Training

Our unique training experience provides immediate value as we train you in real life scenarios.

One size does not fit all. Every training session is slightly different as technology changes constantly and all trainees are unique in their abilities.

Get customized training catered to your needs with skills useful in real life situations, problems and troubleshooting.

This is unlike any training institute or online courses that target everyone and where the material doesn't change for years! There are many good options for "industry standard" training. But those will train you for certifications purposes.

We do not believe in death by powerpoint. All our training is full of interaction, white boarding, demonstrations and examples, the way real learning is achieved.

Being customized and catered to YOUR needs, you would think that it would be more expensive than conventional training institutes. But that's not the case. We've managed to provide far superior value at a much lesser price as we believe in proper education that's useful.

Core Differentiators

  • ipconfigz Training
  • Cost Effective
  •  Customized
  • Real-Life Focused
  • Vendor Neutral
  • Homely Environment
  • Flexible Hours/Days
  • Constantly Updated
  • Free Supplemental Materials
  • Popular Training
  • Expensive
  •  Generic
  • Exam Focused
  • Vendor Locked
  • Formal Classroom
  • Crammed 5 days
  • Same Material for years
  • No follow-ups

Courses


  • Cyber Security
    Awareness
  •  Know how a hacker hacks [Demo]
  •  Protect yourself from attacks
  •  Learn the terminology
  •  Common Techniques
  •  Prevention is better than cure
  • Details

  • Practical
    Privacy
  •  Stay Anonymous
  •  Prevent Data Leakage
  •  Stop websites tracking you
  •  Remove breadcrumb trails
  •  Become invisible
  • Details

  • Real Life
    Networking
  •  Lots of technology
  •  Best practices
  •  Designing for scale
  •  Troubleshooting techniques
  •  Life of a packet
  • Details

Cyber Security Awareness Training

Everyone is vulnerable

Security touches everything. This course is designed for everyone, from sales, marketing, HR, doctors, lawyers, to IT.

Unlike most other trainings, we will not kill you by powerpoint! [We may drug you a bit though]
It is full of practical, real life scenarios with live hacker demonstrations, screenshots, volunteer interactions and donuts!

This course is meant to open your eyes on how easy it is to fall prey to Cyber Criminals.
We will demonstrate hacker techniques and educate on the basics on how to protect yourself without jumping into any advanced topics.

Course Includes:

  • 1.5-2 hours on-site presentation, demos, examples
  • Focus group of up to 15 individuals per sessions
  • Training follow-ups: Short monthly emails to refresh important topics for 12 months

 

Topics covered include:

  1. The Target
  2. Hacker Techniques
    • Information Gathering
    • Dumpster Diving
    • Shoulder Surfing
    • Phishing/Spear Phishing (email)
    • Vishing (phone)
    • Social Engineering (human vulnerability)
    • Viruses, Worms, Trojans, Backdoors
    • Ransomware
  3. Data Leakage
  4. Social Networks
  5. Personal Devices
  6. Physical Security
    • Preventing Tailgating
  7. Internet Security
    • Safe Browsing
    • VPN, Email Encryption, HTTPS/SSL
  8. Secure Apps
  9. Passwords
    • Password Managers
    • Best-Practice Password Guidelines
    • Multi-Factor Authentication
    • RSA tokens
  10. Protection from Information Gathering
    • PII (Personally Identifiable Information)
    • Data Destruction (paper and bits)
    • Social Media
    • Browsing
    • Scams
    • Encryption
  11. Device Security (Laptop/Mobile)
    • Patches, Antivirus
    • Safe USB Drive Handling
  12. Policies/Standards/Frameworks
    • BYOD
    • Security Framework/Compliance (HIPAA, SOX, PCI, ISO27001, NIST CSF, SANS CIS 20)
    • Appropriate Use
    • Ethics
  13. Hacked
    • Reporting Incidents
  14. Backup Strategy (3-2-1)
  15. Insider Threat
  16. Cloud Services
  17. Computer Best Practices
    • Travel Security
    • Wifi Hotspots
    • Make security a "habit"

Strengthening the 1st line of defense

Practical Privacy

If the product is free, you are the product.

This course will open your eyes as to how much information there is out there about you and how most people are unaware of it.
  • We'll help you identify your online data, and help get rid of it.
  • We'll teach you habits and techniques to keep it safe.
 

Practical Privacy

  • Security vs Privacy
  • Open Source Intelligence (OSINT)
  • Self Background Check
  • Credit Bureaus, Opt-outs
  • Data Miners/Brokers (Marketeers)
  • Tracking: Plugins, cookies, IP addresses, GPS, routers, browser fingerprinting
  • Applications
  • Malware
  • VPN
  • TOR
  • Encrypted emails, chat, calls
  • Burner Credit Cards, emails, mobile numbers
  • Social Engineering
  • Data leakage, scrubbing & protection
  • Physical Security
  • Trusts, LLCs
  • Obfuscation
  • Laws, NSA, spying, WikiLeaks
  • Remain Anonymous
     
  "...every single time somebody has said to me, 'I don't really worry about invasions of privacy because I don't have anything to hide,' I always say the same thing to them. I get out a pen. I write down my email address. I say, 'Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing anything wrong, you should have nothing to hide.' Not a single person has taken me up on that offer. I check that email account religiously all the time. It's a very desolate place." - Glenn Greenwald (TED Talks)

Real Life Networking

A holistic approach to solving problems

As the name suggests, this course will include practical scenarios that a network admin experiences on a regular basis. Networking is a pretty broad topic and touches almost all the IT components in an organization. This is a Jack-of-all Traits course! We try to clear up the basic concepts without jumping into advanced topics. Once your base is strong and you have a firm grasp of the technology, then advanced learning is mostly self-taught and interest-based. Topics covered include:

  • Networking Components
    • Hubs, Switches, Routers, Firewalls
    • WLCs, APs, mobiles, workstations, IoT devices
    • Servers and Applications
  • Switching Concepts
    • Segmentation (VLAN), IP Addressing
    • DHCP, ARP, DNS
    • L2 vs L3 switches
  • Routing
    • Static vs dynamic
    • Inter-VLAN routing
    • WANs, telecom providers
  • Security
    • Switch security
    • Protect your protocols
    • Encryption
    • Firewall concepts (NAT/PA, ACLs, VPNs)
    • NAC
    • Authentication (Active Directory, Certificates, RADIUS)
    • Content Filtering
    • IDS/IPS
    • Malware Protection
  • Wireless
    • Components, terminology
    • 802.11 standards
    • Antennas, Types of interferences
    • Protection, Encryption, Hacking
    • Troubleshooting
  • VoIP, Video, IM
    • Terminology
    • The need for QoS
  • Virtualization: Hypervisors
  • Introduction to Storage
  • Monitoring/Management Tools
  • Troubleshooting Tools
  • Life of a Packet
    • Packet walkthrough from starting ur computer to getting information [This is your exam!]

 


This course in no way is a replacement to formal industry certifications like CCNA, Network+, CCIE, etc. This should be taken as a baseline. It will target 80% of what you will be doing in real life, unlike most vendor certifications which teach you a lot of theory, of which you end up utilizing 20% of in an actual network.