+1 325-320-8260
1207 Laurel Lane, Richardson, TX

Cyber Security Training

IronClad Cyber Security Courses

Gain a robust digital and cyber skillset.

The JS2 IronClad Cyber Course is designed to bring a robust digital and cyber skill set to those with any level of computer understanding. Those who take the course will have the choice to learn a range of skills from how computers work to advanced ethical hacking and everything in between. Each student will be prepared for the following certification exams after the completion of the courses: A+, N+, S+ and CEH.

Make your cyber skills IronClad

What skills will you gain?

IronClad Cyber Security training is modular. We use this modular design working with our clients to build a training program to meet the specific needs of each individual client. Modules are chosen by the client to fit their needs, budget and time restraints.

View the course options below and then contact us for a consultation. We’ll help put together the perfect package for you and your organization.

How Computers Work

2 Week Course

Begin your cyber security training with the fundamental aspects of computers. This course includes lessons in everything from computer history to hardware to an introduction to programming.

Participants will learn:
  • Computer History
  • Computer Architecture
  • Logic Fundamentals
  • Hardware Design Basics
  • Memory/ Data Types
  • Introduction to Programming
When is this useful?

Description of who and why they should attend course.

Computer Repair

2 Day Course

Computer security is about more than just combatting cyber attacks. A professional in cyber security must know the difference between a normal breakdown and an attack. This course teaches the basics of computer setup, repair and account management.

Participants will learn:
  • Computer Anatomy
  • Computer Construction
  • Hardware Repair
  • Windows Installation and Setup
  • OS Troubleshooting and Tune-up
  • Malware/ Spyware Removal
  • Password and Account Management
When is this useful?

Description of who and why they should attend course.

Virtualization

3 Day Course

Virtualization is fundamental to a career in cyber security. To run a modern hack lab, you must be able to deal with cloud computing and virtual servers. These fundamental skills are taught in this course.

Participants will learn:
  • Introduction to Cloud Computing
  • Sharing Files with Web Sevices
  • Introduction to Virtualization
  • Virtualization Infrastructure and Design
  • Type 1 Hypervisor Virtualization
  • Bare Metal Virtual Servers
  • VirtualBox for Virtualization
  • Introduction to VMWare ESXi Virtualization
When is this useful?

Description of who and why they should attend course.

Windows OS

1 Week Course

Hacking depends on finding, exploiting and/or mitigating Windows security flaws. This course give you an in depth understanding of the Windows Operating System.

Participants will learn:
  • Windows Components
  • Windows Internals
  • User Managemenr
  • Building your Own Network for a Computer Lab
  • Introduction to Windows Server 2012
  • Installing Windows Server 2012
  • Navigation in Windows Server 2012
  • Microsoft Foundation Classes and Applications
When is this useful?

Description of who and why they should attend course.

Linux

8-10 Day Course

Linux is most suited for launching exploits and somewhat resistant to counter attack. This course teaches you how to use this system to operate your cyber security lab.

Participants will learn:
  • Installing and Navigating Linux
  • Basic Linux Tasks
  • VIM for File Editing
  • SSH and FTP for Remote Administration
  • Linux Network Configuration
  • Users, Groups and Permissions in Linux
  • Linux Backup with TAR and Cron Jobs
  • Introduction to Using Squid Web Proxy Server
When is this useful?

Description of who and why they should attend course.

Networking

5 Day Course

If you can’t define the network you cannot defend it! Security professionals have to be better at network technology than the people who set it up. Learn to define and use networks to your advantage. This includes Internet protocols, troubleshooting, IPs and more.

Participants will learn:
  • Networking Fundamentals
  • Switches / Router and Network Hardware
  • OSI Stack
  • Network Services
  • Fun with IPs
  • The Protocols
  • Trouble Shooting
  • Exploits
When is this useful?

Description of who and why they should attend course.

Security and Hardware

8-10 Day Course

Now that you know fundamentals, you can learn the basics of digital and cyber security down to the hardware.

Participants will learn:
  • Introduction to Computer Security
  • Introduction to Backup Systems
  • Introduction to RAID
  • Introduction to Risk Assessment
  • Practical Risk Assessment and Mitigation
  • Physical, operational and Environmental Security
  • User Account Security Theory
  • CloudFare for Website Security and Management
When is this useful?

Description of who and why they should attend course.

Data Recovery

5 Day Course

Often security professionals are asked to digitally reconstruct a hack, or use digital forensics to investigate. This course teaches you how to recover information on many levels.

Participants will learn:
  • Introduction to data recovery
  • Recover Deleted Files
  • Data Recovery Devices
  • The Business of Data Recovery
  • Using Acronis Disk Imaging Software for Data Recovery
  • Dedicated Data Recovery Computer
  • Using a Hard Drive Enclosure for Data Recovery
When is this useful?

Description of who and why they should attend course.

Hacking Basics

10 Day Course

Finally the unit you have been waiting for, “hacking.” We shall begin to explore the tools and techniques for exploiting security vulnerabilities.

Participants will learn:
  • Introduction to Hacking
  • Introduction to Practical Hacking and Penetration Testing
  • Building a Virtual Computer Lab with VirtualBox for Penetration Testing and Hacking Tests
  • Hacking to Harvest User Login Credentials Off of the Network for Web Services Using Subterfuge
  • Hacking to Acquire Passwords from HTML Forms Password Boxes
  • Hacking the Windows Registry
  • Hacking DNS
  • Introduction to Kali
  • Introduction to Metasploit for Penetration Testing and Hacking
When is this useful?

Description of who and why they should attend course.

Hacking Initialization

10 Day Course

Basic Description of Course

Participants will learn:

Course Objectives

When is this useful?

Description of who and why they should attend course.

Social Media Exploitation

2 Week Course

Basic Description of Course

Participants will learn:

Course Objectives

When is this useful?

Description of who and why they should attend course.

JS2 Application Development LLC is dedicated to supporting veterans entering the workforce. In this endeavor, this course will be provided to veterans at a lower cost with the help of supporting and partnering businesses. Veterans taking the course will have the opportunity to apply for an internship at participating businesses at the completion of their coursework.


    Fill Out the Form



    For Your Cyber Security Training Consultation

    Your Name (required)

    Your Email (required)

    Choose Courses of Interest (required)

    How Computers WorkComputer RepairVirtualizationWindows OSLinuxNetworkingSecurity and HardwareData RecoveryHacking BasicsHacking InitializationSocial Media Exploitation

    Do you have any questions or comments?