PROTONYTE CERTIFIED
CYBERSECURITY FUNDAMENTAL
1st
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
3rd
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
5th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
7th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
1st
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
2nd
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
3rd
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
4th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
5th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
6th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
7th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
8th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
2nd
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
4th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
6th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
8th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
PCSF INSTRUCTOR
Experienced and accomplished manager & penetration tester with over 1.5 years of experience in offensive security. Adept at identifying vulnerabilities and exploiting them to strengthen organizational security. Recognized in 10+ Hall of Fame lists for discovering valid security bugs in major corporations such as Docbyte, nohat, and others.
Certifications:
Certified Ethical Hacker (CEH)
EC-Council Certified Security Analyst (ECSA)
Certified Red Team Professional (CRTP)
Certified Penetration Testing Engineer (CPTE)
Certified Vulnerability Assessor (CVA)
ISO 27001 Lead Implementer (LI)