Curriculum
- 15 Sections
 - 361 Lessons
 - 10 Weeks
 
Expand all sectionsCollapse all sections
- Introduction to Cybersecurity76
- 1.11- Confidentiality
 - 1.2Sensitive Information
 - 1.3Access Control
 - 1.4Encryption
 - 1.5Data Masking and Anonymization
 - 1.6Physical Security
 - 1.7Security Policies and Training
 - 1.8Monitoring and Auditing
 - 1.92- Integrity
 - 1.10Data Validation and Verification
 - 1.11Access Control
 - 1.12Data Encryption
 - 1.13Data Integrity Checks
 - 1.14Backup and Recovery
 - 1.15Change Management
 - 1.16Auditing and Logging
 - 1.173- Availability
 - 1.18Redundancy and Fault Tolerance
 - 1.19Load Balancing
 - 1.20High Availability Architectures
 - 1.21Distributed Denial-of-Service (DDoS) Protection
 - 1.22Data Backup and Recovery
 - 1.23Monitoring and Incident Response
 - 1.24Business Continuity Planning
 - 1.254- Authentication
 - 1.26User Authentication
 - 1.27Device Authentication
 - 1.28System Authentication
 - 1.29Authentication Protocols
 - 1.30Authentication Factors
 - 1.31Authentication Tokens and Tokens
 - 1.325- Authorization
 - 1.33Access Control Policies
 - 1.34Role-Based Access Control (RBAC)
 - 1.35Attribute-Based Access Control (ABAC)
 - 1.36Permission Assignment
 - 1.37Access Control Lists (ACLs)
 - 1.38Policy Enforcement
 - 1.39Auditing and Logging:
 - 1.406- Encryption
 - 1.41Cryptographic Algorithms
 - 1.42Encryption Keys
 - 1.43Symmetric and Asymmetric Encryption
 - 1.44End-to-End Encryption
 - 1.45Transport Layer Encryption
 - 1.46Data-at-Rest Encryption
 - 1.477- Firewalls and Intrusion Detection/Prevention Systems (IDS/IPS)
 - 1.48Firewalls
 - 1.49Intrusion Detection Systems (IDS)
 - 1.50Intrusion Prevention Systems (IPS)
 - 1.518- Patch Management
 - 1.52Vulnerability Assessment
 - 1.53Patch Prioritization
 - 1.54Patch Testing
 - 1.55Patch Deployment
 - 1.56Patch Management Tools
 - 1.57Continuous Monitoring and Reporting
 - 1.58Third-Party Patching
 - 1.599- Security Awareness Training
 - 1.60Phishing Awareness
 - 1.61Password Security
 - 1.62Social Engineering Awareness
 - 1.63Data Handling and Privacy
 - 1.64Safe Internet and Device Usage
 - 1.65Incident Reporting and Response
 - 1.66Regular Refreshers and Updates
 - 1.6710- Incident Response
 - 1.68Preparation
 - 1.69Detection and Analysis
 - 1.70Containment and Eradication
 - 1.71Recovery and Remediation
 - 1.72Post-Incident Analysis and Lessons Learned
 - 1.73Communication and Coordination
 - 1.74Continuous Improvement
 - 1.75Case Studies
 - 1.76Rest
 
 - Computer Networking18
- 2.11- Fundamentals of Computer Networks
 - 2.2Topology
 - 2.3Networking Devices
 - 2.4Transmission Media
 - 2.52- Protocols
 - 2.6TCP/IP (Transmission Control Protocol/Internet Protocol)
 - 2.7HTTP (Hypertext Transfer Protocol)
 - 2.8DNS (Domain Name System)
 - 2.93- IP Addressing
 - 2.10IPv4 (Internet Protocol version 4)
 - 2.11IPv6 (Internet Protocol version 6)
 - 2.124- Network Security Basics
 - 2.13Firewalls
 - 2.14Encryption
 - 2.15Access Control
 - 2.16Intrusion Detection and Prevention Systems (IDPS)
 - 2.17Practical Exaples
 - 2.18Rest
 
