The Ultimate Cyber Security Job Accelerator
Buy now
Learn more
Orientation.
Orientation Part 1
Orientation Part 2
Lectures
LECTURES
Week 1 Part 1
Week 1 Part 2
Week 2 Part 1
Week 2 Part 2
Week 2 Part 3
Week 3 Part 1
Week 3 Part 2
Week 4 Part 1
WEEK 4 ASSIGNMET
Week 4 Part 2
Week 5 Part 1
Week 5 Part 2
Week 6 Part 1
Week 6 Part 2
Week 7
WEEK 7 ASSIGNMENT
Week 7.pdf
Week 8 Part 1
WEEK 8 Part 2
Week 9
Week 10
Week 11
Mock Interviews_First Round
Evidence Screenshots provided by the client_LCM System.docx
Assessment Test Sheet For LCM System.xlsx
Standard Operating Procedures_LCM System.doc
FEA_Access_Control_Policy_Full.pdf
FEA_Change_Requests.docx
GRC Analyst Change Request Approval Cheat Sheet.pdf
Week 11.pdf
On The Job Simulation GRC Analyst
MONDAY Day 1
INBOX
Day 1 Email _GRC Analyst
9:00 AM Email from Tracy Briggs
11:00 AM Email from CyberFirst HR
CALENDAR (Meetings)
9:30 AM: Daily stand up Meeting_GRC Analyst
1:00PM Email from John Mark
2:00 PM Email from Calvin Hawkins
400 PM Email from Tracy Briggs
How To Videos:
How to complete the Task_Frameworks and Industries
How to Review Access Control Policy and Perform Gap Analysis
Resources:
NIST.SP.800-53r5.pdf
Gap Analysis Sheet.xlsx
Federal Example Agency Access Control Policy.docx
Cyber Job Accelerator Day 1 (1).pdf
TUESDAY Day 2
INBOX
9:00 AM Email from Calvin Hawkins
11:00 AM Email from Calvin Hawkins: RE: Review of Access Control Policy
CALENDAR-Meetings
Tuesday Daily Standup Meeting
Third Party Client Meeting Part1
Third Party Client Meeting Part2
1:00 PM Email from Olivia St. James: Meeting Notes
Terminology Quiz
WEDNESDAY Day 3
INBOX
Email From Jeff
Email from Rose
THURSDAY
2:00 PM Email from Olivia
FRIDAY
10:00 AM Email from Calvin Hawkins
Weekly Status Report
Weekly Status Report (WSR) _GRC Analyst.docx
Weekly Live Sessions
Zoom Link to Live Coaching Calla
Cybersecurity Basics_Security Awareness Training
What is Cybersecurity?
The CIA Triad: The 3 Pillars of Security
Integrity
Availability
Separation of Duties
Job Rotation and Mandatory Leave
Risk Management Framework (RMF)
Common Roles and Responsibilities
Top Down Approach
Control Frameworks
Due Care and Due Diligence
Compliance
Privacy
Privacy Continued
European Union Privacy Laws
GDPR
Computer Crime
MOM
How Data Breaches Occur
Threats: Virus, Trojan, Logic bomb, Worm, Bot, Rootkit, Spyware, Spam
BIA
Business Continuity Plan (BCP)
Disaster Recovery Sites
Threat Modeling
OWASP
DoS and DDoS Attacks
Man-in-the Middle Attacks
Social Engineering
Types of Social Engineering
Types of security controls
RAT and Backdoor
Adware
Keylogger
Data Protection
Wireless Security
Ports
OS Hardening
Multifactor Authentication
Identifying Authentication Factors
Mobile Security
Social Media
What is Networking?
Networking
Quiz
Security Controls
Security Controls
AC Controls
AC1 to AC25
AC-2_4_.mp4
AC-2_5_with_Evidence.mp4
AC-2_6_.mp4
AC-2_7_.mp4
AC-2_8_AC-2_9_AC-2_10_AC-2_11_AC-2_12_.mp4
AC-3
AC-3.mp4
AC-3_4_.mp4
AC-3_3_.mp4
AC-3_3_ (1).mp4
AC-3_5_.mp4
AC-3_7_Access.mp4
AC-4.mp4
AC-5.mp4
AC-7.mp4
AC-8.mp4
AC-9.mp4
AC-10.mp4
AC-11.mp4
AC-12.mp4
AC-13.mp4
AC-14.mp4
AC-15.mp4
AC-15 (1).mp4
AC-17
AC-18
AC-18 part2
AC-19
AC-20
AC-21
AC-22
AC-23 part 2
AC-23 part 1
PT-1
NIST.SP.800-53Ar5.pdf
SR-3.mp4
PT-2.mp4
SR-2.mp4
PT-2 part2.mp4
PT-4.mp4
SR-4 plus enhancements
PE Controls part1.mp4
Controls that directly deal with encryption.docx
AT-3_4_.mp4
AT-1.mp4
AT-3_5_ (1).mp4
AT-3_5_.mp4
AT-2_6_.mp4
AT-2_5_.mp4
AT-2_1_AT-2_2_.mp4
AT-3.mp4
AT-2_3_AT-2_4_.mp4
Assessment Artifacts
AT-Security Awareness training Screenshot.png
NIST Control Families
AT- Security Awareness certificate.pdf
NIST 800-53 Rev 5
IR- Incident Response Plan_FEA.docx
AC-4__Interconnection Security Agreement v2.docx
NIST RMF
Delayed 30 days
Promo Video (REGISTER TO WATCH PREVIEW)
Intro
ISSO SCA and GRC Analyst Cybersecurity Roles
Which Role is Right For me.mp4
Who is an ISSO?
