Courses

CYBERSECURITY

This course intends to equip professionals with the skills to protect digital assets and build secure, resilient organisations. With data breaches and digital threats growing more complex each day, the demand for Cybersecurity professionals is at an all-time high. Through expert-led sessions, real-world tools, and applied learning, participants explore the evolving cybersecurity landscape – from threat detection and risk management to data protection and network security essentials. The course empowers professionals with the knowledge and skills required to lead in this high-stakes domain that demands practical threat mitigation expertise.

About Course

  • Overview of digital systems

  • Computer hardware components and functions

  • Connectivity technologies (WiFi, Bluetooth, NFC, Infrared)

  • Cloud productivity suites (Google Workspace, iCloud, Microsoft Office)

  • OS-independent troubleshooting approaches

  • Introduction to Capture-the-Flag (CTF) practice platforms: TryHackMe, HackTheBox, picoCTF

  • Windows, Linux, and macOS architecture
  • Installation and configuration processes
  • GUI and Command Line navigation
  • File system permissions, CRUD operations, and software installation
  • System troubleshooting techniques
  • Essential Windows and Linux commands
  • OSI and TCP/IP Models

  • Common networking protocols (DNS, DHCP, SSH, HTTP/HTTPS, FTP/SFTP)

  • Network port functions and services

  • Subnetting, CIDR, private vs public IPs

  • Network topologies (Star, Mesh, Bus, Ring)

  • Virtualization fundamentals: Hypervisors, VM, Host/Guest OS

  • Introduction to routing and switching devices

  • Secure vs insecure protocols (SSL/TLS, IPsec, DNSSEC)

  • Network perimeter components (DMZ, VLAN, VPN)

  • Packet sniffing and analysis using Wireshark, tcpdump

  • Network diagnostic tools (ping, tracert, nslookup, nmap, netstat)

  • Introduction to IDS/IPS systems

  • Honeypots and network segmentation

  • CIA Triad and Zero Trust Architecture

  • Defense-in-depth security model

  • Authentication methodologies (MFA, 2FA, Kerberos, LDAP, SSO)

  • Endpoint security (EDR, anti-malware, DLP)

  • Hardening concepts: patching, ACLs, NAC, group policies

  • Backup & disaster-recovery principles

  • Types of cyber threats: APTs, zero-day vulnerabilities

  • Social engineering (phishing, smishing, whaling, impersonation)

  • Common attacks: DDoS, MITM, spoofing, deauth, rogue access points

  • Web attacks: XSS, SQL injection, CSRF, directory traversal

  • Vulnerability management lifecycle

  • Penetration testing rules of engagement

  • Basics of cyber forensics

  • Memory and disk imaging tools (FTK Imager, Autopsy, WinHex)

  • Log analysis (event logs, syslogs, netflow)

  • Incident response process: preparation to lessons learned

  • Threat intelligence (OSINT, ATT&CK framework, Kill Chain Model)

  • Malware behavior analysis fundamentals

  • Encryption principles: symmetric vs asymmetric

  • Hashing, salting, key exchange

  • PKI, certificates, digital signatures

  • Secure communication protocols

  • Obfuscation and encoding techniques

  • Cloud vs on-premises security models

  • Cloud service models: SaaS, PaaS, IaaS

  • Cloud deployment models: private, public, hybrid

  • Serverless security considerations

  • Infrastructure-as-Code concepts (IaC)

  • Security on AWS, Azure, and Google Cloud

  • Cloud storage security (S3, OneDrive, Dropbox)

  • Python for automation and security tasks

  • Shell scripting (Bash, PowerShell)

  • JavaScript fundamentals for web security analysis

  • Introduction to exploit development concepts

  • Secure coding principles

  • Common hacking toolkits

  • Exploit frameworks

  • SIEM and SOAR fundamentals

  • Security compliance frameworks (ISO 27001, NIST, CIS Controls, RMF)

  • Understanding roles: Red Team, Blue Team, Purple Team

  • Ethical and legal considerations in cybersecurity

  • Introduction to global cybersecurity certifications:

    • Beginner: CompTIA A+, Network+, Security+, CCNA

    • Intermediate: CEH, CISA, CISM, GSEC

    • Advanced: OSCP, CISSP, CREST

  • Career roadmaps and industry expectations

  • Hands-on practice with online labs and CTFs

  • Nmap

  • Netstat

  • Ping/Traceroute

  • ARP / ARP-scan

  • Nslookup / Dig

  • Hping3

  • Wireshark

  • Tcpdump

  • NetFlow analyzers

  • Packet sniffers (various distributions)

  • OpenVAS

  • Nikto

  • Lynis

  • Nessus

  • Metasploit Framework

  • Burp Suite (Community Edition)

  • OWASP ZAP

  • Responder

  • Hydra

  • John the Ripper / Hashcat

  • SQLMap

  • DirBuster / Gobuster

  • Wfuzz

  • WPScan

  • Postman (for API security testing)

  • FTK Imager

  • Autopsy (Sleuth Kit)

  • WinHex

  • Memdump / Volatility Framework

  • Event viewer & Syslog analysis

  • Sysinternals Suite (Windows)

  • EDR/antimalware demonstrations (e.g., Microsoft Defender ATP concepts)

  • Auditpol

  • Host-based firewalls

  • Group Policy Management (Windows environments)

  • AWS IAM & Security Hub (practical intro through sandbox simulations)

  • Azure Security Center

  • Google Cloud IAM tools

  • Kali Linux

  • Parrot Security OS

  • Splunk (Free-tier labs / simulations)

  • Wazuh

  • Elastic Security

  • Security Onion

Request Call Back

REQUEST CALL BACK

Fill this form so we can reach out to you.


Scroll to Top