 - Operating Systems Security18
- 3.11- Windows Operating System
 - 3.2User Account Control (UAC)
 - 3.3Windows Defender
 - 3.4Windows Firewall
 - 3.5BitLocker
 - 3.6Group Policy
 - 3.72- macOS
 - 3.8Gatekeeper
 - 3.9FileVault
 - 3.10XProtect
 - 3.11App Sandbox
 - 3.123- Linux Operating Systems
 - 3.13Permissions and Access Control
 - 3.14SELinux and AppArmor
 - 3.15Firewalls
 - 3.16Package Management
 - 3.17Practical Examples
 - 3.18Rest
 
 - Cryptography15
- 4.11- Basics of Encryption and Decryption
 - 4.2Encryption
 - 4.3Decryption
 - 4.42- Cryptographic Algorithms
 - 4.5Symmetric Encryption
 - 4.6Asymmetric Encryption (Public-Key Encryption)
 - 4.73- Cryptographic Protocols
 - 4.8SSL/TLS (Secure Sockets Layer/Transport Layer Security)
 - 4.9PGP (Pretty Good Privacy)
 - 4.10IPsec (Internet Protocol Security)
 - 4.114- Cryptographic Hash Functions
 - 4.12Hash Functions
 - 4.13Common Hash Algorithms
 - 4.14Practical Examples
 - 4.15Rest
 
 - Web Security17
- 5.11- Securing Web Applications
 - 5.2Input Validation
 - 5.3Authentication and Authorization
 - 5.4Session Management
 - 5.5HTTPS (HTTP Secure)
 - 5.6Content Security Policy (CSP)
 - 5.7Secure Coding Practices
 - 5.8Regular Security Updates
 - 5.92- Common Web Vulnerabilities
 - 5.10Cross-Site Scripting (XSS)
 - 5.11SQL Injection (SQLi)
 - 5.12Cross-Site Request Forgery (CSRF)
 - 5.13Sensitive Data Exposure
 - 5.14Broken Authentication
 - 5.15Insecure Direct Object References (IDOR)
 - 5.16Practical Examples
 - 5.17Rest
 
 - Network Security19
- 6.11- Firewalls
 - 6.2Definition
 - 6.3Functionality
 - 6.4Types of Firewalls
 - 6.52- IDS/IPS (Intrusion Detection/Prevention Systems)
 - 6.6Intrusion Detection Systems (IDS)
 - 6.7Intrusion Prevention Systems (IPS)
 - 6.8Deployment
 - 6.93- VPNs (Virtual Private Networks)
 - 6.10Definition
 - 6.11Encryption
 - 6.12Authentication
 - 6.134- Network Architecture and Design for Security
 - 6.14Defense-in-Depth
 - 6.15Segmentation
 - 6.16Least Privilege
 - 6.17Security Policies and Procedures
 - 6.18Rest
 - 6.19Practical Examples
 
 - Incident Response and Digital Forensics20
- 7.11- Incident Response Techniques
 - 7.2Preparation
 - 7.3Detection
 - 7.4Containment
 - 7.5Eradication
 - 7.6Recovery
 - 7.7Post-Incident Analysis
 - 7.82- Digital Forensics Tools and Methodologies
 - 7.9Disk Imaging Tools
 - 7.10Forensic Analysis Tools
 - 7.11Network Forensics Tools
 - 7.12Memory Forensics Tools
 - 7.13Timeline Analysis Tools
 - 7.143- Forensic Methodologies
 - 7.15Acquisition
 - 7.16Analysis
 - 7.17Interpretation
 - 7.18Reporting
 - 7.19Practical Examples
 - 7.20Rest
 