Job Environment
Qualifications
Things you should know
Responsibilities and daily tasks prt1
Responsibilities and daily tasks prt2
Responsibilities and daily tasks prt3
RMF Rev. 2
RMF Continued: Prepare
Prepare
Categorize
Select
Implement
Assess
Authorize
Monitor
Summary
RMF (Driver's License Analogy)
Module One Quiz
Certification Support: Security+ or CGRC
Delayed 30 days
The 2 Certifications to Get.mp4
Security Plus Intro.mp4
Security plus Course Objectives.mp4
Security plus Course Objectives 2.mp4
Security plus Course Objectives 3.mp4
comptia-security-sy0-601-exam-objectives-(2-0).pdf
The CGRC Exam intro.mp4
Exam requirements
CGRC Exam Prep
Exam Prep Questions
Career Development
Delayed 60 days
RESUME PREP
Developing Your Resume.
Developing Your Resume part 2
Resume Template_for Security Control Assessor
Resume_John Doe_ISSO_.docx
Resume Roles and Responsibilities list.pdf
Resume_John Doe_ISSO_.docx
Resume Template
Using the Roles and Responsibilities List to Update your Resume
FINDING A JOB
Finding a Job
Finding a Job with no Experience
Job Search Sites
Tips on finding a Job
Job Search Sites Indeed
Job Search Sites Glassdoor
Job Market
Background Investigation
INTERVIEW PREP
The Interview
Things to do before you go for an Interview
Interview process
Interview Tips 1st Call
Interview Questions
Interview Questions PDF
Interview Tips 2nd Call
Interview Tips: In-person interview
SALARY NEGOTIATION
Negotiating your Salary.
Researching your Salary
Company Reviews, Salaries on Glassdoor.
On The Job Support
Delayed 90 days
Things You Should do in Your First Week
Daily Scrum
Job Stacking
Career Advice Pocket Guide
Products
Course
Section
Lesson
Week 11.pdf
Week 11.pdf
The Ultimate Cyber Security Job Accelerator
Buy now
Learn more
Orientation.
Orientation Part 1
Orientation Part 2
Lectures
LECTURES
Week 1 Part 1
Week 1 Part 2
Week 2 Part 1
Week 2 Part 2
Week 2 Part 3
Week 3 Part 1
Week 3 Part 2
Week 4 Part 1
WEEK 4 ASSIGNMET
Week 4 Part 2
Week 5 Part 1
Week 5 Part 2
Week 6 Part 1
Week 6 Part 2
Week 7
WEEK 7 ASSIGNMENT
Week 7.pdf
Week 8 Part 1
WEEK 8 Part 2
Week 9
Week 10
Week 11
Mock Interviews_First Round
Evidence Screenshots provided by the client_LCM System.docx
Assessment Test Sheet For LCM System.xlsx
Standard Operating Procedures_LCM System.doc
FEA_Access_Control_Policy_Full.pdf
FEA_Change_Requests.docx
GRC Analyst Change Request Approval Cheat Sheet.pdf
Week 11.pdf
On The Job Simulation GRC Analyst
MONDAY Day 1
INBOX
Day 1 Email _GRC Analyst
9:00 AM Email from Tracy Briggs
11:00 AM Email from CyberFirst HR
CALENDAR (Meetings)
9:30 AM: Daily stand up Meeting_GRC Analyst
1:00PM Email from John Mark
2:00 PM Email from Calvin Hawkins
400 PM Email from Tracy Briggs
How To Videos:
How to complete the Task_Frameworks and Industries
How to Review Access Control Policy and Perform Gap Analysis
Resources:
NIST.SP.800-53r5.pdf
Gap Analysis Sheet.xlsx
Federal Example Agency Access Control Policy.docx
Cyber Job Accelerator Day 1 (1).pdf
TUESDAY Day 2
INBOX
9:00 AM Email from Calvin Hawkins
11:00 AM Email from Calvin Hawkins: RE: Review of Access Control Policy
CALENDAR-Meetings
Tuesday Daily Standup Meeting
Third Party Client Meeting Part1
Third Party Client Meeting Part2
1:00 PM Email from Olivia St. James: Meeting Notes
Terminology Quiz
WEDNESDAY Day 3
INBOX
Email From Jeff
Email from Rose
THURSDAY
2:00 PM Email from Olivia
FRIDAY
10:00 AM Email from Calvin Hawkins
Weekly Status Report
Weekly Status Report (WSR) _GRC Analyst.docx
Weekly Live Sessions
Zoom Link to Live Coaching Calla
Cybersecurity Basics_Security Awareness Training
What is Cybersecurity?
