Wednesday, March 4, 2020

Network Security / Ethical Hacking / IT Security Career Path

Many of you ask me how to start a career in Network Security and Ethical hacking so I selected the courses that are very close to the classes I took when I was an undergraduate. I have compared several universities and found the classes to be quite similar so if you spend the time watching the video, learn the material and do the lab you should be well equipped to perform the job if offered a position in Network Security or Penetration Testing or at least pass the interview and get your foot in the door. 

PC Operating Systems - This course teaches you everything you should know about Windows 10 from clicking the start button to setting up a basic network.

Windows OS - Mac OS

Microsoft Client and Server Operating Systems - Learn to install and configure Windows Server 2016.

PC Maintenance and Management - In this course introduce the student to PC hardware and maintenance. The student will learn to troubleshoot both hardware and software using various methods.

Desktop Hardware - Laptop Hardware - Understanding Hardware - Troubleshooting Essential (Use 7Zip to extract video)

UNIX Operating Systems - This course covers operating system concepts in the UNIX environment. Topics include terminology, UNIX features and commands, UNIX system administration, and UNIX as a network server.

Introduction to Linux - Introduction to Ubuntu (Optional)

Implement Network Security - In this course, you will learn about what cryptography is, how it works, and how to implement network security. (Use 7Zip to extract video)

CompTIA Security+ Certification Training (Optional)

Cisco Networking Fundamentals - In this course, you will learn the basics of networking, Digital, and Analog Transmission, in data communication. (107 short videos)

Cisco Routing & Switching - This course describes the architecture, components, and operations of routers and switches in a small network. Students learn how to configure a router and a switch for basic functionality. (Use 7Zip to extract video)

IPv4 Subnetting - In this course the student will learn how to subnet. This is an important concept to understand in order to pass your CCNA exam. (Use 7Zip to extract video)

Computer Forensics - This course surveys the technical knowledge of the Windows operating system that any digital forensic analyst should know to examine digital media. The course focuses on collecting and analyzing data from a Windows operating system to provide information that can be used for both civil and criminal litigation. User based activity and software/hardware artifacts are analyzed along with acquisition of digital media in a Windows based environment

Cisco Certified Network Associate - This is a complete CCNA course. The student will learn everything they need to know in order to pass the CCNA exam.

Wireless Networking & Security - This course covers the wireless technologies in the networking industry. Topics covered will include planning, installing, configuring, and securing wireless networks. Physical-layer standards and wireless hardware will be examined. Hands-on exercises will reinforce the implementation and troubleshooting of wireless networks.

IP Telephony - This course is a survey of the basics of converged IP communications networks. It provides exposure to technologies common to many IP Telephony implementations, then focuses on the Cisco router based CallManager Express (CME) technology to illustrate situations common to small business environments. Specifically, students will learn Cisco CallManager Express (CME) architecture, components, functionality, and features as they configure Cisco routers, switches, and IP phones

Perl / Python / Shell (Optional) Scripting - Perl and Python programming languages are both cross-platform in nature and can be used on Windows, Linux/Unix and Mac OS systems. This broad-based capability makes the Perl/Python Scripting languages highly useful in the field of technology. Both languages are highly capable in-stream editing of data, data manipulation, and parsing, which are programming capabilities required in IT Forensics. (Use 7Zip to extract the videos for both Python and Shell. For Perl just download the ISO, double click on it to view the videos)

Cisco Networking Advanced Routing - This course introduces advanced routing concepts. Students will be introduced to the knowledge and skills necessary to use advanced IP addressing and routing in implementing scalable and secure Cisco ISR routers connected to LANs and WANs. Topics include: EIGRP, OSPF, and BGP routing protocols; route redistribution; IPV4 & IPV6 coexistence; and policy based routing

Cisco Networking Secure WANs - This course introduces network device security. Students will be introduced to the knowledge and skills necessary to install, secure, troubleshoot and monitor network devices and their associated networks to maintain integrity, confidentiality and availability of data and devices. (Use 7Zip to extract video)


CCNA Security Intrusion Detection and Prevention System

CISSP Prep - Take this course to prepare for the Certified Information System, Security Professional (CISSP). This course will teach you everything you need to know about building a strong information security policy.

Introduction to Ethical Hacking - In this course the student will learn some of the technique used by hacker to perform information gathering, and vulnerability assessment in order to defend against network attacks.

UNIX/Linux Server Administration - This course builds on previous experience in a UNIX environment to provide students with all the standard and advanced techniques necessary to set up and maintain a secure, effective Linux environment.

Troubleshooting Ubuntu Server (Optional)

Microsoft Administrator SQL Server - The course covers installation, configuration, administration, and troubleshooting the Microsoft SQL Server database management system


Database Design and Management - This course will examine the major types or data models of Database Management Systems (DBMS): hierarchical, network, relational, and object-oriented. The principles and problems of database design, operation, and maintenance for each data model will be discussed and compared

Microsoft Active Directory - Learn how to manage, configure  and implement Microsoft Active Directory. 

What is Active Directory - Implement Active Directory

Configuring Microsoft Exchange - This course covers installation, administration and troubleshooting of Microsoft Exchange Server. This course includes extensive use of hands-on exercises

Virtualization - This course cover what is virtualization and how you can use it to deploy virtual server and application.

Additional Information on Virtualization

Preparing for a job interview - Learn to prepare for a job interview in computer science and IT related field.

Technical questions interviewer might ask:

Help Desk - Security Analyst - Network Administrator - System Administrator


Post a Comment