Log in / Sign Up
  • Courses

    Popular Categories

    • Cybersecurity
    • Data Science
  • FAQ
  • ApplyForYou
  • Profile
    • Register
    • Login
  • Contact Us

Call us

+1 (484) 840 3308

NextGen Digital Academy
  • Courses

    Popular Categories

    • Cybersecurity
    • Data Science
  • FAQ
  • ApplyForYou
  • Profile
    • Register
    • Login
  • Contact Us
0

No products in the cart.

0

Cybersecurity Analyst

Curriculum

  • 6 Sections
  • 38 Lessons
  • 8 Weeks
Expand all sectionsCollapse all sections
  • Module 1: General Security Concepts
    6
    • 1.1
      Core Security Principles (Confidentiality, Integrity, Availability – CIA Triad)
    • 1.2
      Security Controls & Best Practices (Preventative, Detective, Corrective)
    • 1.3
      Authentication, Authorization, and Accounting (AAA)
    • 1.4
      Non-Repudiation & Identity Verification
    • 1.5
      Security Awareness and Training
    • 1.6
      Hands-on Labs: Identifying and implementing basic security controls
  • Module 2: Threats, Vulnerabilities, and Mitigations
    8
    • 2.1
      Threat Actors & Attack Vectors (Hacktivists, Nation-States, Insider Threats)
    • 2.2
      Malware Types & Infection Methods (Viruses, Ransomware, Trojans)
    • 2.3
      Social Engineering Techniques (Phishing, Impersonation, Tailgating)
    • 2.4
      Application Security Risks & Exploits (SQL Injection, XSS, Zero-Day Attacks)
    • 2.5
      Common Network Attacks (Man-in-the-Middle, DDoS, ARP Spoofing)
    • 2.6
      Vulnerability Management (Scanning, Patching, CVE Identification)
    • 2.7
      Hands-on Labs: Conducting a vulnerability assessment
    • 2.8
      Hands-on Labs: Simulating live attacks on virtual machines
  • Module 3: Security Architecture
    7
    • 3.1
      Network Security Design (Segmentation, DMZ, Zero Trust)
    • 3.2
      Secure Cloud & Virtualization Concepts (IaaS, PaaS, SaaS Security)
    • 3.3
      Endpoint & Device Security (IoT, Mobile, BYOD Policies)
    • 3.4
      Data Protection Strategies (Encryption, Masking, Tokenization)
    • 3.5
      Application Security Controls (Secure Coding Practices, Hardening Systems)
    • 3.6
      Hands-on Labs: Configuring network security with firewalls and VLANs
    • 3.7
      Hands-on Labs: Implementing access control security settings
  • Module 4: Security Operations
    7
    • 4.1
      Security & Vulnerability Management (Patching, Log Analysis)
    • 4.2
      Security Monitoring Tools & SIEM (Security Information & Event Management)
    • 4.3
      Incident Response Lifecycle (Preparation, Detection, Containment, Eradication, Recovery)
    • 4.4
      Digital Forensics Fundamentals (Evidence Collection, Chain of Custody)
    • 4.5
      Security Automation & Threat Intelligence
    • 4.6
      Hands-on Labs: Analyzing security logs using SIEM tools
    • 4.7
      Hands-on Labs:Conducting live security scans and attack simulations
  • Module 5: Security Program Management & Compliance
    7
    • 5.1
      Governance & Security Frameworks (ISO 27001, NIST, CIS Controls)
    • 5.2
      Risk Management & Business Continuity Planning (BCP & DRP)
    • 5.3
      Regulatory Compliance & Legal Considerations (GDPR, HIPAA, PCI-DSS)
    • 5.4
      Security Audits & Assessment Techniques
    • 5.5
      Security Awareness Training & Policy Implementation
    • 5.6
      Hands-on Labs: Conducting a security risk assessment
    • 5.7
      Hands-on Labs: Developing a basic security policy document
  • Module 6: Cybersecurity Certification Exam Review & Mock Exams
    3
    • 6.1
      Exam Structure & Question Format
    • 6.2
      Practice Questions & Answer Explanations
    • 6.3
      Full-Length Mock Exam & Review Session
This content is protected, please login and enroll in the course to view this content!
Threat Actors & Attack Vectors (Hacktivists, Nation-States, Insider Threats)
Prev
Social Engineering Techniques (Phishing, Impersonation, Tailgating)
Next

ABOUT

  • About
  • Contact
  • Refund
  • Privacy Policy

Courses

  • Cybersecurity
  • Data Science

© 2024 NGDA. All Right Reserved.

  • Courses
  • Privacy Policy
  • About
  • Refund Policy
  • FAQ