top of page

High-level
Course outline

This course outline provides a comprehensive, hands-on approach to mastering cybersecurity fundamentals, advanced tools, threat management, and essential real-world skills for a successful career in cybersecurity.

Cybersecurity Fundamentals

Overview of Cybersecurity: Understanding key concepts, importance, and terminologies.
Cybersecurity Landscape: Exploring historical trends and future directions.
Fundamental Principles: Covering Confidentiality, Integrity, and Availability (CIA Triad), along with risk management.
Lab: Real-world examples of cybersecurity breaches and threat analysis.

Secure Network Architecture and Cloud Security

Network Architecture: Designing secure infrastructure with firewalls, DMZs, and VPNs.

Cloud Security: Understanding cloud service models, addressing security challenges, and best practices.

Lab: Setting up a basic secure network environment, including firewall

Understanding Security Tools

SIEM and EDR: Functions, benefits, and use cases.

SOAR and CASB: Integrating and automating security operations.

Data Protection: Data Loss Prevention (DLP) and Secure Web Gateway (SWG).

Lab: Configuring and using SIEM and EDR tools to detect and respond to threats.

Threats, Attacks, and Vulnerabilities

Threat Types: Including malware, phishing, DDoS attacks, Etc.

Vulnerability Management: Identification, assessment, and mitigation.

Lab: Case studies on real-world security incidents and implementing vulnerability scans.

Threat Actors, Intelligence, and Threat Hunting

Threat Actors: Identifying types such as nation-states and insiders.
Threat Intelligence: Gathering and analyzing threat data.
Lab: Practical threat hunting and using intelligence platforms.

Vulnerability, Patch, and Change Management

Vulnerability Management: Identification, evaluation, prioritization, and remediation.

Patch Management: Best practices and strategies.

Lab: Conducting a vulnerability assessment 

Business Continuity and Disaster Recovery

Planning: Business continuity and disaster recovery strategies.

Defense in Depth: Multi-layered security approach.

Lab: Developing a business continuity plan (BCP) and disaster recovery plan (DRP).

Security Operations

SOC Operations: Roles, responsibilities, monitoring, and detection.

Advanced Operations: Threat intelligence integration and incident response planning.

Lab: Incident simulation with SOC monitoring tools and response workflows

Endpoint Detection and Response (EDR)

EDR Tools: Overview, setup, and configuration.

Lab: Hands-on EDR tool configuration and endpoint investigation exercises.

CIS Controls and Kali Linux

CIS Controls: Implementation of critical security controls.

Kali Linux for Security Testing: Tools like Nmap, Metasploit, and Wireshark.

Lab: Conducting penetration testing exercises with Kali Linux.

Contact Us

 Address. 65 Annie Craig Dr, Toronto ON

Tel. 647-704-8319

© 2024

  • Linkedin
bottom of page