Cybersecurity Warrior Certification: Cybersecurity Immersion

Cybersecurity certification | Wireshark | Intrusion analysis | Defensive strategies | Cyber Range | Pentesting

4.40 (375 reviews)
Udemy
platform
English
language
IT Certification
category
Cybersecurity Warrior Certification: Cybersecurity Immersion
32,997
students
6 hours
content
Jan 2023
last update
$54.99
regular price

What you will learn

Articulate the fundamental issues in cybersecurity today

Understand the key tools available in Wireshark for security

Explain and apply essential cybersecurity defensive strategies

Construct a virtual "Cyber Range" to simulate and test cybersecurity scenarios and responses.

Appreciate "pentesting," and analyze the principles and techniques of penetration testing to evaluate the security of a system.

Perform intrusion analysis to identify and assess security breaches in a system.

Understand and implement best practices for handling and responding to security intrusions.

Description

Learn key skills of Cybersecurity and earn a Certification at the same time.

Today, the necessity of strong Cybersecurity measures is self-evident. A proliferation of cyber-attacks is causing increasing damage to companies, governments and individuals. Yahoo’s disclosure of a massive breach is still making headlines. Organizations need to respond to this increased threat by adopting strict cybersecurity measures.   

This CyberWarrior Certification is a 7-part certification focused on helping you know how to prevent, and face cyber-attacks.  This program includes modules on:  

Part I: Building a Security Skills Foundation  

Part II: Leveraging Wireshark for Security  

Part III: Essential Defensive Strategies  

Part IV: Building a Cyber Range  

Part V: Penetration Testing Unveiled  

Part VI: Intrusion Analysis  

Part VII: Intrusion Handling  


More about this course and Starweaver

This course is led by a seasoned technology industry practitioner and executive with many years of hands-on, in-the-trenches cybersecurity work. It has been designed, produced and delivered by Starweaver. Starweaver is one of the most highly regarded, well-established training providers in the world, providing training courses to many of the leading financial institutions and technology companies, including:

Ahli United Bank; Mashreqbank; American Express; ANZ Bank; ATT; Banco Votorantim; Bank of America; Bank of America Global Markets; Bank of America Private Bank; Barclay Bank; BMO Financial Group; BMO Financial Services; BNP Paribas; Boeing; Cigna; Citibank; Cognizant; Commerzbank; Credit Lyonnais/Calyon; Electrosonic; Farm Credit Administration; Fifth Third Bank; GENPACT; GEP Software; GLG Group; Hartford; HCL; HCL; Helaba; HSBC; HSBC Corporate Bank; HSBC India; HSBC Private Bank; Legal & General; National Australia Bank; Nomura Securities; PNC Financial Services Group; Quintiles; RAK Bank; Regions Bank; Royal Bank of Canada; Royal Bank of Scotland; Santander Corporate Bank; Tata Consultancy Services; Union Bank; ValueMomentum; Wells Fargo; Wells Fargo India Solutions; Westpac Corporate Bank; Wipro; and, many others.

Starweaver has and continues to deliver 1000s of live in-person and online education for organizational training programs for new hires and induction, as well as mid-career and senior-level immersion and leadership courses.

If you are looking for live streaming education or want to understand what courses might be best for you in technology or business, just google:

starweaver journey builder starweaver[dot]com

Happy learning.


Content

Building a Security Skills Foundation

Developing Security Skills - Skill Deficiencies
SECURITY SKILLS - COMMAND LINE - CODE - TCP-IP
TYPICAL SECURITY MODEL - SECURITY POSTURE - SECURITY POLICY
NETWORK PROTOCOLS - TRANSPORT PROTOCOLS
FLOW OF DATA
UNIX AND LINUX
VIRTUALIZATION
QUESTIONS

Leveraging Wireshark for Security

NETWORK PROTOCOLS
ARP - ADDRESS RESOLUTION PROTOCOL
DNS - DOMAIN NAME SYSTEM
TFTP - TRIVIAL FILE TRANSFER PROTOCOL
TCP - TRANSMISSION CONTROL PROTOCOL
TCP DATA FLOW
DEMO - WIRESHARK
QUESTIONS

Essential Defensive Strategies

TMI - GOOD AND THE BAD
THE BAD AND THE UGLY
VULNERABILITY MANAGEMENT
INGRESS - EGRESS FILTERING
SECURE NETWORK ARCHITECTURES
DEMO AND QUESTIONS

