starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Certifications
  2. >
  3. CyberWarrior Certification Program

CyberWarrior Certification Program

Understanding how cybersecurity works is a key skill in technology today. Whether you are a full stack developer, a business professional, or a young professional looking to specialize in cybersecurity, this professional certification provides you with the essential foundational security skills you will need. This includes helping you to understand and implement Wireshark, defensive strategies, building a cyber range, penetration testing, intrusion analysis and intrusion handling, among other things.
Kevin Cardwell
Kevin Cardwell
Cybersecurity | core | 5 hours 30 minutes

    Discussions

Overview

3.8KSTUDENTS*
96%RECOMMEND*

This journey includes:

  • 6+ hours of on-demand video
  • 8 modules
  • Core level
  • Direct access/chat with the instructor
  • 100% self-paced online
  • Many downloadable resources
  • Shareable certificate of completion
Understanding how cybersecurity works is a key skill in technology today. Whether you are a full stack developer, a business professional, or a young professional looking to specialize in cybersecurity, this professional certification provides you with the essential foundational security skills you will need. This includes helping you to understand and implement Wireshark, defensive strategies, building a cyber range, penetration testing, intrusion analysis and intrusion handling, among other things.

Skills You Will Gain

Cybersecurity
Hacking
Intrusion Analysis

Learning Outcomes (At the end of this program you will be able to)

  • Articulate the fundamental issues in cybersecurity today
  • Understand the key tools available in Wireshark for security
  • Explain and apply essential cybersecurity defensive strategies
  • Build a “Cyber Range”
  • Discuss penetration testing
  • Describe intrusion analysis
  • Appreciate and conduct intrusion handling

Who Should Attend

  • Security professionals
  • Others involved in maintaining IT security protocols within an organization

Curriculum

Experts

Frequently Asked Questions

How much do the courses at Starweaver cost?

We offer flexible payment options to make learning accessible for everyone. With our Pay-As-You-Go plan, you can pay for each course individually. Alternatively, our Subscription-Based plan provides you with unlimited access to all courses for a monthly or yearly fee.

Do you offer any certifications upon completion of a course at Starweaver?

Yes, we do offer a certification upon completion of our course to showcase your newly acquired skills and expertise.

Does Starweaver offer any free courses or trials?

No, we don't offer any free courses, but we do offer 5-day trial only on our subscriptions-based plans.

Are Starweaver's courses designed for beginners or advanced students?

Our course is designed with three levels to cater to your learning needs - Core, Intermediate, and Advanced. You can choose the level that best suits your knowledge and skillset to enhance your learning experience.

What payment options are available for Starweaver courses?

We accept various payment methods such as major credit cards, PayPal, wire transfer, and company purchase orders. For more information related to payments contact customer support.

Do you offer refunds?

Yes, we do offer a 100% refund guarantee for our courses within a specified time frame. If you are not satisfied with the course, contact our customer support team to request a refund with your order details. Some restrictions may apply.

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
Becoming a Cyber Warrior Certification Program

Becoming a Cyber Warrior Certification Program

Part 1: Becoming a Cyber Warrior Certification Program

This course provides you key skills of cybersecurity including: Building a Security Skills Foundation; Leveraging Wireshark for Security; Essential Defensive Strategies; Building a Cyber Range; Penetration Testing; & Intrusion Analysis and Handling.

1Welcome!
2LiveLabs
3Developing Security Skills - Skill Deficiencies
4Leveraging Wireshark for Security
5Essential Defensive Strategies
6Building a Cyber Range
7Penetration Testing
8Intrusion Analysis
9Intrusion Handling
Kevin Cardwell

Kevin Cardwell

Kevin Cardwell is a cybersecurity expert with extensive experience working with banks and financial institutions across the Middle East, Europe, and the UK. A former leader of a U.S. Department of Defense Red Team, he achieved an impressive 100% success rate in system compromise operations, demonstrating unparalleled expertise in identifying and exploiting vulnerabilities.

Kevin has led high-impact consulting projects, including engagements with Petroleum Development Oman and the Central Bank of Oman. His work includes the design and implementation of customized security baselines for high-profile clients such as Oman Airport Management Company (OAMC), ensuring resilient protection for critical infrastructure.

He is the author of several acclaimed cybersecurity courses and publications, including Building Virtual Pentesting Labs for Advanced Penetration Testing and Advanced Penetration Testing for Highly Secured Environments, 2nd Edition. His areas of specialization include advanced penetration testing, network defense, and security architecture.

As President of Cyber2Labs and Lead Consultant at CESI, Kevin continues to shape the cybersecurity landscape, helping organizations build strong digital defenses against emerging threats. He holds certifications such as Certified Advanced Network Defender and Certified Advanced Penetration Tester, underscoring his commitment to excellence in information security.

In addition to his hands-on expertise, Kevin is a passionate educator and instructor, dedicated to equipping learners with the knowledge and practical skills necessary to navigate the complex world of cybersecurity with confidence. He actively promotes cutting-edge cybersecurity practices and is a trusted voice in the field for both professionals and organizations.

VIEW MY CHANNEL

Network Protocols

ARP Address Resolution Protocol

DNS Domain Name System

TFTP Trival File Transfer Protocol

TCP-Transmission Control Protocol

TCP Data Flow

Demo Wireshark

Lab - IP Header

Lab - Client to Server

Lab - Sessions

Lab - Filters

Developing Security Skills Skill Deficiencies

Security Skills Command Line Code TCP IP

Typical Security Model Security Posture Security Policy

Network Protocols Transport Protocols

Flow Of Data

Unix And Linux

Virtualization

Lab - Command Line

Lab - Security Model

Lab - Protocol Analysis

Lab - Allow a Service

About this course: Overview, Learning Outcomes, Prerequisites & Target Audience

Instructor Bio: Kevin Cardwell

A message from your instructor

Key pointers for success in this course

Vulnerability Sites Lab Virtual Machines

Virtual Machine Creation Components Of Virtual Network

More Components

Network Security Toolkit Folders Planning

Virtual Design Replying Captured Traffic

Demo Just A Part

Lab - Routing

Lab - Routing part two

Lab -Install DHCP

Lab - Configure DHCP Server

LiveLab - 001 - Building a Cyber Range

LiveLab - 002 - Intrusion Analysis (Resources at: https://bit.ly/3fj4fVF)

LiveLab - 003 - TCP/IP

LiveLab - 004 - UNIX-LINUX

LiveLab - 005 - Virtualization and Introduction to the Hacking Mindset

LiveLab - 006 - Vulnerability Management

Penetration Testing Unveild

Security Testing Plan Abstract Methodology

Non Intrusive

Google Hacking Basics Intrusive Exploit

Pentest Framework Sample Architecture

Detailed Findings Conclusion

Demo

Lab - Domain Lookup

Lab - DNS Enum

Lab - Nmap

Lab - Nmap against defenses

Intrusion Detection

Functions Of IDS

Under Attack

Stop The Attack Intrusion Prevention

Types Of IPS

Identifying The OS Methodology Of Network Analysis

Demo

Lab - Data Analysis

Lab - Basic Attacks

Lab - SMB

Lab - Advanced Attacks

Filter Session Content Interface Customization

Statistics

Computer Incidents

Establishing A Computer Forensic Methodology-I

Establishing A Computer Forensic Methodology-II

TMI Good And The Bad

The Bad And The Ugly

Vulnerability Management

Ingress Egress Filtering

Secure Network Architectures

Lab - Vulnerability Sites

Lab - Nmap Vulnerability Scripts

Lab - OpenVAS

Lab - Nessus