Cybersecurity Course
Understanding the fundamentals, threat landscape, and career paths in cybersecurity.
Linux Essentials
Basic Linux commands, file system navigation, and user management.
Linux Administration
System configuration, process management, services, and security hardening.
Networking Fundamentals
Core concepts including OSI model, TCP/IP, routing, switching, and common protocols.
Network Security
Implementation of firewalls, VPNs, IDS/IPS, and securing network infrastructure.
Vulnerability Management
Identifying, assessing, and mitigating vulnerabilities using industry tools and methodologies.
Network Penetration Testing
Scanning, enumeration, and exploitation techniques for network-based systems.
Advanced Network Penetration Testing
Red teaming, evasion strategies, and post-exploitation tactics.
Cryptography
Principles of encryption, decryption, hashing, digital signatures, and PKI.
Active Directory Basics
Overview of AD structure, user/group policies, authentication, and LDAP.
Active Directory Penetration Testing
Attacks on AD, including enumeration, Kerberoasting, and privilege escalation.
Cybersecurity Compliance
Understanding of regulations and standards like ISO 27001, GDPR, HIPAA, and NIST.
Web Fundamentals
Basics of web technologies including HTML, CSS, JavaScript, and HTTP/S protocols.
Web Application Penetration Testing
Testing techniques targeting OWASP Top 10 vulnerabilities.
Bug Bounty Insights
Introduction to bug bounty programs, platforms, and responsible disclosure.
Mobile Application, IoT & Cloud Security
Security challenges and exploitation methods across mobile apps, IoT devices, and cloud platforms.
Social Engineering & Wi-Fi Security Fundamentals
Techniques for manipulating human behaviour and attacking wireless networks.
Scripting Basics for Penetration Testing
Introduction to scripting (Bash, Python) for automating security assessments.
Threat Intelligence
Gathering, analyzing, and using intelligence to predict and prevent cyber threats.
Security Operations Fundamentals
Concepts of SOC, log analysis, incident detection and response.
Security Operations with QRadar
Using IBM QRadar for SIEM, rule creation, offense analysis, and threat detection.
Security Operations with Splunk
Leveraging Splunk for log management, real-time monitoring, and custom alerts.
Enterprise Security Concepts
Comprehensive overview of enterprise security architecture, policies, and risk management strategies.