Skip to content
Tetra Pillars
Organizational Development & Capacity Building
Home
About Us
Services
ODP
Training Courses
Private Sector
Business
Construction
Gas and Oil
Telecommunication
Real Estate
Public Sector
Discounted Courses
Academic Courses
Job Caoching
Job Analysis and Suitability
Personality Analysis (Ocean Model)
Advising /Consulting
Vacancies
FAQs
Contact Us
Profile
Login
Home
IT
Be professional in Cyber Security
Be professional in Cyber Security
Curriculum
15 Sections
359 Lessons
10 Weeks
Expand all sections
Collapse all sections
Introduction to Cybersecurity
76
1.1
1- Confidentiality
1.2
Sensitive Information
1.3
Access Control
1.4
Encryption
1.5
Data Masking and Anonymization
1.6
Physical Security
1.7
Security Policies and Training
1.8
Monitoring and Auditing
1.9
2- Integrity
1.10
Data Validation and Verification
1.11
Access Control
1.12
Data Encryption
1.13
Data Integrity Checks
1.14
Backup and Recovery
1.15
Change Management
1.16
Auditing and Logging
1.17
3- Availability
1.18
Redundancy and Fault Tolerance
1.19
Load Balancing
1.20
High Availability Architectures
1.21
Distributed Denial-of-Service (DDoS) Protection
1.22
Data Backup and Recovery
1.23
Monitoring and Incident Response
1.24
Business Continuity Planning
1.25
4- Authentication
1.26
User Authentication
1.27
Device Authentication
1.28
System Authentication
1.29
Authentication Protocols
1.30
Authentication Factors
1.31
Authentication Tokens and Tokens
1.32
5- Authorization
1.33
Access Control Policies
1.34
Role-Based Access Control (RBAC)
1.35
Attribute-Based Access Control (ABAC)
1.36
Permission Assignment
1.37
Access Control Lists (ACLs)
1.38
Policy Enforcement
1.39
Auditing and Logging:
1.40
6- Encryption
1.41
Cryptographic Algorithms
1.42
Encryption Keys
1.43
Symmetric and Asymmetric Encryption
1.44
End-to-End Encryption
1.45
Transport Layer Encryption
1.46
Data-at-Rest Encryption
1.47
7- Firewalls and Intrusion Detection/Prevention Systems (IDS/IPS)
1.48
Firewalls
1.49
Intrusion Detection Systems (IDS)
1.50
Intrusion Prevention Systems (IPS)
1.51
8- Patch Management
1.52
Vulnerability Assessment
1.53
Patch Prioritization
1.54
Patch Testing
1.55
Patch Deployment
1.56
Patch Management Tools
1.57
Continuous Monitoring and Reporting
1.58
Third-Party Patching
1.59
9- Security Awareness Training
1.60
Phishing Awareness
1.61
Password Security
1.62
Social Engineering Awareness
1.63
Data Handling and Privacy
1.64
Safe Internet and Device Usage
1.65
Incident Reporting and Response
1.66
Regular Refreshers and Updates
1.67
10- Incident Response
1.68
Preparation
1.69
Detection and Analysis
1.70
Containment and Eradication
1.71
Recovery and Remediation
1.72
Post-Incident Analysis and Lessons Learned
1.73
Communication and Coordination
1.74
Continuous Improvement
1.75
Case Studies
1.76
Rest
Computer Networking
18
2.1
1- Fundamentals of Computer Networks
2.2
Topology
2.3
Networking Devices
2.4
Transmission Media
2.5
2- Protocols
2.6
TCP/IP (Transmission Control Protocol/Internet Protocol)
2.7
HTTP (Hypertext Transfer Protocol)
2.8
DNS (Domain Name System)
2.9
3- IP Addressing
2.10
IPv4 (Internet Protocol version 4)
2.11
IPv6 (Internet Protocol version 6)
2.12
4- Network Security Basics
2.13
Firewalls
2.14
Encryption
2.15
Access Control
2.16
Intrusion Detection and Prevention Systems (IDPS)
2.17
Practical Exaples
2.18
Rest
Operating Systems Security
18
3.1
1- Windows Operating System
3.2
User Account Control (UAC)
3.3
Windows Defender
3.4
Windows Firewall
3.5
BitLocker
3.6
Group Policy
3.7
2- macOS
3.8
Gatekeeper
3.9
FileVault
3.10
XProtect
3.11
App Sandbox
3.12
3- Linux Operating Systems
3.13
Permissions and Access Control
3.14
SELinux and AppArmor
3.15
Firewalls
3.16
Package Management
3.17
Practical Examples
3.18
Rest
Cryptography
15
4.1
1- Basics of Encryption and Decryption
4.2
Encryption
4.3
Decryption
4.4
2- Cryptographic Algorithms
4.5
Symmetric Encryption
4.6
Asymmetric Encryption (Public-Key Encryption)
4.7
3- Cryptographic Protocols
4.8
