exploitation
  • Post Exploitation

Agenda Day 2

  • The Metasploit Framework
  • Privilege Escalation Techniques
  • Password Attacks
  • Antivirus & Firewall Evasion
  • Pivoting
  • Wireless Testing
  • Intro to Web Exploitation
  • Buffer Overflows

This workshop does not cover every penetration testing tool, topic and technique in existence, but serves as a comprehensive means to begin the necessary research and self-study in order to continue and maintain a successful understanding of penetration testing and the evolution of vulnerabilities and exploits. We hope you enjoy all the provided content and look forward to working with you in the future.

SOC ANALYST PREP

About the Training

Are you or someone you know an aspiring SOC Analyst? SOC (Security Operations Center) Analysts specialize in identifying and utilizing defensive skills and techniques. SOC Analysts are highly sought after in the Cybersecurity field. SOC Analysts identify compromised machines and malicious actors. They also help mitigate any damage that may have occurred.

Students will be in charge of a network that is currently under attack and will be taught techniques that will prepare them to defend against several attack scenarios. In addition to windows forensics, this workshop will feature popular tools such as Security Onion, Wireshark, and Nessus. All software can be used at home and installed for free. Setup and instruction material will be provided to all participants.

This is a great opportunity to develop hands-on experience and network with like-minded professionals.

Agenda Day 1

  • SOC Analyst Fundamentals
  • Passive Information Gathering (OSINT)
  • Wireshark Fundamentals
  • Windows Active Directory
  • Active Information Gathering
  • Vulnerability Identification & Analysis
  • Common Services, Threats, and Attacks

Agenda Day 2

  • IPv6 Overview
  • IDS/IPS Tools
  • Windows Forensics
  • Incident Handling & Response
  • Threat Hunting
New
$399.00

Virtual Training: Pentester Prep

About the Training

If you ever wanted to become a Penetration Tester (Pentester) or if you want to learn offensive techniques to improve your defensive skill set then this workshop is for you. Whether you are new to penetration testing or have zero knowledge this is still the workshop for you. This workshop will guide you on the right path on what it takes to become a successful penetration tester.

By no means will we be able to address all of the penetration testing topics, tools, techniques and methodologies in the allotted time. As always, it is up to you to perform the additional research and self-study in order to continue and maintain a successful understanding of penetration testing. We hope you enjoy all the provided content and look forward to working with you in the future.

Agenda Day 1

  • Passive Information Gathering
  • Active Information Gathering
  • IPv6 Overview

Agenda Day 2

  • Wireshark Fundamentals
  • Vulnerability Identification & Analysis
  • Common Services, Threats & Attacks
  • Wireless Testing

Agenda Day 3

  • Exploitation
  • Privilege Escalation Techniques
  • Password Attacks
  • Pivoting

Agenda Day 4

  • The Metasploit Framework
  • Intro to Web Exploitation

Agenda Day 5

  • Buffer Overflows
  • Capture the Flag (CTF)

Upcoming Training