Cover6 Solutions has a passion for teaching and a love for information security; we strive to provide premium training without the premium cost. #Intro2Cyber #PentesterPrep #SOCAnalystPrep

Summer cyber camp 2019

You have most likely heard the expression ‘it’s never too late…’

In this case, it’s never too early! If you are in high school or early college and interested in a cybersecurity career, this 5-day camp is perfect for you!

This summer program is designed to expose the fundamentals of cybersecurity to rising Sophomores, Juniors, and Seniors in High School. There will be a wide variety of topics that will be covered; from the basics of common computer and network services all the way to network defense and exploitation.

Students will also be exposed to some of the most common industry tools through engaging discussions and lots of hands-on lessons.

We will also:

  1. Cover the powerful tools used by both attackers and defenders.
  2. Provide insight into how cyber attackers think, strategize and execute hacks.
  3. Explore common attack techniques and how to defend against them.
  4. Encourage interpersonal skills through personal and group presentations.
  5. Provide tasks and challenges to keep your student engaged for the entire summer.

Who Should Attend

We understand that as high schoolers, you may not have had real hands-on experience in cybersecurity. Because of this very reason, we have created this program to be an interactive learning environment to enhance your skills!

We foster a fun, collaborative and open environment where trial and error is embraced, failures are utilized as learning tools, and creative thinking is encouraged!

For those with little or no experience, this is a great first step in your cybersecurity career!

Agenda: Day 1

  • Home Lab Setup
  • Passive Information Gathering
  • Windows & Linux OS Familiarization
  • Common Services, Threats & Attacks

Agenda: Day 2

  • Wireless Testing
  • Active Information Gathering
  • Vulnerability Identification & Analysis
  • IPv6 Overview

Agenda: Day 3

  • Wireshark Fundamentals
  • The Metasploit Framework
  • Exploitation
  • Post Exploitation

Agenda: Day 4

  • Windows Forensics
  • IDS / IPS Tools
  • Incident Handling & Response
  • Threat Hunting

Agenda: Day 5

  • Tools of the Trade
  • Capture the Flag (CTF)
  • Certificate Ceremony
$399.00

Intro to Cyber Workshop

Our one-day program is designed for beginners and covers the fundamentals of cybersecurity. We start with the basics of common computer and network services and end with exploitation and an understanding of attack methodologies and strategies to defend against them. We will also focus on ways to build a home lab along with challenges and educational references to improve your skillset.

This course is for you if you are interested in a cybersecurity career, but you don’t have much hands-on experience yet? 

Who Should Attend

Anyone with a desire to learn offensive attack techniques and how to defend against methods employed by attackers to break into systems.  We foster a fun, collaborative and open environment where trial and error is embraced, failures are utilized as learning tools, and creative thinking is encouraged!

For those with little or no experience, this is a great first step in your cybersecurity career!

Agenda

  • Home Lab Setup
  • Passive Information Gathering
  • Windows Active Directory
  • IPv6 Overview
  • Wireshark Fundamentals
  • Active Information Gathering
  • Vulnerability Identification & Analysis
  • Common Services, Threats & Attacks
  • Exploitation
  • Post Exploitation
  • The Metasploit Framework
  • Capture the Flag

PENTESTER PREP

About the Training

Do you have the desire to go on the offensive? Ever thought about what it would be like to go to work every day as a Penetration Tester (Pentester)? If you want to learn offensive techniques to improve your defensive skill set then this workshop is for you!

Whether you are currently practicing penetration testing and want to learn specific methodologies or have zero knowledge and are just scratching the surface, this is still the workshop for you! Pentester Prep will guide you on the right path on what it takes to become a successful penetration tester.

Agenda Day 1

  • Passive Information Gathering
  • Active Information Gathering
  • Wireshark Fundamentals
  • IPv6 Overview
  • Vulnerability Identification & Analysis
  • Common Services, Threats & Attacks
  • Exploitation
  • Post Exploitation

Agenda Day 2

  • The Metasploit Framework
  • Privilege Escalation Techniques
  • Password Attacks
  • Antivirus & Firewall Evasion
  • Pivoting
  • Wireless Testing
  • Intro to Web Exploitation
  • Buffer Overflows

This workshop does not cover every penetration testing tool, topic and technique in existence, but serves as a comprehensive means to begin the necessary research and self-study in order to continue and maintain a successful understanding of penetration testing and the evolution of vulnerabilities and exploits. We hope you enjoy all the provided content and look forward to working with you in the future.