 - Ethical Hacking/Penetration Testing18
- 8.11- Understanding the Mindset of Hackers
 - 8.2Curiosity and Creativity
 - 8.3Persistence and Determination
 - 8.4Critical Thinking and Problem-Solving Skills
 - 8.5Ethical and Legal Boundaries
 - 8.62- Techniques for Penetration Testing and Vulnerability Assessments
 - 8.7Reconnaissance
 - 8.8Exploitation
 - 8.9Post-Exploitation
 - 8.10Reporting
 - 8.112- Techniques for Penetration Testing and Vulnerability Assessments
 - 8.12Reconnaissance
 - 8.13Vulnerability Scanning
 - 8.14Exploitation
 - 8.15Post-Exploitation
 - 8.16Reporting
 - 8.17Rest
 - 8.18Problems and Solutions
 
 - Security Policies and Compliance11
- 9.11- Developing and Implementing Security Policies
 - 9.2Policy Development
 - 9.3Policy Documentation
 - 9.4Policy Communication and Training
 - 9.5Policy Enforcement and Compliance Monitoring
 - 9.6Policy Review and Updates
 - 9.72- Understanding Regulatory Compliance
 - 9.8GDPR (General Data Protection Regulation)
 - 9.9HIPAA (Health Insurance Portability and Accountability Act)
 - 9.10Rest
 - 9.11Problems and Solutions
 
 - Security Awareness and Training14
- 10.11- Educating Users on Cybersecurity Best Practices
 - 10.2Phishing Awareness
 - 10.3Password Security
 - 10.4Safe Browsing Habits
 - 10.5Data Protection
 - 10.6Device Security
 - 10.7Incident Reporting
 - 10.82- Social Engineering Awareness and Prevention
 - 10.9Types of Social Engineering Attacks
 - 10.10Recognizing Red Flags
 - 10.11Verification and Validation
 - 10.12Security Awareness Exercises
 - 10.13Rest
 - 10.14Problems and Solutions
 
 - Wireless Network Security16
- 11.11- Securing Wireless Networks
 - 11.2Enable Encryption
 - 11.3Use Complex Passwords
 - 11.4Change Default Settings
 - 11.5Implement Network Segmentation
 - 11.6Enable MAC Address Filtering
 - 11.7Disable SSID Broadcasting
 - 11.8Regularly Update Firmware
 - 11.92- Risks and Mitigations for Wi-Fi Vulnerabilities
 - 11.10Man-in-the-Middle (MitM) Attacks
 - 11.11Brute Force Attacks
 - 11.12Evil Twin Attacks
 - 11.13Wi-Fi Jamming
 - 11.14Wi-Fi Pineapple Attacks
 - 11.15Rest
 - 11.16Problems and Solutions
 