SSL/TLS (Secure Sockets Layer/Transport Layer Security)
4.9
PGP (Pretty Good Privacy)
4.10
IPsec (Internet Protocol Security)
4.11
4- Cryptographic Hash Functions
4.12
Hash Functions
4.13
Common Hash Algorithms
4.14
Practical Examples
4.15
Rest
Web Security
17
5.1
1- Securing Web Applications
5.2
Input Validation
5.3
Authentication and Authorization
5.4
Session Management
5.5
HTTPS (HTTP Secure)
5.6
Content Security Policy (CSP)
5.7
Secure Coding Practices
5.8
Regular Security Updates
5.9
2- Common Web Vulnerabilities
5.10
Cross-Site Scripting (XSS)
5.11
SQL Injection (SQLi)
5.12
Cross-Site Request Forgery (CSRF)
5.13
Sensitive Data Exposure
5.14
Broken Authentication
5.15
Insecure Direct Object References (IDOR)
5.16
Practical Examples
5.17
Rest
Network Security
19
6.1
1- Firewalls
6.2
Definition
6.3
Functionality
6.4
Types of Firewalls
6.5
2- IDS/IPS (Intrusion Detection/Prevention Systems)
6.6
Intrusion Detection Systems (IDS)
6.7
Intrusion Prevention Systems (IPS)
6.8
Deployment
6.9
3- VPNs (Virtual Private Networks)
6.10
Definition
6.11
Encryption
6.12
Authentication
6.13
4- Network Architecture and Design for Security
6.14
Defense-in-Depth
6.15
Segmentation
6.16
Least Privilege
6.17
Security Policies and Procedures
6.18
Practical Examples
6.19
Rest
Incident Response and Digital Forensics
20
7.1
1- Incident Response Techniques
7.2
Preparation
7.3
Detection
7.4
Containment
7.5
Eradication
7.6
Recovery
7.7
Post-Incident Analysis
7.8
2- Digital Forensics Tools and Methodologies
7.9
Disk Imaging Tools
7.10
Forensic Analysis Tools
7.11
Network Forensics Tools
7.12
Memory Forensics Tools
7.13
Timeline Analysis Tools
7.14
3- Forensic Methodologies
7.15
Acquisition
7.16
Analysis
7.17
Interpretation
7.18
Reporting
7.19
Practical Examples
7.20
Rest
Ethical Hacking/Penetration Testing
18
8.1
1- Understanding the Mindset of Hackers
8.2
Curiosity and Creativity
8.3
Persistence and Determination
8.4
Critical Thinking and Problem-Solving Skills
8.5
Ethical and Legal Boundaries
8.6
2- Techniques for Penetration Testing and Vulnerability Assessments
8.7
Reconnaissance
8.8
Exploitation
8.9
Post-Exploitation
8.10
Reporting
8.11
2- Techniques for Penetration Testing and Vulnerability Assessments
8.12
Reconnaissance
8.13
Vulnerability Scanning
8.14
Exploitation
8.15
Post-Exploitation
8.16
Reporting
8.17
Problems and Solutions
8.18
Rest
Security Policies and Compliance
11
9.1
1- Developing and Implementing Security Policies
9.2
Policy Development
9.3
Policy Documentation
9.4
Policy Communication and Training
9.5
Policy Enforcement and Compliance Monitoring
9.6
Policy Review and Updates
9.7
2- Understanding Regulatory Compliance
9.8
GDPR (General Data Protection Regulation)
9.9
HIPAA (Health Insurance Portability and Accountability Act)
9.10
Problems and Solutions
9.11
Rest
Security Awareness and Training
14
10.1
1- Educating Users on Cybersecurity Best Practices
10.2
Phishing Awareness
10.3
Password Security
10.4
Safe Browsing Habits
10.5
Data Protection
10.6
Device Security
10.7
Incident Reporting
10.8
2- Social Engineering Awareness and Prevention
10.9
Types of Social Engineering Attacks
10.10
Recognizing Red Flags
10.11
Verification and Validation
10.12
Security Awareness Exercises
10.13
Problems and Solutions
10.14
Rest
Wireless Network Security
16
11.1
1- Securing Wireless Networks
11.2
Enable Encryption
11.3
Use Complex Passwords
11.4
Change Default Settings
11.5
Implement Network Segmentation
11.6
Enable MAC Address Filtering
11.7
Disable SSID Broadcasting
11.8
Regularly Update Firmware
11.9
2- Risks and Mitigations for Wi-Fi Vulnerabilities
11.10
Man-in-the-Middle (MitM) Attacks
11.11
Brute Force Attacks
11.12
Evil Twin Attacks
11.13
Wi-Fi Jamming
11.14
Wi-Fi Pineapple Attacks
11.15
Problems and Solutions
11.16
Rest
Cloud Security
67
12.1
1- Data Encryption
12.2
Encryption in Transit
12.3
Encryption at Rest
12.4
2- Access Control
12.5
Identity and Access Management (IAM)
12.6
Role-Based Access Control (RBAC)
12.7
