Our Bootcamps
CYBER BOOTCAMP I
- Prerequisite (Access to Lab Environment; Getting familiar with Kali)
- Foot printing and Reconnaissance (Wireshark; theHarvester; Recon-ng; OSRFramework; Maltego)
- Scanning Networks (Nmap (CLI & GUI); Nikto; HPING3)
- Password Cracking (Zydra; Hydra; JTR; L0phtCrack)
- Wireless Networks
- Malware Threats
- Social Engineering
- Exploitation (Metasploit | Metasploitable VM)
- Vulnerability Assessment (OpenVAS; Nessus)
- Evading IDS
- Firewalls
- Honeypots (Snort;KFSensor Honeypot IDS; Nmap EvasionTechniques; HTTP/FTP Tunneling)
CYBER BOOTCAMP II
- Cryptography (HashCalc; Advanced Encryption Package; VeraCrypt; OpenSSL)
- Network Forensic Tools Analysis (Tshark; Xplico)
- Email Forensics
- Application Password Crackers (Password Cracking Tools)
- File System Analysis (FAT,NTFS, Ext2, Ext3, UFS1, and UFS2)
- Computer Forensics Investigation
- Data Acquisition and Duplication
- Steganography and Image File Forensics (Steganography Tools)
- Malware Forensics (Malware Forensics Tools)
- Windows Forensic Tools (Helix, Autopsy, The Sleuth Kit (TSK), Cryptocurrency Mining, Web Security Tools, Firewalls, Log Viewers and Web Attack Investigation Tools.)
Schedule an Appointment
Click here to schedule an appointment with our Director. See if this works for you. Free, no strings
Features
We take you from where you are to a Cyber Job
- Compliment to the Academically focused MS program of Coursework
- Intensive Hands-On Experience that is Unique to Cyber Programs
- Boot Camp experience at off-site
- Builds on MS coursework and Ties Together the learning experience
- Contracted with CCI under the direction of Morgan State University Faculty
- High Impact Experience to secure Navy support
- Students leave with a Capstone Project which includes the development of a unique Cyber attack, Analysis, Detection, Forensics
- Cyber Test Bed that includes: Attack Tools, Network Analysis/Visualization, Attack Detection, Forensics