SOC ANALYST PREP

About the Training

Are you or someone you know an aspiring SOC Analyst? SOC (Security Operations Center) Analysts specialize in identifying and utilizing defensive skills and techniques. SOC Analysts are highly sought after in the Cybersecurity field. SOC Analysts identify compromised machines and malicious actors. They also help mitigate any damage that may have occurred.

Students will be in charge of a network that is currently under attack and will be taught techniques that will prepare them to defend against several attack scenarios. In addition to windows forensics, this workshop will feature popular tools such as Security Onion, Wireshark, and Nessus. All software can be used at home and installed for free. Setup and instruction material will be provided to all participants.

This is a great opportunity to develop hands-on experience and network with like-minded professionals.

Agenda Day 1

  • SOC Analyst Fundamentals
  • Passive Information Gathering (OSINT)
  • Wireshark Fundamentals
  • Windows Active Directory
  • Active Information Gathering
  • Vulnerability Identification & Analysis
  • Common Services, Threats, and Attacks

Agenda Day 2

  • IPv6 Overview
  • IDS/IPS Tools
  • Windows Forensics
  • Incident Handling & Response
  • Threat Hunting

CISSP PRep

About the Training

The cybersecurity industry is expanding rapidly and there is an ever-growing demand for experienced cyber professionals who can fill roles and manage teams and resources across the enterprise. If you are ready to take the next step in your cyber career, the Certified Information Systems Security Professional (CISSP) certification is a great place to start!

Created for experienced cyber practitioners and cyber managers, passing the CISSP requires an advanced understanding of technical issues, program design, and management. This is a vendor-neutral credential that is internationally recognized as a standard attesting to your knowledge and achievement in cybersecurity.

Cover6 is offering a comprehensive CISSP preparation workshop taught by Donald Parker, well-respected in the industry for his fun, engaging training methods. This class includes 40 hours of intensive instruction covering the eight CISSP knowledge domains as well as additional online course materials. The CISSP course is one of our most popular workshops and it will give you the preparation and confidence to pass your exam the first time!

 

Virtual Training: Pentester Prep

About the Training

If you ever wanted to become a Penetration Tester (Pentester) or if you want to learn offensive techniques to improve your defensive skill set then this workshop is for you. Whether you are new to penetration testing or have zero knowledge this is still the workshop for you. This workshop will guide you on the right path on what it takes to become a successful penetration tester.

By no means will we be able to address all of the penetration testing topics, tools, techniques and methodologies in the allotted time. As always, it is up to you to perform the additional research and self-study in order to continue and maintain a successful understanding of penetration testing. We hope you enjoy all the provided content and look forward to working with you in the future.

Agenda Day 1

  • Passive Information Gathering
  • Wireshark Fundamentals
  • Active Information Gathering
  • The Metasploit Framework

Agenda Day 2

  • IPv6 Overview
  • Vulnerability Identification & Analysis
  • Common Services, Threats & Attacks
  • Exploitation

Agenda Day 3

  • Post Exploitation
  • Privilege Escalation Techniques
  • Password Attacks
  • Antivirus & Firewall Evasion
  • Pivoting

Agenda Day 4

  • Wireless Testing
  • Intro to Web Exploitation
  • Buffer Overflows
  • Capture the Flag

Virtual Wireshark Training with Marcelle Lee

Overview
Analysis of network traffic can provide a wealth of forensic data and is an essential aspect of many fields of cybersecurity work, including incident response, security operations, and malware analysis. Artifacts obtained through network traffic analysis can reveal hacker techniques and methodologies, such as the use of malware, network traversal, privilege escalation, the establishment of persistence, and data exfiltration. Even relatively “normal” traffic can reveal eye-opening data about user activity.

In this series of training sessions, we will cover the basics of network traffic flow, including topics such as the OSI model and TCP/IP stack, ports and protocols, and packet headers. From there, we will dive into using Wireshark to examine custom packet captures showing a variety of network activity. Participants will learn how to capture their own traffic, and will also be provided with the custom captures and solutions.

Sessions will be recorded so don’t worry if you cannot attend them all. We will also have a Slack site for student chat and resource sharing.

Requirements
No special equipment is required for this training, just access to a computer and Wireshark, which is available for Mac, Linux, and Windows.

Schedule

  • Session 1: Introduction, networking fundamentals, getting started with Wireshark, application layer
  • Session 2: Assignment review, review of transport layer
  • Session 3: Assignment review, review of internet layer
  • Session 4: Assignment review, review of network access layer, capstone challenge

Upcoming Training