Registration Submitted
Final Step: Payment

Once you submit your payment we will get you started immediately with the prep exercises.
Buy Now
Hero banner
Questions? Email admissions@evolvesecurity.com or schedule a call to chat with a member of our team.

Students are expected to be well versed with the basics of computer science, familiar with computer networks and networking concepts, and comfortable working with Linux systems and the command line. Basic understanding of these skills are required before the start of the program so please review the areas you are not as strong in.

Informational

Webinar

Learn how the Penetration Testing Advanced Track is delivered.

Have

Questions?

We are available to answer any questions you have.

Free Online Introductory Training

Fundamentals of Cybersecurity

Everything you need to get started in cybersecurity
Enroll Today

Getting Started

Start here if you are just getting started and have minimal to no experience with technology but are passionate about learning. You have to start somewhere so let's start digging in!

Computer Science

Computer Science 101 (Self-Paced) through Stanford University online is a great place to start to get familiar with computer basics.

Networking

1. Internet Basics - What is the Internet? - Watch all 8 videos

2. Network+ Study Guide on Udemy by Mike Myers
Concentrate on the following modules:

  • Network Models
  • TCP/IP Basics
  • Routing
  • TCP/IP Applications
  • Network Naming
  • Securing TCP/IP

3. TCP / IP Protocols and Ports

4. TCP / IP Guide
Concentrate on the following modules:

Linux Command Line

Evolve spends a lot of time on the command line in Linux. The more practice you have navigating the file directory will better prepare you to be a cybersecurity professional.

1. Get started with the Linux Command Line

Preparing For the Bootcamp

Complete the exercises below to best prepare yourself before the start of the bootcamp.

Networking

1. Network+ Study Guide on Udemy by Mike Myers
Complete all modules

2. An Introduction to Computer Networks
This is a lot of reading but provides in-depth explanations of networking concepts. Read through the following sections.

  • 1 - An Overview of Networks (ALL)
  • 2.4 - Ethernet Switches
  • 2.6 - Virtual LAN (VLAN)
  • 3.1 - Virtual Private Networks
  • 3.7 - Wi-Fi
  • 7.1 - The IPv4 Header
  • 7.2 - Interfaces
  • 7.3 - Special Addresses
  • 7.3.1 - Multicast addresses
  • 7.6 - IPv4 Subnets (ALL)
  • 7.7 - DNS (ALL)
  • 7.8 - Address Resolution Protocol: ARP (ALL)
  • 7.1 - The IPv4 7.9 - Dynamic Host Configuration Protocol (DHCP) (ALL)
  • 7.10 - Internet Control Message Protocol (ALL)
  • 8.2 - IPv6 addresses
  • 10.1 - Classless Internet Domain Routing: CIDR
  • 10.6 - Border Gateway Protocol, BGP
  • 11.1 - User Datagram Protocol – UDP
  • 11.1.3 - netcat
  • 11.2 - Fundamental Transport Issues
  • 12 - TCP Transport
  • 12.1 - The End-to-End Principle
  • 12.2 - TCP Header
  • 12.3 - TCP Connection Establishment
  • 12.4 - TCP and WireShark

3. TCP / IP Guide
Again, this is a lot of reading but provides a deeper dive into TCP / IP. Read through the following sections.

Linux Command Line

Start using the command line on your personal operating system or challenge yourself on some of these more advanced command line challenges.

1. Practice the Command Line on your Personal Operating
System (OS) to navigate the file directory

  • For MacOS users: Use the native Terminal application
  • For MacOS or Windows users: Use Virtual Machine software and download your own version of Kali Linux
  • For Windows users: Download PuTTY client to be able to access. Over the Wire bandit wargames

Computer Science

Intro to Python - Python is a simple but powerful language and will be used throughout the program so get familiar with the basics. It is not required that you go through the whole python course, but feel free to do so.

Immerse yourself in everything Cybersecurity

Networking Events: People hire people not pieces of paper so get out there and meet experts who are in the field.

Recommended blogs and podcasts: Make security news a part
of your everyday routine.