0 1 00:00:14,660 --> 00:00:21,890 Hello my name is Bassam Alkaff and I have worked in the field of I.T. for more than 15 years. 1 2 00:00:23,000 --> 00:00:32,120 I specialize in networking and information security and hold several certifications such as CCDP CCNP 2 3 00:00:32,520 --> 00:00:39,730 in routing and switching, security, service provider,VCP, and ITILv3. 3 4 00:00:39,800 --> 00:00:49,710 I have trained in I.T. training centres like APTECH, New Horizons, ExecuTrain, and Ultimate-STC. It is estimated 4 5 00:00:50,070 --> 00:00:57,510 that there will be about 1.5 million unfilled jobs in cyber security by the year 5 6 00:00:57,510 --> 00:00:58,670 2020. 6 7 00:00:59,010 --> 00:01:06,000 A more recent statistic increased this number for cyber security unfilled jobs to be 3.5 7 8 00:01:06,000 --> 00:01:11,310 million by the year 2021. 8 9 00:01:11,310 --> 00:01:18,840 In addition, recent article highlights Cisco Systems intention to become a cyber security force. 9 10 00:01:18,840 --> 00:01:27,270 For these reasons, Cisco created the CCNA Cyber Ops certification, which can become one of the most certifications 10 11 00:01:27,300 --> 00:01:30,150 in demand in the near future. 11 12 00:01:30,660 --> 00:01:37,590 Furthermore, Cisco created a scholarship program for this certification, which emphasis its importance.  12 13 00:01:41,680 --> 00:01:49,180 In this course you will learn about the tools that you can use for your study of the CCNA Cyber Ops certification 13 14 00:01:50,020 --> 00:01:56,530 Learning the theory side is important, but the hands on side is more important, since the main purpose 14 15 00:01:56,530 --> 00:02:00,250 of your study is to apply your knowledge in production, and 15 16 00:02:00,340 --> 00:02:09,480 since your hands on will enforce your theory knowledge. You can not teach someone how to drive a car by 16 17 00:02:09,480 --> 00:02:15,330 showing him or her how to do it, but you have to let him try and practice how to do that. 17 18 00:02:16,200 --> 00:02:23,430 Furthermore, showing you hands on labs and how to use tools without teaching you how to create these labs 18 19 00:02:23,520 --> 00:02:30,320 and install these tools, might not give you the ultimate benefit from your study. 19 20 00:02:30,330 --> 00:02:37,590 For this reason, I have created this course to teach you how to 20 21 00:02:37,590 --> 00:02:44,700 create your own home labs, and to understand the core usage and important features of the tools used in them. 21 22 00:02:44,760 --> 00:02:52,980 I believe in the saying: "Give a man a fish and you feed him for a day; teach a man to fish and 22 23 00:02:52,980 --> 00:02:55,280 you feed him for a lifetime. 23 24 00:02:57,990 --> 00:03:03,850 If you have access to online labs, such as that offered by Cisco through their scholarship 24 25 00:03:04,330 --> 00:03:11,210 you still need to know how to create your own home labs to continue practicing and experimenting. 25 26 00:03:11,500 --> 00:03:15,620 which is what this course will help you to achieve. 26 27 00:03:15,730 --> 00:03:23,050 On the other hand, this course will prepare you to go through these online labs quickly, and with confidence, 27 28 00:03:23,370 --> 00:03:30,670 since you will be familiar with the tools used in them.  And not just online labs, but any other hands 28 29 00:03:30,670 --> 00:03:32,890 on Cyber Ops courses. 29 30 00:03:32,950 --> 00:03:37,300 like what I intend to publish in the near future. 30 31 00:03:40,030 --> 00:03:44,280 This course will teach you how to use the following tools: 31 32 00:03:44,510 --> 00:03:53,520 1.Security Onion 2.Wireshark 3. Kali Linux 4. Metasploit 5. Nmap 6. VirtualBox and 7. GNS3. 32 33 00:03:53,680 --> 00:04:01,140 I hope that you will join me in this course and start your Cyber security journey. Happy learning!