Access Policies and Permissions
12.8
Audit and Monitoring
12.9
3- Multi-factor Authentication (MFA)
12.10
Authentication Factors
12.11
MFA Implementation
12.12
Benefits of MFA
12.13
Best Practices
12.14
4- Network Security
12.15
Firewalls
12.16
Intrusion Detection and Prevention Systems (IDPS)
12.17
Virtual Private Networks (VPNs)
12.18
Access Control
12.19
Encryption
12.20
Network Segmentation
12.21
Regular Audits and Monitoring
12.22
Patch Management
12.23
5- Data Loss Prevention (DLP)
12.24
Monitoring Data in Motion
12.25
Monitoring Data at Rest
12.26
Policy Enforcement
12.27
Content Inspection and Classification
12.28
Preventing Data Leakage
12.29
Integration with Security Ecosystem
12.30
User Awareness and Training
12.31
6- Security Monitoring and Logging
12.32
Continuous Monitoring
12.33
Log Management
12.34
Security Information and Event Management (SIEM)
12.35
Threat Detection and Incident Response
12.36
Compliance and Auditing
12.37
Cloud-Native Monitoring Solutions
12.38
Third-Party Monitoring and Logging Tools
12.39
7- Compliance and Legal Considerations
12.40
Industry Regulations and Compliance Standards
12.41
Legal Requirements
12.42
Data Protection Regulations
12.43
Cloud Service Providers’ Role
12.44
Assurances and Certifications
12.45
Shared Responsibility Model
12.46
8- Data Residency and Sovereignty
12.47
Data Residency
12.47
Sovereignty Requirements
12.48
Regulatory Compliance
12.49
Cloud Provider Offerings
12.50
Data Transfer Restrictions
12.51
Risk Management
12.52
9- Incident Response and Disaster Recovery:
12.53
Incident Response Plan (IRP)
12.54
Disaster Recovery Strategy (DRS)
12.55
Regular Backups
12.56
Failover Mechanisms
12.57
Recovery Procedures
12.58
10- Vendor Security Assurance
12.59
Assessing Security Posture
12.60
Reviewing Certifications and Compliance
12.61
Conducting Security Assessments
12.62
Evaluating Compliance with Best Practices
12.63
Ensuring Data Protection and Privacy
12.64
Contractual Agreements and SLAs
12.65
Problem and Solutions
12.65
Rest
Internet of Things (IoT) Security
19
13.0
1- Security Challenges in IoT Devices
13.1
Limited Resources
13.2
Lack of Standardization
13.3
Insecure Communication
13.4
Vulnerabilities in Firmware and Software
13.5
Physical Security Risks
13.6
Privacy Concerns
13.7
Lifecycle Management
13.8
2- Strategies for Securing IoT Ecosystems
13.9
Implement Secure Authentication and Authorization Mechanisms
13.10
Encrypt Data in Transit and at Rest
13.11
Secure Software Development Lifecycle (SDLC)
13.12
Implement Network Segmentation and Firewalls
13.13
Monitor and Analyze Device Behavior
13.14
Update and Patch Devices Regularly
13.15
Enforce Physical Security Measures
13.16
Ensure Compliance with Privacy Regulations
13.17
Problem and Solution
13.18
Rest
Security Risk Management
17
14.0
1- Identifying and Assessing Security Risks
14.1
Asset Identification
14.2
Threat Identification
14.3
Vulnerability Assessment
14.4
Risk Analysis
14.5
Risk Prioritization
14.6
2- Risk Mitigation and Management Strategies
14.7
Implement Security Controls
14.8
Patch Management
14.9
Access Control
14.10
Incident Response Planning
14.11
Data Backup and Recovery
14.12
Security Awareness Training
14.13
Third-Party Risk Management:
14.14
Continuous Monitoring and Improvement
14.15
Problem and Solutions
14.16
Rest
Legal and Ethical Issues in Cybersecurity
15
15.1
1- Legal Frameworks Related to Cybersecurity
15.2
Data Protection Laws
15.3
Cybercrime Legislation
15.4
Industry-Specific Regulations
15.5
International Agreements and Treaties
15.6
Regulatory Compliance Requirements
15.7
2- Ethical Considerations in Cybersecurity Practices
15.8
Respect for Privacy
15.9
Integrity and Honesty
15.10
Non-Discrimination and Equity
15.11
Accountability and Responsibility
15.12
Social Responsibility
15.13
Problem and Solutions
15.14
Rest
15.15
Cyber Security
30 Minutes
10 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
<p>You cannot copy content of this page</p>
Modal title
Main Content