The CIA Triad: The 3 Pillars of Security
Integrity
Availability
Separation of Duties
Job Rotation and Mandatory Leave
Risk Management Framework (RMF)
Common Roles and Responsibilities
Top Down Approach
Control Frameworks
Due Care and Due Diligence
Compliance
Privacy
Privacy Continued
European Union Privacy Laws
GDPR
Computer Crime
MOM
How Data Breaches Occur
Threats: Virus, Trojan, Logic bomb, Worm, Bot, Rootkit, Spyware, Spam
BIA
Business Continuity Plan (BCP)
Disaster Recovery Sites
Threat Modeling
OWASP
DoS and DDoS Attacks
Man-in-the Middle Attacks
Social Engineering
Types of Social Engineering
Types of security controls
RAT and Backdoor
Adware
Keylogger
Data Protection
Wireless Security
Ports
OS Hardening
Multifactor Authentication
Identifying Authentication Factors
Mobile Security
Social Media
What is Networking?
Networking
Quiz
Security Controls
Security Controls
AC Controls
AC1 to AC25
AC-2_4_.mp4
AC-2_5_with_Evidence.mp4
AC-2_6_.mp4
AC-2_7_.mp4
AC-2_8_AC-2_9_AC-2_10_AC-2_11_AC-2_12_.mp4
AC-3
AC-3.mp4
AC-3_4_.mp4
AC-3_3_.mp4
AC-3_3_ (1).mp4
AC-3_5_.mp4
AC-3_7_Access.mp4
AC-4.mp4
AC-5.mp4
AC-7.mp4
AC-8.mp4
AC-9.mp4
AC-10.mp4
AC-11.mp4
AC-12.mp4
AC-13.mp4
AC-14.mp4
AC-15.mp4
AC-15 (1).mp4
AC-17
AC-18
AC-18 part2
AC-19
AC-20
AC-21
AC-22
AC-23 part 2
AC-23 part 1
PT-1
NIST.SP.800-53Ar5.pdf
SR-3.mp4
PT-2.mp4
SR-2.mp4
PT-2 part2.mp4
PT-4.mp4
SR-4 plus enhancements
PE Controls part1.mp4
Controls that directly deal with encryption.docx
AT-3_4_.mp4
AT-1.mp4
AT-3_5_ (1).mp4
AT-3_5_.mp4
AT-2_6_.mp4
AT-2_5_.mp4
AT-2_1_AT-2_2_.mp4
AT-3.mp4
AT-2_3_AT-2_4_.mp4
Assessment Artifacts
AT-Security Awareness training Screenshot.png
NIST Control Families
AT- Security Awareness certificate.pdf
NIST 800-53 Rev 5
IR- Incident Response Plan_FEA.docx
AC-4__Interconnection Security Agreement v2.docx
This section is
delayed by 30 days.
NIST RMF
Promo Video (REGISTER TO WATCH PREVIEW)
Intro
ISSO SCA and GRC Analyst Cybersecurity Roles
Which Role is Right For me.mp4
Who is an ISSO?
Job Environment
Qualifications
Things you should know
Responsibilities and daily tasks prt1
Responsibilities and daily tasks prt2
Responsibilities and daily tasks prt3
RMF Rev. 2
RMF Continued: Prepare
Prepare
Categorize
Select
Implement
Assess
Authorize
Monitor
Summary
RMF (Driver's License Analogy)
Module One Quiz
This section is
delayed by 30 days.
Certification Support: Security+ or CGRC
The 2 Certifications to Get.mp4
Security Plus Intro.mp4
Security plus Course Objectives.mp4
Security plus Course Objectives 2.mp4
Security plus Course Objectives 3.mp4
comptia-security-sy0-601-exam-objectives-(2-0).pdf
The CGRC Exam intro.mp4
Exam requirements
CGRC Exam Prep
Exam Prep Questions
This section is
delayed by 60 days.
Career Development
RESUME PREP
Developing Your Resume.
Developing Your Resume part 2
Resume Template_for Security Control Assessor
Resume_John Doe_ISSO_.docx
Resume Roles and Responsibilities list.pdf
Resume_John Doe_ISSO_.docx
Resume Template
Using the Roles and Responsibilities List to Update your Resume
FINDING A JOB
Finding a Job
Finding a Job with no Experience
Job Search Sites
Tips on finding a Job
Job Search Sites Indeed
Job Search Sites Glassdoor
Job Market
Background Investigation
INTERVIEW PREP
The Interview
Things to do before you go for an Interview
Interview process
Interview Tips 1st Call
Interview Questions
Interview Questions PDF
Interview Tips 2nd Call
Interview Tips: In-person interview
SALARY NEGOTIATION
Negotiating your Salary.
Researching your Salary
Company Reviews, Salaries on Glassdoor.
This section is
delayed by 90 days.
On The Job Support
Things You Should do in Your First Week
Daily Scrum
Job Stacking
Career Advice Pocket Guide
Lesson unavailable
Please
login to your account
or
buy the course
.