Skip to content
Skip To Content

jon vallier

husband, father, gamer, IT guy

  • Bio
    • Bio
    • My Rig
    • Privacy Policy
  • Blog
    • Blog
    • Bible
    • Portfolio
    • Indoor Projects
  • Accessibility statement
menu

Category: Continuing Education

Details on workshops, advanced courses, and ongoing learning efforts outside of formal training.

Finished “Scanning and Enumeration with NMAP” on Cybrary.it

September 30, 2021December 2, 2021 Jon Continuing Education, Portfolio
Finished “Scanning and Enumeration with NMAP” on Cybrary.it

NMAP is a powerful tool used by both attackers and defenders to scan networks. In this Scanning and Enumeration with NMAP course, Ken Underhill uses an NMAP lab to demonstrate the process for collecting information on a network using technical tools. Become a more advanced incident handler with this course.

Attended webinar “Cloud security: You’re it!” by SANS Institute

September 29, 2021June 8, 2022 Jon Continuing Education, Portfolio
Attended webinar “Cloud security: You’re it!” by SANS Institute

Finished “Online Reconnaissance” on Cybrary.it

September 27, 2021December 2, 2021 Jon Continuing Education, Portfolio
Finished “Online Reconnaissance” on Cybrary.it

If you’re on the path to becoming an incident handler, you’ll need reconnaissance skills. In this Online Reconnaissance course, Ken Underhill covers the gathering of data through reconnaissance-related labs, with a primary focus on open-source intelligence (OSINT). Examine analysis labs to give you a hands-on overview of information gathering.

Finished “Implementing an Incident Response Plan” on Cybrary.it

September 23, 2021December 2, 2021 Jon Continuing Education, Portfolio
Finished “Implementing an Incident Response Plan” on Cybrary.it

Take your incident response plans to the next level by exploring this “Implementing an Incident Response Plan” course with David Biser. He walks you through incident identification, the incident management process, and how to recover from an incident.

Finished “Incident Response Planning” on Cybrary.it

September 21, 2021December 2, 2021 Jon Continuing Education, Portfolio
Finished “Incident Response Planning” on Cybrary.it

In Incident Response Planning, David Biser describes the different aspects to consider when creating and implementing an incident response plan. These different aspects act as tools that help an organization create a thorough incident response plan.

Finished “Kali Linux Fundamentals” on Cybrary.it

September 15, 2021December 2, 2021 Jon Continuing Education, Portfolio
Finished “Kali Linux Fundamentals” on Cybrary.it

If you’re interested in penetration testing and ethical hacking, then this Kali Linux course is a great place to start your training. Learn about the industry-standard tool for penetration and security testing. This is a foundational course that is designed to provide the basics of Kali distribution, installation, troubleshooting, and navigation.

Attended webinar “Your Network, Under Control” by SANS Institute

August 31, 2021June 8, 2022 Jon Continuing Education, Portfolio
Attended webinar “Your Network, Under Control” by SANS Institute

Attended webinar “Live Hacking Session – Your app is only as secure as your weakest line of code. Shall we hack it?” by SANS Institute

August 25, 2021June 8, 2022 Jon Continuing Education, Portfolio
Attended webinar “Live Hacking Session – Your app is only as secure as your weakest line of code. Shall we hack it?” by SANS Institute

Attended webinar “How does your incident response program stack up?” by SANS Institute

August 11, 2021June 8, 2022 Jon Continuing Education, Portfolio
Attended webinar “How does your incident response program stack up?” by SANS Institute

Finished “Malware Threats” on Cybrary.it

August 9, 2021December 2, 2021 Jon Continuing Education, Portfolio
Finished “Malware Threats” on Cybrary.it

Interested in penetration testing and malware analysis? This malware course introduces you to different types of malware, like viruses, worms, and Trojans. Gain hands-on experience in analyzing malicious files, identifying malicious processes, and more.

Posts navigation

Older posts
Newer posts

Past Posts

Categories

Copyright 2025, Jonathan R. Vallier. All rights reserved. Theme Fotogenic designed by Mysterythemes