 - Cloud Security67
- 12.11- Data Encryption
 - 12.2Encryption in Transit
 - 12.3Encryption at Rest
 - 12.42- Access Control
 - 12.5Identity and Access Management (IAM)
 - 12.6Role-Based Access Control (RBAC)
 - 12.7Access Policies and Permissions
 - 12.8Audit and Monitoring
 - 12.93- Multi-factor Authentication (MFA)
 - 12.10Authentication Factors
 - 12.11MFA Implementation
 - 12.12Benefits of MFA
 - 12.13Best Practices
 - 12.144- Network Security
 - 12.15Firewalls
 - 12.16Intrusion Detection and Prevention Systems (IDPS)
 - 12.17Virtual Private Networks (VPNs)
 - 12.18Access Control
 - 12.19Encryption
 - 12.20Network Segmentation
 - 12.21Regular Audits and Monitoring
 - 12.22Patch Management
 - 12.235- Data Loss Prevention (DLP)
 - 12.24Monitoring Data in Motion
 - 12.25Monitoring Data at Rest
 - 12.26Policy Enforcement
 - 12.27Content Inspection and Classification
 - 12.28Preventing Data Leakage
 - 12.29Integration with Security Ecosystem
 - 12.30User Awareness and Training
 - 12.316- Security Monitoring and Logging
 - 12.32Continuous Monitoring
 - 12.33Log Management
 - 12.34Security Information and Event Management (SIEM)
 - 12.35Threat Detection and Incident Response
 - 12.36Compliance and Auditing
 - 12.37Cloud-Native Monitoring Solutions
 - 12.38Third-Party Monitoring and Logging Tools
 - 12.397- Compliance and Legal Considerations
 - 12.40Industry Regulations and Compliance Standards
 - 12.41Legal Requirements
 - 12.42Data Protection Regulations
 - 12.43Cloud Service Providers’ Role
 - 12.44Assurances and Certifications
 - 12.45Shared Responsibility Model
 - 12.468- Data Residency and Sovereignty
 - 12.47Data Residency
 - 12.48Sovereignty Requirements
 - 12.49Regulatory Compliance
 - 12.50Cloud Provider Offerings
 - 12.51Data Transfer Restrictions
 - 12.52Risk Management
 - 12.539- Incident Response and Disaster Recovery:
 - 12.54Incident Response Plan (IRP)
 - 12.55Disaster Recovery Strategy (DRS)
 - 12.56Regular Backups
 - 12.57Failover Mechanisms
 - 12.58Recovery Procedures
 - 12.5910- Vendor Security Assurance
 - 12.60Assessing Security Posture
 - 12.61Reviewing Certifications and Compliance
 - 12.62Conducting Security Assessments
 - 12.63Evaluating Compliance with Best Practices
 - 12.64Ensuring Data Protection and Privacy
 - 12.65Contractual Agreements and SLAs
 - 12.66Problem and Solutions
 - 12.67Rest
 
 - Internet of Things (IoT) Security19
- 13.11- Security Challenges in IoT Devices
 - 13.2Limited Resources
 - 13.3Lack of Standardization
 - 13.4Insecure Communication
 - 13.5Vulnerabilities in Firmware and Software
 - 13.6Physical Security Risks
 - 13.7Privacy Concerns
 - 13.8Lifecycle Management
 - 13.92- Strategies for Securing IoT Ecosystems
 - 13.10Implement Secure Authentication and Authorization Mechanisms
 - 13.11Encrypt Data in Transit and at Rest
 - 13.12Secure Software Development Lifecycle (SDLC)
 - 13.13Implement Network Segmentation and Firewalls
 - 13.14Monitor and Analyze Device Behavior
 - 13.15Update and Patch Devices Regularly
 - 13.16Enforce Physical Security Measures
 - 13.17Ensure Compliance with Privacy Regulations
 - 13.18Problem and Solution
 - 13.19Rest
 
 - Security Risk Management17
- 14.11- Identifying and Assessing Security Risks
 - 14.2Asset Identification
 - 14.3Threat Identification
 - 14.4Vulnerability Assessment
 - 14.5Risk Analysis
 - 14.6Risk Prioritization
 - 14.72- Risk Mitigation and Management Strategies
 - 14.8Implement Security Controls
 - 14.9Patch Management
 - 14.10Access Control
 - 14.11Incident Response Planning
 - 14.12Data Backup and Recovery
 - 14.13Security Awareness Training
 - 14.14Third-Party Risk Management:
 - 14.15Continuous Monitoring and Improvement
 - 14.16Problem and Solutions
 - 14.17Rest
 
 - Legal and Ethical Issues in Cybersecurity16
- 15.11- Legal Frameworks Related to Cybersecurity
 - 15.2Data Protection Laws
 - 15.3Cybercrime Legislation
 - 15.4Industry-Specific Regulations
 - 15.5International Agreements and Treaties
 - 15.6Regulatory Compliance Requirements
 - 15.72- Ethical Considerations in Cybersecurity Practices
 - 15.8Respect for Privacy
 - 15.9Integrity and Honesty
 - 15.10Non-Discrimination and Equity
 - 15.11Accountability and Responsibility
 - 15.12Social Responsibility
 - 15.13Problem and Solutions
 - 15.14Rest
 - 15.15Exam
 - 15.16Contact Form