Immersives 101 and 102 Learning Path

24+ hours

Quick facts

About this learning path

  • courses

    100% online

  • Duration

    24+ hours

  • Assessment

    questions

About Immersives 101 and 102

 

Syllabus

Introduction to Incident Response

Course - 00:56:00

In this course, we will dig into the NIST phases of incident response. We will also talk about business continuity and DR, specifically how it relates to incident response. Lastly, we dig into creating a playbook that fits your organization and its business needs. We also address the team required to realize the playbook and policies.
Stage 1 - Preparation

Course - 00:33:00

This course goes into some detail with common definitions and severity criteria, with special attention being paid to making sure the student understands that the severity criteria should be based on overall organizational definitions and procedures. The latter part of the course goes into the importance of asset inventory and identification as a basis for establishing severity criteria. All these pieces are required for proper preparation for any incident.
Stage 2 - Identification

Course - 00:38:00

This course deals specifically with how incidents are identified, as well as the classification levels that incidents might fall within. It also reminds the student that these classification levels are established with input from upper management and the rest of the organization. We go into details of notifying the appropriate parties of the incident and how to do that properly. We end this course with a discussion of common tools and techniques.
Stage 3 - Containment

Course - 00:37:00

This course explores containment, and the proper scoping and management of it. We examine the details of how to contain an incident and, more importantly, how to define what containment means. We also explore common containment tools.
Stage 4 - Investigation

Course - 00:23:00

In this course, you’ll learn the questions asked in normal investigations and how to properly answer them. You’ll explore the important data sources these answers are pulled from and the role this process plays in incident response overall.
Stage 5 - Eradication

Course - 00:27:00

Dive into what it takes to remove threats from and environment after the threat has been contained. We’ll also take a look at how to verify the threat has been eradicated and address proper notification of eradication to other authorized parties. Lastly, we’ll discuss some common tools for eradication.
Stage 6 - Recovery

Course - 00:19:00

This course shows how we tie directly into business continuity and disaster recovery at this phase. We deal with how to restore systems in the least disruptive and most efficient way, as well as defining what constitutes "recovered." Finally, we look at validation and sign-off of recovery.
Stage 7 - Follow Up/Lessons Learned

Course - 00:13:00

This course deals with how to effectively assess how well the team responded. It also looks at implementing needed improvements and how to ingest feedback from the rest of the organization or even outside organizations.
Introduction to cybersecurity foundations

Course - 00:03:00

Learn what this learning path covers in a short and straightforward introductory video.
Cybersecurity foundations

Course - 00:40:00

If you've been trying to break into cybersecurity and felt like the courses you've taken didn't address enough of the foundational aspects of cybersecurity and technology in general, this course is for you. We answer questions such as "What is cybersecurity?", "What is an operating system?" and many other foundational questions that one absolutely must understand to be comfortable in any cybersecurity bootcamp or training course. It is the missing piece for brand-new cybersecurity students.
Operating system foundations

Course - 00:32:00

In this course, we take a look at what an actual operating system is. People often confuse operating systems with browsers and many other things. We take a look at Windows versus Linux versus MacOS and discuss how these operating systems evolved. We also get into some technical detail about the components that make up an operating system.
Windows command line foundations

Course - 00:41:00

This course gets the learner right into the thick of the command line and navigating it. What we do here is a series of exercises that build on things most people already know how to do with Windows, such as copying and pasting files from one place to another. We take several basic things like this and teach the learner to do them from the command line. The goal is not to make the learner a command-line master, but to provide an introduction that will make the student comfortable with bootcamps requiring command-line entry.
Linux command line foundations

Course - 00:33:00

This course gets the learner right into the thick of the command line from the Linux perspective. In this course, we build on the things you've learned how to do in the Windows Command Line course. This course is an important step if you plan on pursuing a role such as entry-level pentester, cybersecurity analyst or basically any technical cybersecurity role. You will come away with a good understanding of the Linux terminal.
Network fundamentals

Course - 00:31:00

This course dives into what networking is and how network technologies apply to cybersecurity. This is a hands-on course, and the learner will do hands-on exercises with the cyber range on the Infosec Skills platform. We will address everything, from how data gets from one place to another all the way to basic monitoring and analysis techniques. Students do not need to worry about having no experience with networking, as this is 100% introduction level.
Cloud computing fundamentals

Course - 00:43:00

This course goes in-depth with cloud services. The learner will create their first cloud account, create a virtual machine in that account and give it internet access. They will also start up a web service and make it accessible to the world. This is all to make sure the learners walk away comfortable with the technology.

