Overview
Learn key skills of cybersecurity and earn a certification from Starweaver.
Today, the necessity of strong cybersecurity measures is self-evident. A proliferation of cyber-attacks is causing increasing damage to companies, governments and individuals. Organizations need to respond to this increased threat by adopting strict cybersecurity measures.
Starweaver is here to help you and your organization respond, building you into "CyberWarriors" with our 7-Part certification program focused on helping you know you to prevent, and face cyber-attacks.
This program includes modules on:
Part I: Building a Security Skills Foundation
Part II: Leveraging Wireshark for Security
Part III: Essential Defensive Strategies
Part IV: Building a Cyber Range
Part V: Penetration Testing Unveiled
Part VI: Intrusion Analysis
Part VII: Intrusion Handling
Learning Outcomes
At the end of this course, you will be able to...
- Articulate the fundamental issues in cybersecurity today
- Understand the key tools available in Wireshark for security
- Explain and apply essential cybersecurity defensive strategies
- Build a “Cyber Range”
- Discuss penetration testing
- Describe intrusion analysis
- Appreciate and conduct intrusion handling
Target Audience
- Security professionals
- Others involved in maintaining IT security protocols within an organization
Course curriculum
-
1
LiveLabs
- LiveLab - 001 - Building a Cyber Range
- LiveLab - 002 - Intrusion Analysis (Resources at: https://bit.ly/3fj4fVF)
- LiveLab - 003 - TCP/IP
- LiveLab - 004 - UNIX-LINUX
- LiveLab - 005 - Virtualization and Introduction to the Hacking Mindset
- LiveLab - 006 - Vulnerability Management
-
2
Developing Security Skills - Skill Deficiencies
- Developing Security Skills Skill Deficiencies
- Security Skills Command Line Code TCP IP
- Typical Security Model Security Posture Security Policy
- Network Protocols Transport Protocols
- Flow Of Data
- Unix And Linux
- Virtualization
- Lab - Command Line
- Lab - Security Model
- Lab - Protocol Analysis
- Lab - Allow a Service
-
3
Leveraging Wireshark for Security
- Network Protocols
- ARP Address Resolution Protocol
- DNS Domain Name System
- TFTP Trival File Transfer Protocol
- TCP-Transmission Control Protocol
- TCP Data Flow
- Demo Wireshark
- Lab - IP Header
- Lab - Client to Server
- Lab - Sessions
- Lab - Filters
-
4
Essential Defensive Strategies
- TMI Good And The Bad
- The Bad And The Ugly
- Vulnerability Management
- Ingress Egress Filtering
- Secure Network Architectures
- Lab - Vulnerability Sites
- Lab - Nmap Vulnerability Scripts
- Lab - OpenVAS
- Lab - Nessus
-
5
Building a Cyber Range
- Vulnerability Sites Lab Virtual Machines
- Virtual Machine Creation Components Of Virtual Network
- More Components
- Network Security Toolkit Folders Planning
- Virtual Design Replying Captured Traffic
- Demo Just A Part
- Lab - Routing
- Lab - Routing part two
- Lab -Install DHCP
- Lab - Configure DHCP Server
-
6
Penetration Testing
- Penetration Testing Unveild
- Security Testing Plan Abstract Methodology
- Non Intrusive
- Google Hacking Basics Intrusive Exploit
- Pentest Framework Sample Architecture
- Detailed Findings Conclusion
- Demo
- Lab - Domain Lookup
- Lab - DNS Enum
- Lab - Nmap
- Lab - Nmap against defenses
-
7
Intrusion Analysis
- Intrusion Detection
- Functions Of IDS
- Under Attack
- Stop The Attack Intrusion Prevention
- Types Of IPS
- Identifying The OS Methodology Of Network Analysis
- Demo
- Lab - Data Analysis
- Lab - Basic Attacks
- Lab - SMB
- Lab - Advanced Attacks
-
8
Intrusion Handling
- Filter Session Content Interface Customization
- Statistics
- Computer Incidents
- Establishing A Computer Forensic Methodology-I
- Establishing A Computer Forensic Methodology-II