Course Overview
This track training program combines foundational cybersecurity knowledge to prepare participants for real-world security roles and certifications. Over 8-10 weeks, learners will build expertise in security principles, threat detection, incident response, and compliance—paired with hands-on mastery. The curriculum includes labs, mock exams, and job-readiness support to help participants launch or advance a cybersecurity career with a specialization in cybersecurity analyst tools.
Requirements
- Windows 11, 8-16gb RAM recommended
Curriculum
- 6 Sections
- 38 Lessons
- 8 Weeks
Expand all sectionsCollapse all sections
- Module 1: General Security Concepts6
- 1.1Core Security Principles (Confidentiality, Integrity, Availability – CIA Triad)
- 1.2Security Controls & Best Practices (Preventative, Detective, Corrective)
- 1.3Authentication, Authorization, and Accounting (AAA)
- 1.4Non-Repudiation & Identity Verification
- 1.5Security Awareness and Training
- 1.6Hands-on Labs: Identifying and implementing basic security controls
- Module 2: Threats, Vulnerabilities, and Mitigations8
- 2.1Threat Actors & Attack Vectors (Hacktivists, Nation-States, Insider Threats)
- 2.2Malware Types & Infection Methods (Viruses, Ransomware, Trojans)
- 2.3Social Engineering Techniques (Phishing, Impersonation, Tailgating)
- 2.4Application Security Risks & Exploits (SQL Injection, XSS, Zero-Day Attacks)
- 2.5Common Network Attacks (Man-in-the-Middle, DDoS, ARP Spoofing)
- 2.6Vulnerability Management (Scanning, Patching, CVE Identification)
- 2.7Hands-on Labs: Conducting a vulnerability assessment
- 2.8Hands-on Labs: Simulating live attacks on virtual machines
- Module 3: Security Architecture7
- 3.1Network Security Design (Segmentation, DMZ, Zero Trust)
- 3.2Secure Cloud & Virtualization Concepts (IaaS, PaaS, SaaS Security)
- 3.3Endpoint & Device Security (IoT, Mobile, BYOD Policies)
- 3.4Data Protection Strategies (Encryption, Masking, Tokenization)
- 3.5Application Security Controls (Secure Coding Practices, Hardening Systems)
- 3.6Hands-on Labs: Configuring network security with firewalls and VLANs
- 3.7Hands-on Labs: Implementing access control security settings
- Module 4: Security Operations7
- 4.1Security & Vulnerability Management (Patching, Log Analysis)
- 4.2Security Monitoring Tools & SIEM (Security Information & Event Management)
- 4.3Incident Response Lifecycle (Preparation, Detection, Containment, Eradication, Recovery)
- 4.4Digital Forensics Fundamentals (Evidence Collection, Chain of Custody)
- 4.5Security Automation & Threat Intelligence
- 4.6Hands-on Labs: Analyzing security logs using SIEM tools
- 4.7Hands-on Labs:Conducting live security scans and attack simulations
- Module 5: Security Program Management & Compliance7
- 5.1Governance & Security Frameworks (ISO 27001, NIST, CIS Controls)
- 5.2Risk Management & Business Continuity Planning (BCP & DRP)
- 5.3Regulatory Compliance & Legal Considerations (GDPR, HIPAA, PCI-DSS)
- 5.4Security Audits & Assessment Techniques
- 5.5Security Awareness Training & Policy Implementation
- 5.6Hands-on Labs: Conducting a security risk assessment
- 5.7Hands-on Labs: Developing a basic security policy document
- Module 6: Cybersecurity Certification Exam Review & Mock Exams3
Our training helps prepare you for the CompTIA Sec+ and Splunk Power User certifications. We have mock exams for both courses.
This service includes mock interviews and up to 20 job applications on your behalf, share your resume with recruiters.