Cybersecurity policy framework and guidelines

Course - 00:13:00

In this course, the learner will get a good look at what policies and frameworks do to keep the cybersecurity industry on-mission and formal. Without this area of cybersecurity, cybersecurity would mean too many people doing too many different things that might not even improve security. Learn how you can have a successful career in cybersecurity without ever touching a command line!
Cybersecurity auditing

Course - 00:12:00

In this course, the learner will get a deeper look at how auditing can go from being very high-level to very deep and technical, depending on the scope of the audit. The learner will also get to see why cybersecurity auditor is one of the best jobs to have in cybersecurity.
Risk management

Course - 00:15:00

This course will take the learner on a quick trip down the road of risk management. The learner will have a trial-by-fire type of exercise where they will learn how to apply the classic ALE=SLE x ARO formula to solving a scenario! Many of the daily functions in cybersecurity are done based on decisions made by risk management professionals. Take this course to learn how.
Pentest demonstration: Appetizer for the beginner

Course - 00:25:00

In this course, we will take you through all five phases of a penetration test. You will see the command line in action, Nmap in action, exploitation tools, other recon tools, track covering, malware and several other things. These topics are layered together to illustrate what a technical role in penetration testing might look like from a day-to-day job perspective. This is the final course in this path.
Introduction to Certified Ethical Hacking and penetration testing

Course - 00:48:00

This course takes you through an introduction of what is covered and how it's covered. Keatron lays out the a foundation for how to approach the content. Learn what is required to properly scope a penetration test. Here we dig into things such as what information to ask customers for; how to ensure you're scoping based on accurate information; and that your scoping exercise will help you provide the customer with a valuable deliverable at the end of the engagement. We then take a deep dive into what is required to become a penetration tester. We talk about pre-reqs, what the course is and is not. We also get into the details of what you will be expected to know for the actual CEH exam. We talk about the test-taking process.
Recon and footprinting

Course - 00:56:00

This course dives into recon and footprinting activities. You will see common tools like Maltego being used to automate some of the information gathering. There are also deep dives into DNS recon and enumeration of DNS.
Network protocol fundamentals

Course - 00:15:00

In this video, we break down the differences between TCP, UDP and ICMP. We also dig into how data is moved across these protocols. You will learn how to exploit these protocols throughout the course, so it's important understand how they work.
Network discovery and recon

Course - 01:38:00

This course takes you under the hood of Nmap. You'll also learn network discovery concepts, as well as being stealthy while doing port scanning. Jump right in to see real-world demonstrations of Nmap.
Vulnerability analysis

Course - 00:26:00

This is an in-depth breakdown of different kinds of vulnerability scans and assessments. You will learn how these all work and how they are presented on the exam.
Exploitation

Course - 00:56:00

In this course, you will see exploitation fundamentals and an exploit written from scratch. You will get a very deep understanding of the exploit development process from system mapping to fuzzing and up to a full working exploit.
Malware, Trojans and backdoors

Course - 00:41:00

This course will cover malware you can expect to see on the CEH exam, as well as a demonstration of how you can create your own malware.
Web application hacking

Course - 01:29:00

This course will prepare you to tackle some of the web application topics you may see on the CEH exam. It is also a good introduction to the demonstration courses on SQL Injection, XSS and watering-hole attacks.
Social engineering

Course - 00:25:00

In this course, you will first learn what social engineering is at a high level. After that, you will see an exciting demonstration on the technical back end of social engineering attacks.
Covert channels and exfiltration

Course - 00:14:00

In this course, you will see a detailed demonstration of the difference between encrypted and non-encrypted threat actor communications. You will also see a unique covert channel tool in use as it uses ICMP packets to covertly deliver an encryption key to malware.
Cloud computing

Course - 00:19:00

In this course, we cover cloud topics such as the different service models and cloud-specific attack vectors. This course also introduces the learner to containers.
Applied python

Course - 00:07:00

In this course, we introduce Python by using it to cover string slicing. This is helpful for CEH and heavily tested on the Pentest+ exam.
Introduction to cyber threat hunting techniques

Course - 00:32:00

Threat hunting artifacts and types

Course - 00:40:00

Threat hunting techniques and generative AI

Course - 00:41:00

Threat hunting methodologies

Course - 00:28:00

Threat hunting data and technologies

Course - 00:37:00

Cyber threat hunting process

Course - 00:24:00

Cyber threat hunting scenarios

Course - 00:32:00

Hunting for network-based threats

Course - 00:35:00

Hunting for host-based threats

Course - 01:12:00

The details

Learning path insights

How to claim CPEs

Should you complete this learning path, you’ll be able to download a certificate of completion. Use this to claim your CPEs or CPUs.

No software. No set up. Unlimited access.

Skip the server racks and spin up a realistic environment with one click. Infosec Skills cyber ranges require no additional software, hardware or server space so your team can spend less time configuring environments and more time learning. Unlimited cyber range access is included in every Infosec Skills subscription so your team can skill up however they learn best.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo