
High-level
Course outline
This course outline provides a comprehensive, hands-on approach to mastering cybersecurity fundamentals, advanced tools, threat management, and essential real-world skills for a successful career in cybersecurity.
Cybersecurity Fundamentals
Overview of Cybersecurity: Understanding key concepts, importance, and terminologies.
Cybersecurity Landscape: Exploring historical trends and future directions.
Fundamental Principles: Covering Confidentiality, Integrity, and Availability (CIA Triad), along with risk management.
Lab: Real-world examples of cybersecurity breaches and threat analysis.
Secure Network Architecture and Cloud Security
Network Architecture: Designing secure infrastructure with firewalls, DMZs, and VPNs.
Cloud Security: Understanding cloud service models, addressing security challenges, and best practices.
Lab: Setting up a basic secure network environment, including firewall
Understanding Security Tools
SIEM and EDR: Functions, benefits, and use cases.
SOAR and CASB: Integrating and automating security operations.
Data Protection: Data Loss Prevention (DLP) and Secure Web Gateway (SWG).
Lab: Configuring and using SIEM and EDR tools to detect and respond to threats.
Threats, Attacks, and Vulnerabilities
Threat Types: Including malware, phishing, DDoS attacks, Etc.
Vulnerability Management: Identification, assessment, and mitigation.
Lab: Case studies on real-world security incidents and implementing vulnerability scans.
Threat Actors, Intelligence, and Threat Hunting
Threat Actors: Identifying types such as nation-states and insiders.
Threat Intelligence: Gathering and analyzing threat data.
Lab: Practical threat hunting and using intelligence platforms.
Vulnerability, Patch, and Change Management
Vulnerability Management: Identification, evaluation, prioritization, and remediation.
Patch Management: Best practices and strategies.
Lab: Conducting a vulnerability assessment
Business Continuity and Disaster Recovery
Planning: Business continuity and disaster recovery strategies.
Defense in Depth: Multi-layered security approach.
Lab: Developing a business continuity plan (BCP) and disaster recovery plan (DRP).
Security Operations
SOC Operations: Roles, responsibilities, monitoring, and detection.
Advanced Operations: Threat intelligence integration and incident response planning.
Lab: Incident simulation with SOC monitoring tools and response workflows
Endpoint Detection and Response (EDR)
EDR Tools: Overview, setup, and configuration.
Lab: Hands-on EDR tool configuration and endpoint investigation exercises.
CIS Controls and Kali Linux
CIS Controls: Implementation of critical security controls.
Kali Linux for Security Testing: Tools like Nmap, Metasploit, and Wireshark.
Lab: Conducting penetration testing exercises with Kali Linux.