INtro to Cyber Workshop

Cover6 Solutions has a passion for teaching and a love for information security; we strive to provide premium training without the premium cost. #Intro2Cyber

Through this comprehensive workshop, we offer an intensive hands-on introduction to cybersecurity. We have designed this for students who want to build a foundation of cyber skills that can be used in schoolwork and in future careers. The coursework starts with understanding the basic tools and techniques and then covers basic and advanced offensive and defensive training. At the conclusion, students participate in a capture-the-flag exercise, a fascinating game that will test everyone's problem-solving abilities. Our course is a fun, collaborative, and open environment where trial and error is embraced, failures are utilized as learning opportunities, and creative thinking is always encouraged. This is a great first step into the world of cybersecurity! Our one-day program is designed for beginners and covers the fundamentals of cybersecurity. We start with the basics of common computer and network services and end with exploitation and an understanding of attack methodologies and strategies to defend against them. We will also focus on ways to build a home lab along with challenges and educational references to improve your skillset. This course is for you if you are interested in a cybersecurity career, but you don’t have much hands-on experience yet?  Who Should Attend Anyone with a desire to learn offensive attack techniques and how to defend against methods employed by attackers to break into systems.  We foster a fun, collaborative and open environment where trial and error is embraced, failures are utilized as learning tools, and creative thinking is encouraged! For those with little or no experience, this is a great first step in your cybersecurity career! Agenda
  • Home Lab Setup
  • Passive Information Gathering
  • Windows Active Directory
  • IPv6 Overview
  • Wireshark Fundamentals
  • Active Information Gathering
  • Vulnerability Identification & Analysis
  • Common Services, Threats & Attacks
  • Exploitation
  • Post Exploitation
  • The Metasploit Framework
  • Capture the Flag

Workshop Location

Upcoming Training