ISG Cyber Network Defense Course

Cyber Network Defense Course

We will add the information about having the new instructor here


Your Instructor


Chase Sutphin
Chase Sutphin

Hi Everyone!


My name is Chase Sutphin and I am a Project manager for ISG as well as the lead instructor for the Cybersecurity Apprenticeship Program. I have been with ISG for a little over 2 years and have helped with developing both the Apprenticeship training as well as the prerequisite trainings that are completed prior to being accepted into CAP.


I have over 15 years experience in IT with more than 10 in Security. I have worked at SMB as well as enterprise level security engineering and design / architecture. My experience includes the use of many vendors but the majority of my security career has been focused on Fortinet.

I'm excited to work with you on the development of you knowledge in security and the industries that surround it.


Please reach out to me if you have any questions regarding my background or the courses that I'm teaching

[email protected]


Course Curriculum


  Lab Handouts
Available in days
days after you enroll
  Initial Entry Quiz
Available in days
days after you enroll
  Scanning the Network on the LAN
Available in days
days after you enroll
  Enumerating Hosts using Wireshark, Windows, and Linux Commands
Available in days
days after you enroll
  Remote and Local Exploitation
Available in days
days after you enroll
  Using the Dark Comet Remote Access Trojan
Available in days
days after you enroll
  Capturing and Analyzing Network Traffic Using a Sniffer
Available in days
days after you enroll
  Using Social Engineering Toolkit
Available in days
days after you enroll
  Performing a Denial of Service Attack from the WAN
Available in days
days after you enroll
  Using Browser Exploitation to take over a Host's Computer
Available in days
days after you enroll
  Attacking Webservers from the WAN
Available in days
days after you enroll
  Exploiting a Vulnerable Web Application
Available in days
days after you enroll
  Performing SQL Injection to Manipulate Tables in a Database
Available in days
days after you enroll
  Breaking WEP and WPA and Decrypting the Traffic
Available in days
days after you enroll
  Attacking he Firewall and Stealing Data Over and Encrypted Channel
Available in days
days after you enroll
  Using Public Key Encryption to Secure Messages
Available in days
days after you enroll
  Overview for Vulnerability Assessment and Creating the Report
Available in days
days after you enroll
  Congratulations!!!!
Available in days
days after you enroll
  Live Class Recordings
Available in days
days after you enroll
  Preparing for an interview
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Get started now!