Building a Cyber Range

VULNERABILITY SITES - LAB - VIRTUAL MACHINES
VIRTUAL MACHINE CREATION - COMPONENTS OF VIRTUAL NETWORK
MORE COMPONENTS
NETWORK SECURITY TOOLKIT - FOLDERS - PLANNING
VIRTUAL DESIGN - REPLAYING CAPTURED TRAFFIC
DEMO

Penetration Testing

PENETRATION TESTING UNVEILED
SECURITY TESTING PLAN - ABSTRACT METHODOLOGY
NON-INTRUSIVE
GOOGLE HACKING BASICS - INTRUSIVE - EXPLOIT
PENTEST FRAMEWORK - SAMPLE ARCHITECTURE
DETAILED FINDINGS - CONCLUSION
DEMO
QUESTIONS

Intrusion Analysis

INTRUSION DETECTION
FUNCTIONS OF IDS
UNDER ATTACK
STOP THE ATTACK - INTRUSION PREVENTION
TYPES OF IPS
IDENTIFYING THE OS - METHODOLOGY OF NETWORK ANALYSIS
DEMO
QUESTIONS

Intrusion Handling

FILTER - SESSION CONTENT - INTERFACE CUSTOMIZATION
STATISTICS
COMPUTER INCIDENTS
ESTABLISHING A COMPUTER FORENSIC METHODOLOGY I
ESTABLISHING A COMPUTER FORENSIC METHODOLOGY II
DEMO AND QUESTIONS

Reviews

Catharina
February 21, 2023
I would have liked to have seen a different arrangement of the course where I as a student first had to learn the basic concepts and then build on that knowledge with the more in-depth parts that I felt sections 1 and 2 contained. In some of the later sessions, I experienced that the teacher was talking about something other than what I saw on the screen, that the image display froze and I had to look at a frozen image instead of what the teacher was trying to show us students. As for the quizzes, I often experienced them as a bit detached from what the section was about, which created some confusion. It would be good if the quiz could be adapted so that the questions actually works as a control of what you have just learned. You clearly have an experienced teacher in this course which I appriciate.
George
August 3, 2022
The course overall was very good and informative as the instructor has a long term understanding of the content being a professional in the field for over 25 years. The one thing that I didn't realize is that the training is four years old, so I don't know how relevant the tools displayed in the training will be to 2022? I enjoyed the course overall! Thank You!!!
Elaine
May 22, 2021
i want to explore going into cybersecurity and this is a good course to better understand that. also part way through #2, the video stops.
Friðrik
February 22, 2021
Cardwell opens up your eyes by explaining in a manner that I believe you can not do unless you have decades of experience under your belt.
Nicholas
July 4, 2020
Kevin is definitely a great instructor, and I did learn some great tips, but I still have a lot to still learn and understand as a beginner. I would say this course is best suited for the mid-level cybersecurity professional, but it still was a great teaching tool!
David
November 7, 2019
Very much so. It is helping me get a better understanding. It was one of the most comprehensive courses I have taken
Sandra
July 13, 2018
This course touches on topics that are relative to the current security environment. Such as, Essential Defensive Strategy, Ingress/Egress, BlackHole routing, Secure Network Architecture, Virtual Machines, Penetration Testing, and the definition of an Incident and Incident Handling, to name a few. If your job relates to any of these topics, I highly recommend taking this course. There is a lot of sharing of information and tips from a very knowledgeable instructor. However, you must be familiar with the tools used in network security as this course is not for a newbie.
Hiru
July 9, 2018
I am learning a lot of new things about cyber security such as things that I wouldn't have thought of being extremely essential. For example, I didn't think doing more on command line would be much better than using a GUI.
Olawaye
July 4, 2018
Bringing to light some very helpful practicals. The instructors demonstrated a great level of understanding as he simplified the seemingly difficult portions.
Scott
January 8, 2018
This is an amazing amount of excellent information presented in a very concise manner. The speaker relates the subject to the viewer in a very easy to follow fashion.

Coupons

DateDiscountStatus
12/31/2020100% OFF
expired
3/8/2021100% OFF
expired
4/26/202160% OFF
expired

Charts

Price

Cybersecurity Warrior Certification: Cybersecurity Immersion - Price chart

Rating

Cybersecurity Warrior Certification: Cybersecurity Immersion - Ratings chart

Enrollment distribution

Cybersecurity Warrior Certification: Cybersecurity Immersion - Distribution chart

Related Topics

1309942
udemy ID
8/1/2017
course created date
11/22/2019
course indexed date
Bot
course submited by