This module provides a comprehensive introduction to the foundational concepts of cybersecurity. It covers the basic principles, tools, and methodologies used to protect digital systems from various threats.
Module 1: Cybersecurity Foundations
Program:- Introduction
- Network Security
- Log Management
- Security Operations
- Threats and Malware
- Endpoint Security
- Capstone
Module outcomes:
Students will gain a solid understanding of cybersecurity principles, network security, and the importance of log management. They will also learn to identify and mitigate various types of threats and vulnerabilities.
Tools you will learn:
Windows Event Log, Linux syslog, IDS/IPS, Firewall, EDR, SIEM.
Focused on Security Operations Center (SOC) fundamentals, this module equips learners with the skills needed to monitor and respond to security incidents. It covers the SOC environment, cyber threat landscape, and tools like SIEM.
Module 2: Cybersecurity Analysis Basics
Program:- SOC Fundamentals
- Cyber Threat Landscape
- SIEM Essentials
- Incident Response Fundamentals
- Introduction to Cloud Security
- Capstone
Module outcomes:
Students will understand SOC operations, identify and analyze threats, and effectively use SIEM systems. They will also gain insights into incident response and cloud security basics.
Tools you will learn:
SIEM (Wazuh, Splunk, Microsoft Sentinel), SOC, incident response platforms.
This module provides a comprehensive introduction to the foundational concepts of cybersecurity. It covers the basic principles, tools, and methodologies used to protect digital systems from various threats.
Module 3: Cybersecurity Analysis ADVANCED
Program:- Network Forensics Basics
- Phishing Detection Basics
- Vulnerability Assessment Basics
- Ransomware Detection Basics
- Malware Analysis Basics
Module outcomes:
Learners will develop advanced skills in detecting and responding to phishing, malware, and ransomware. They will also be adept at conducting vulnerability assessments.
Tools you will learn:
Network forensics tools, phishing detection tools, vulnerability assessment tools.
This module introduces critical tools and technologies used by security engineers, including PowerShell, Linux, and Splunk. It focuses on the practical application of these tools in real-world scenarios.
Module 4: Tools for Security Engineers
Program:- PowerShell Fundamentals
- Regular Expressions Fundamentals
- Linux Fundamentals
- Splunk Configuration
Module outcomes:
Students will become proficient in using PowerShell for automation, regular expressions for data parsing, and Linux for system administration. They will also learn to configure and use Splunk for data analysis.
Tools you will learn:
PowerShell, Linux, Splunk, regular expressions.
This module covers advanced security techniques, including endpoint and perimeter protection, malware defense, and elastic configuration. It provides hands-on experience with sophisticated security strategies.
Module 5: Advanced Security Techniques
Program:- Endpoint Protection
- Email Protection
- Perimeter Protection: FortiOS
- Malware Protection
- Elastic Configuration
Module outcomes:
Learners will master techniques for securing endpoints, email systems, and network perimeters. They will also gain skills in configuring security tools and systems.
Tools you will learn:
Endpoint protection tools, FortiOS, Microsoft Defender ATP, Elastic.
Focusing on incident response, this module trains students in handling and containing cybersecurity incidents. It covers strategic response techniques, ransomware incident response, and perimeter threats.
Module 6: Incident Response Strategies
Program:- Incident Response: Strategic Handling and Containment
- Ransomware Incident Response
- Malware Incident Response
- Perimeter Threats: Detection & Response
- Incident Response to Persistence Mechanisms
Module outcomes:
Students will learn to develop and implement incident response strategies, manage ransomware incidents, and secure network perimeters. They will also be equipped to detect and respond to persistence mechanisms.
Tools you will learn:
Incident response tools, malware analysis tools, perimeter security tools.