Cybersecurity Mentorship Program
Published 5/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.43 GB | Duration: 4h 57m
Published 5/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.43 GB | Duration: 4h 57m
Unlock the Practical Skills and Tools Employed by Today's Cybersecurity Defenders.
What you'll learn
Essential Windows Skills
PowerShell
Vulnerability Management
Endpoint Security
Requirements
No experience needed.
Description
The Cybersecurity Mentorship Program offers a training curriculum designed to provide individuals with the necessary skills to secure employment in the cybersecurity industry and continuously excel. The program covers the following topics and includes:Essential Windows Skills for Cybersecurity, is meticulously designed to equip aspiring and current cybersecurity professionals with the crucial command-line proficiency necessary to navigate, analyze, and secure Windows environments effectively. Understanding and utilizing these fundamental Windows tools is paramount for tasks ranging from basic system administration and file manipulation to in-depth security analysis and troubleshooting. This module takes you beyond the graphical user interface, delving into the power and flexibility of the Windows command prompt (CMD) and providing an initial introduction to PowerShell. You'll gain hands-on understanding of essential commands that form the bedrock of interacting with the Windows operating system at a fundamental level.Building upon your foundational understanding of the Windows command line, PowerShell Commands for Cybersecurity delves into the power and versatility of PowerShell, a critical scripting language and command-line shell for modern cybersecurity professionals. PowerShell offers a more robust and object-oriented approach to system administration, automation, and security-related tasks compared to the traditional CMD. Mastering these fundamental PowerShell cmdlets (pronounced "command-lets") will significantly enhance your ability to interact with and analyze Windows systems.Fundamentals of Computer Networking, provides the essential building blocks for understanding how computers communicate and how networks function. A solid grasp of networking principles is absolutely paramount for any cybersecurity professional, as it forms the basis for understanding threats, vulnerabilities, and implementing effective security measures.Endpoint Security, provides you with the critical knowledge and practical skills to effectively implement, manage, and leverage EDR solutions. In today's sophisticated threat landscape, traditional antivirus often falls short in detecting and responding to advanced persistent threats (APTs), ransomware, and other complex attacks. EDR provides a crucial layer of security by continuously monitoring endpoints, collecting and analyzing activity data, and enabling rapid detection and response to threats that bypass traditional defenses.Vulnerability Management and Remediation, equips you with the essential knowledge and practical skills to proactively identify, assess, treat, and track security weaknesses within an organization's IT infrastructure. In the ever-evolving threat landscape, a robust vulnerability management program is a cornerstone of any effective cybersecurity strategy.Our overarching goal is to empower individuals with a truly comprehensive and deeply ingrained set of practical skills, theoretical knowledge, and adaptive thinking capabilities that are absolutely essential to not only gain entry into the highly competitive cybersecurity industry but also to flourish, advance, and become influential leaders within it. We strive to cultivate a holistic understanding of the multifaceted cybersecurity landscape, going far beyond surface-level concepts to instill a profound appreciation for the interconnectedness of various security domains.
Overview
Section 1: Essential Windows Skills for Cybersecurity
Lecture 1 cd (Change Directory)
Lecture 2 dir (Directory)
Lecture 3 mkdir (Make Directory) / md
Lecture 4 rmdir (Remove Directory) / rd
Lecture 5 copy
Lecture 6 move
Lecture 7 del (Delete)
Lecture 8 ren (Rename)
Lecture 9 type
Lecture 10 attrib
Lecture 11 systeminfo
Lecture 12 tasklist
Lecture 13 taskkill
Lecture 14 ipconfig
Lecture 15 ping
Lecture 16 tracert
Lecture 17 netstat
Lecture 18 sfc /scannow
Lecture 19 chkdsk
Lecture 20 shutdown
Lecture 21 ver / winver
Lecture 22 driverquery
Lecture 23 nslookup
Lecture 24 net
Lecture 25 arp
Lecture 26 route
Lecture 27 diskpart
Lecture 28 regedit
Lecture 29 gpupdate
Lecture 30 gpresult
Lecture 31 powershell
Section 2: Networking for Cybersecurity Professionals
Lecture 32 Getting Started with Networking
Section 3: PowerShell Commands for Cybersecurity
Lecture 33 Get-Process
Lecture 34 Stop-Process
Lecture 35 Start-Process
Lecture 36 Get-Service
Lecture 37 Stop-Service
Lecture 38 Start-Service
Lecture 39 Get-Item
Lecture 40 Get-ItemProperty
Lecture 41 Test-Path
Lecture 42 Get-EventLog
Lecture 43 Select-String
Lecture 44 Out-File
Lecture 45 Invoke-WebRequest
Lecture 46 Get-Acl
Lecture 47 Get-LocalUser
Lecture 48 Get-LocalGroup
Lecture 49 Get-LocalGroupMember
Lecture 50 Get-FileHash
Section 4: Vulnerability Management
Lecture 51 Console Overview
Lecture 52 Tenable Product Overview
Lecture 53 Installing Windows Agents
Lecture 54 Creating a Nessus Agent Scan
Lecture 55 Dashboards
Lecture 56 Assets
Lecture 57 Findings
Lecture 58 Sensors
Lecture 59 Reports
Lecture 60 Tags
Lecture 61 Access Control Part 1
Lecture 62 Access Control Part 2
Section 5: Endpoint Detection and Response
Lecture 63 Console Overview
Lecture 64 Installing Windows Agents
Lecture 65 Endpoint Actions
Lecture 66 Incidents
Lecture 67 Applications
Lecture 68 Activity
Lecture 69 Reports
Lecture 70 Automation
Lecture 71 Settings
Lecture 72 Policy
Anyone interested in learning real cybersecurity.