Course Overview
This course provides a foundational understanding of cybersecurity, covering core security principles, common threats, network protection, cryptography, incident response, risk management, and compliance. Through hands-on labs and real-world scenarios, participants will develop practical skills to prepare for entry-level cybersecurity roles.
Curriculum
- 6 Sections
- 38 Lessons
- 8 Weeks
Expand all sectionsCollapse all sections
- Module 1: General Security Concepts6
- 1.1Core Security Principles (Confidentiality, Integrity, Availability – CIA Triad)
- 1.2Security Controls & Best Practices (Preventative, Detective, Corrective)
- 1.3Authentication, Authorization, and Accounting (AAA)
- 1.4Non-Repudiation & Identity Verification
- 1.5Security Awareness and Training
- 1.6Hands-on Labs: Identifying and implementing basic security controls
- Module 2: Threats, Vulnerabilities, and Mitigations8
- 2.1Threat Actors & Attack Vectors (Hacktivists, Nation-States, Insider Threats)
- 2.2Malware Types & Infection Methods (Viruses, Ransomware, Trojans)
- 2.3Social Engineering Techniques (Phishing, Impersonation, Tailgating)
- 2.4Application Security Risks & Exploits (SQL Injection, XSS, Zero-Day Attacks)
- 2.5Common Network Attacks (Man-in-the-Middle, DDoS, ARP Spoofing)
- 2.6Vulnerability Management (Scanning, Patching, CVE Identification)
- 2.7Hands-on Labs: Conducting a vulnerability assessment
- 2.8Hands-on Labs: Simulating live attacks on virtual machines
- Module 3: Security Architecture7
- 3.1Network Security Design (Segmentation, DMZ, Zero Trust)
- 3.2Secure Cloud & Virtualization Concepts (IaaS, PaaS, SaaS Security)
- 3.3Endpoint & Device Security (IoT, Mobile, BYOD Policies)
- 3.4Data Protection Strategies (Encryption, Masking, Tokenization)
- 3.5Application Security Controls (Secure Coding Practices, Hardening Systems)
- 3.6Hands-on Labs: Configuring network security with firewalls and VLANs
- 3.7Hands-on Labs: Implementing access control security settings
- Module 4: Security Operations7
- 4.1Security & Vulnerability Management (Patching, Log Analysis)
- 4.2Security Monitoring Tools & SIEM (Security Information & Event Management)
- 4.3Incident Response Lifecycle (Preparation, Detection, Containment, Eradication, Recovery)
- 4.4Digital Forensics Fundamentals (Evidence Collection, Chain of Custody)
- 4.5Security Automation & Threat Intelligence
- 4.6Hands-on Labs: Analyzing security logs using SIEM tools
- 4.7Hands-on Labs:Conducting live security scans and attack simulations
- Module 5: Security Program Management & Compliance7
- 5.1Governance & Security Frameworks (ISO 27001, NIST, CIS Controls)
- 5.2Risk Management & Business Continuity Planning (BCP & DRP)
- 5.3Regulatory Compliance & Legal Considerations (GDPR, HIPAA, PCI-DSS)
- 5.4Security Audits & Assessment Techniques
- 5.5Security Awareness Training & Policy Implementation
- 5.6Hands-on Labs: Conducting a security risk assessment
- 5.7Hands-on Labs: Developing a basic security policy document
- Module 6: Cybersecurity Certification Exam Review & Mock Exams3