Cyber Security
Cyber Security
cyber security
Command Line
Networking Concepts
Networking Essentials
Networking Core Protocols
Networking Secure Protocols
Wireshark: The Basics
Tcpdump: The Basics
Nmap: The Basics
Cryptography
Cryptography Basics
Public Key Cryptography Basics
Hashing Basics
John The Ripper: The Basics
Exploitation Basics
Hydra
Gobuster: The Basics
Shells Overview
SQLMap: The Basics
Defensive Security
Introduction to SIEM
Firewall Fundamentals
IDS Fundamentals
Vulnerability Scanner Overview
Defensive Security Tooling
Security Principles
Careers in Cyber
Training Impact on Teams
JR Penetration Tester – 8 weeks
Introduction
Introduction to Cyber Security
Introduction to Pentesting
Pentesting Fundamentals
Principles of Security
Burp Suite
Network Security
Passive Reconnaissance
Active Reconnaissance
Nmap Live Host Discovery
Nmap Basic Port Scans
Nmap Advanced Port Scans
Nmap Post Port Scans
Protocols and Servers
Protocols and Servers 2
Net Sec Challenge
Vulnerability Research
Vulnerabilities 101
Exploit Vulnerabilities
Vulnerability Capstone
Metasploit
Metasploit: Introduction
Metasploit: Exploitation
Metasploit: Meterpreter
Privilege Escalation
Snort
Snort Challenge – The Basics
Snort Challenge – Live Attacks
NetworkMiner
Zeek
Zeek Exercises
Brim
Wireshark: The Basics
Wireshark: Packet Operations
Wireshark: Traffic Analysis
TShark: The Basics
TShark: CLI Wireshark Features
TShark Challenge I: Teamwork
TShark Challenge II: Directory
Introduction to SIEM
Investigation with ELK 101
ItsyBitsy
Splunk: Basics
Incident handling with Splunk
Investigating with Splunk
Benign
Tempest
Boogeyman 1
Boogeyman 2
Boogeyman 3