Cybersecurity Course Home  »  Cybersecurity Course

Understanding the fundamentals, threat landscape, and career paths in cybersecurity.

  1. Linux Essentials

    Basic Linux commands, file system navigation, and user management.

  2. Linux Administration

    System configuration, process management, services, and security hardening.

  3. Networking Fundamentals

    Core concepts including OSI model, TCP/IP, routing, switching, and common protocols.

  4. Network Security

    Implementation of firewalls, VPNs, IDS/IPS, and securing network infrastructure.

  5. Vulnerability Management

    Identifying, assessing, and mitigating vulnerabilities using industry tools and methodologies.

  6. Network Penetration Testing

    Scanning, enumeration, and exploitation techniques for network-based systems.

  7. Advanced Network Penetration Testing

    Red teaming, evasion strategies, and post-exploitation tactics.

  8. Cryptography

    Principles of encryption, decryption, hashing, digital signatures, and PKI.

  9. Active Directory Basics

    Overview of AD structure, user/group policies, authentication, and LDAP.

  10. Active Directory Penetration Testing

    Attacks on AD, including enumeration, Kerberoasting, and privilege escalation.

  11. Cybersecurity Compliance

    Understanding of regulations and standards like ISO 27001, GDPR, HIPAA, and NIST.

  1. Web Fundamentals

    Basics of web technologies including HTML, CSS, JavaScript, and HTTP/S protocols.

  2. Web Application Penetration Testing

    Testing techniques targeting OWASP Top 10 vulnerabilities.

  3. Bug Bounty Insights

    Introduction to bug bounty programs, platforms, and responsible disclosure.

  4. Mobile Application, IoT & Cloud Security

    Security challenges and exploitation methods across mobile apps, IoT devices, and cloud platforms.

  5. Social Engineering & Wi-Fi Security Fundamentals

    Techniques for manipulating human behaviour and attacking wireless networks.

  6. Scripting Basics for Penetration Testing

    Introduction to scripting (Bash, Python) for automating security assessments.

  7. Threat Intelligence

    Gathering, analyzing, and using intelligence to predict and prevent cyber threats.

  8. Security Operations Fundamentals

    Concepts of SOC, log analysis, incident detection and response.

  9. Security Operations with QRadar

    Using IBM QRadar for SIEM, rule creation, offense analysis, and threat detection.

  10. Security Operations with Splunk

    Leveraging Splunk for log management, real-time monitoring, and custom alerts.

  11. Enterprise Security Concepts

    Comprehensive overview of enterprise security architecture, policies, and risk management strategies.