25.10.0
This website uses cookies to ensure you get the best experience on our website. Learn more

Cyberbit Range Security+ Preparation offered by Illinois State Treasurer

Cybersecurity is driven by people, process, and technology. At Cyberbit, we believe in people. Our mission is to keep organizations safe by boosting information security team performance. Cyberbit range training offered by the Illinois State Treasurer helps to strengthen individuals through hands-on skill development in a variety of cybersecurity concepts, tools, and techniques. To earn this certification, the trainee must complete the 48 hour CompTIA Security+ Preparation Course in the Cyberbit range.

Skills / Knowledge

  • Security+ exam preparation
  • Knowledge of security controls and frameworks
  • Knowledge of threat actors, threat intelligence, and threat landscape
  • Hands-on practice in network reconnaissance
  • Hands-on practice with Wireshark
  • Knowledge of vulnerability scanning
  • Knowledge of penetration testing techniques
  • Hands-on practicing identifying phishing techniques
  • Knowledge of cryptography
  • Knowledge of authentication technologies
  • Hands-on practice with account policy configuration
  • Knowledge of security network design
  • Knowledge of secure switching and routing
  • Knowledge of firewalls and proxy servers
  • Hands-on practice with Snort rules
  • Hands-on practice with WAF
  • Hands-on practice with SIEM (Splunk)
  • Hands-on practice with Linux processes and commands
  • Hands-on practice with Windows processes and commands
  • Hands-on practice with Regex
  • Knowledge of network protocols
  • Hands-on practice with network protocols analysis (HTTP, HTTPS, ARP, SSH)
  • Knowledge of endpoint security
  • Knowledge of mobile and wireless device security
  • Knowledge of application layer attacks
  • Hands-on practice with Windows privilege escalation techniques
  • Hands-on practice with Burp Suite
  • Hands-on practice with cross site scripting investigation
  • Knowledge of secure coding practices
  • Hands-on practice with Powershell
  • Knowledge of secure cloud and virtualization practices
  • Hands-on practice analyzing AWS logs
  • Knowledge of incident response procedures
  • Hands-on practice in memory forensics using Autopsy and Volatility
  • Knowledge of digital forensics
  • Knowledge of risk management processes
  • Knowledge of cybersecurity resiliency practices
  • Knowledge of physical host security controls

Issued on

May 13, 2023

Expires on

Does not expire