About the Course
Embark on a transformative journey into the realm of Cyber Security with our comprehensive course. Dive deep into the core concepts, tools, and technologies essential for a successful career in data engineering. Gain practical skills and insights that will set you apart in the competitive job market. Take the first step towards becoming a skilled Cyber Security today!
Course Curriculum
-
1
Introduction to Cybersecurity
-
(Included in full purchase)
Understanding the Cybersecurity Landscape
-
(Included in full purchase)
Threat Types: Malware, Ransomware, Phishing
-
(Included in full purchase)
Cybersecurity Goals: CIA Triad (Confidentiality, Integrity, Availability)
-
(Included in full purchase)
Types of Cybersecurity Domains
-
(Included in full purchase)
Introduction to Cyber Laws and Compliance
-
(Included in full purchase)
-
2
Networking Fundamentals for Security
-
(Included in full purchase)
OSI & TCP/IP Models
-
(Included in full purchase)
IP Addressing and Subnetting
-
(Included in full purchase)
Ports and Services
-
(Included in full purchase)
Packet Sniffing with Wireshark
-
(Included in full purchase)
Protocols (TCP, UDP, ICMP, HTTP/S, DNS)
-
(Included in full purchase)
-
3
Operating Systems and System Security
-
(Included in full purchase)
Windows and Linux OS Fundamentals
-
(Included in full purchase)
File Systems, Permissions, and Logging
-
(Included in full purchase)
Hardening Operating Systems
-
(Included in full purchase)
Sysinternals & Linux Forensics
-
(Included in full purchase)
Shell Scripting for Security
-
(Included in full purchase)
-
4
Security Operations Center (SOC) Essentials
-
(Included in full purchase)
Introduction to SOC Roles and Tiers
-
(Included in full purchase)
Log Collection and SIEM Tools (Splunk, ELK)
-
(Included in full purchase)
Incident Detection and Triage
-
(Included in full purchase)
Threat Intelligence and IOC Analysis
-
(Included in full purchase)
Ticketing Systems and Escalation Process
-
(Included in full purchase)
-
5
Network Security
-
(Included in full purchase)
Network Architecture & Perimeter Defense
-
(Included in full purchase)
Firewalls, IDS/IPS, VPNs
-
(Included in full purchase)
Network Access Control (NAC)
-
(Included in full purchase)
Wireless Security and Attacks
-
(Included in full purchase)
Lab: Configuring Firewalls and Sniffing Tools
-
(Included in full purchase)
-
6
Vulnerability Management
-
(Included in full purchase)
Vulnerability Scanning (Nessus, OpenVAS)
-
(Included in full purchase)
CVEs, CVSS Scoring & Patch Management
-
(Included in full purchase)
Risk Assessment and Prioritization
-
(Included in full purchase)
Lab: Conducting a Vulnerability Scan
-
(Included in full purchase)
Remediation and Retesting Best Practices
-
(Included in full purchase)
-
7
Ethical Hacking and Penetration Testing
-
(Included in full purchase)
Penetration Testing Methodology (PTES)
-
(Included in full purchase)
Reconnaissance, Scanning, and Enumeration
-
(Included in full purchase)
Exploitation with Metasploit
-
(Included in full purchase)
Web App Security: OWASP Top 10
-
(Included in full purchase)
Lab: Capture the Flag (CTF) Simulation
-
(Included in full purchase)
-
8
Identity and Access Management (IAM)
-
(Included in full purchase)
Authentication vs Authorization
-
(Included in full purchase)
Multi-Factor Authentication (MFA)
-
(Included in full purchase)
Directory Services and LDAP
-
(Included in full purchase)
Role-Based Access Control (RBAC)
-
(Included in full purchase)
IAM in Cloud Environments (AWS IAM, Azure AD)
-
(Included in full purchase)
-
9
Cloud Security
-
(Included in full purchase)
Shared Responsibility Model
-
(Included in full purchase)
Securing AWS, Azure, and GCP
-
(Included in full purchase)
Cloud Networking & IAM Policies
-
(Included in full purchase)
Cloud Logging and Monitoring Tools
-
(Included in full purchase)
Lab: Harden an S3 Bucket and Audit IAM Policies
-
(Included in full purchase)
-
10
Data Quality & Governance
-
(Included in full purchase)
Symmetric vs Asymmetric Encryption
-
(Included in full purchase)
Hashing Algorithms (MD5, SHA-2, bcrypt)
-
(Included in full purchase)
Digital Certificates & SSL/TLS
-
(Included in full purchase)
Public Key Infrastructure (PKI)
-
(Included in full purchase)
Secure Key Storage and Management
-
(Included in full purchase)
-
11
Secure Coding and Application Security
-
(Included in full purchase)
Common Code Vulnerabilities (XSS, SQLi, CSRF)
-
(Included in full purchase)
Secure Development Lifecycle (SDLC)
-
(Included in full purchase)
Static and Dynamic Code Analysis
-
(Included in full purchase)
API Security Best Practices
-
(Included in full purchase)
Secure DevOps (DevSecOps) Introduction
-
(Included in full purchase)
-
12
Incident Response and Forensics
-
(Included in full purchase)
Incident Response Lifecycle (NIST)
-
(Included in full purchase)
Evidence Collection and Chain of Custody
-
(Included in full purchase)
Disk and Memory Forensics
-
(Included in full purchase)
Email and Network Forensics
-
(Included in full purchase)
Lab: Analyze a Breach Scenario
-
(Included in full purchase)
-
13
Governance, Risk & Compliance (GRC)
-
(Included in full purchase)
Security Policies and Frameworks (ISO 27001, NIST, CIS)
-
(Included in full purchase)
Risk Assessment & Treatment
-
(Included in full purchase)
Regulatory Compliance (GDPR, HIPAA, PCI-DSS)
-
(Included in full purchase)
Business Continuity & Disaster Recovery (BC/DR)
-
(Included in full purchase)
Security Audits and Reporting
-
(Included in full purchase)
-
14
Red Team / Blue Team Simulation
-
(Included in full purchase)
Adversary Emulation & Threat Simulation
-
(Included in full purchase)
Defending Against Real-World Attacks
-
(Included in full purchase)
Monitoring, Detecting, and Responding
-
(Included in full purchase)
Purple Team Collaboration Exercises
-
(Included in full purchase)
Final Live Fire Exercise
-
(Included in full purchase)