Learn key skills of cybersecurity and earn a certification from Starweaver.

Today, the necessity of strong cybersecurity measures is self-evident. A proliferation of cyber-attacks is causing increasing damage to companies, governments and individuals. Organizations need to respond to this increased threat by adopting strict cybersecurity measures.

Starweaver is here to help you and your organization respond, building you into "CyberWarriors" with our 7-Part certification program focused on helping you know you to prevent, and face cyber-attacks.

This program includes modules on:

Part I: Building a Security Skills Foundation

Part II: Leveraging Wireshark for Security

Part III: Essential Defensive Strategies

Part IV: Building a Cyber Range

Part V: Penetration Testing Unveiled

Part VI: Intrusion Analysis

Part VII: Intrusion Handling

Learning Outcomes

At the end of this course, you will be able to...

  • Articulate the fundamental issues in cybersecurity today
  • Understand the key tools available in Wireshark for security
  • Explain and apply essential cybersecurity defensive strategies
  • Build a “Cyber Range”
  • Discuss penetration testing
  • Describe intrusion analysis
  • Appreciate and conduct intrusion handling

Target Audience

  • Security professionals
  • Others involved in maintaining IT security protocols within an organization

Course curriculum

  • 1
  • 2

    Slack Channel Discussion, Help + More

    • Slack Channel (Discussion Forum)
    • If (and when) you need help...
    • Joining the Alumni Community
  • 3

    Developing Security Skills - Skill Deficiencies

    • Developing Security Skills Skill Deficiencies
    • Security Skills Command Line Code TCP IP
    • Typical Security Model Security Posture Security Policy
    • Network Protocols Transport Protocols
    • Flow Of Data
    • Unix And Linux
    • Virtualization
  • 4

    Leveraging Wireshark for Security

    • Network Protocols
    • ARP Address Resolution Protocol
    • DNS Domain Name System
    • TFTP Trival File Transfer Protocol
    • TCP-Transmission Control Protocol
    • TCP Data Flow
    • Demo Wireshark
  • 5

    Essential Defensive Strategies

    • TMI Good And The Bad
    • The Bad And The Ugly
    • Vulnerability Management
    • Ingress Egress Filtering
    • Secure Network Architectures
  • 6

    Building a Cyber Range

    • Vulnerability Sites Lab Virtual Machines
    • Virtual Machine Creation Components Of Virtual Network
    • More Components
    • Network Security Toolkit Folders Planning
    • Virtual Design Replying Captured Traffic
    • Demo Just A Part
  • 7

    Penetration Testing

    • Penetration Testing Unveild
    • Security Testing Plan Abstract Methodology
    • Non Intrusive
    • Google Hacking Basics Intrusive Exploit
    • Pentest Framework Sample Architecture
    • Detailed Findings Conclusion
    • Demo
  • 8

    Intrusion Analysis

    • Intrusion Detection
    • Functions Of IDS
    • Under Attack
    • Stop The Attack Intrusion Prevention
    • Types Of IPS
    • Identifying The OS Methodology Of Network Analysis
    • Demo
  • 9

    Intrusion Handling

    • Filter Session Content Interface Customization
    • Statistics
    • Computer Incidents
    • Establishing A Computer Forensic Methodology-I
    • Establishing A Computer Forensic Methodology-II
  • 10


    • Quiz 1
    • Quiz 2
    • Quiz 3
    • Quiz 5
    • Quiz 4
  • 11

    Final Examination

    • Final Examination
    • Final Exam: Launch Here
  • 12

    Next steps

    • Congrats! Here's what's next...
    • Yippee! You're an alumnus!
    • Alumni Slack Channel