Courses
CYBERSECURITY
This course intends to equip professionals with the skills to protect digital assets and build secure, resilient organisations. With data breaches and digital threats growing more complex each day, the demand for Cybersecurity professionals is at an all-time high. Through expert-led sessions, real-world tools, and applied learning, participants explore the evolving cybersecurity landscape – from threat detection and risk management to data protection and network security essentials. The course empowers professionals with the knowledge and skills required to lead in this high-stakes domain that demands practical threat mitigation expertise.
About Course
Career Prospects
- Cybersecurity Analyst
- Cybersecurity Consultant
- Penetration Tester (Ethical Hacker)
- Digital Forensics Investigator
- Application Security Specialist
- Network Security Engineer
- Security Operations Center (SOC) Analyst
- Cloud Security Engineer
- IT Risk and Compliance Officer
- Malware Analyst
Course Curriculum
Module 1: Fundamental IT Skills
Overview of digital systems
Computer hardware components and functions
Connectivity technologies (WiFi, Bluetooth, NFC, Infrared)
Cloud productivity suites (Google Workspace, iCloud, Microsoft Office)
OS-independent troubleshooting approaches
Introduction to Capture-the-Flag (CTF) practice platforms: TryHackMe, HackTheBox, picoCTF
Module 2: Operating Systems Essentials
- Windows, Linux, and macOS architecture
- Installation and configuration processes
- GUI and Command Line navigation
- File system permissions, CRUD operations, and software installation
- System troubleshooting techniques
- Essential Windows and Linux commands
Module 3: Computer Networking Foundations
OSI and TCP/IP Models
Common networking protocols (DNS, DHCP, SSH, HTTP/HTTPS, FTP/SFTP)
Network port functions and services
Subnetting, CIDR, private vs public IPs
Network topologies (Star, Mesh, Bus, Ring)
Virtualization fundamentals: Hypervisors, VM, Host/Guest OS
Introduction to routing and switching devices
Module 4: Network Security and Traffic Analysis
Secure vs insecure protocols (SSL/TLS, IPsec, DNSSEC)
Network perimeter components (DMZ, VLAN, VPN)
Packet sniffing and analysis using Wireshark, tcpdump
Network diagnostic tools (ping, tracert, nslookup, nmap, netstat)
Introduction to IDS/IPS systems
Honeypots and network segmentation
Module 5: Security Concepts and Defensive Strategy
CIA Triad and Zero Trust Architecture
Defense-in-depth security model
Authentication methodologies (MFA, 2FA, Kerberos, LDAP, SSO)
Endpoint security (EDR, anti-malware, DLP)
Hardening concepts: patching, ACLs, NAC, group policies
Backup & disaster-recovery principles
Module 6: Threats, Attacks, and Vulnerability Analysis
Types of cyber threats: APTs, zero-day vulnerabilities
Social engineering (phishing, smishing, whaling, impersonation)
Common attacks: DDoS, MITM, spoofing, deauth, rogue access points
Web attacks: XSS, SQL injection, CSRF, directory traversal
Vulnerability management lifecycle
Penetration testing rules of engagement
Module 7: Digital Forensics and Incident Response
Basics of cyber forensics
Memory and disk imaging tools (FTK Imager, Autopsy, WinHex)
Log analysis (event logs, syslogs, netflow)
Incident response process: preparation to lessons learned
Threat intelligence (OSINT, ATT&CK framework, Kill Chain Model)
Malware behavior analysis fundamentals
Module 8: Cryptography Fundamentals
Encryption principles: symmetric vs asymmetric
Hashing, salting, key exchange
PKI, certificates, digital signatures
Secure communication protocols
Obfuscation and encoding techniques
Module 9: Cloud Security Foundations
Cloud vs on-premises security models
Cloud service models: SaaS, PaaS, IaaS
Cloud deployment models: private, public, hybrid
Serverless security considerations
Infrastructure-as-Code concepts (IaC)
Security on AWS, Azure, and Google Cloud
Cloud storage security (S3, OneDrive, Dropbox)
Module 10: Programming and Scripting for Cybersecurity
Python for automation and security tasks
Shell scripting (Bash, PowerShell)
JavaScript fundamentals for web security analysis
Introduction to exploit development concepts
Secure coding principles
Module 11: Professional Cybersecurity Tools & Practices
Common hacking toolkits
Exploit frameworks
SIEM and SOAR fundamentals
Security compliance frameworks (ISO 27001, NIST, CIS Controls, RMF)
Understanding roles: Red Team, Blue Team, Purple Team
Ethical and legal considerations in cybersecurity
Module 12: Certification Preparation and Career Pathways
Introduction to global cybersecurity certifications:
Beginner: CompTIA A+, Network+, Security+, CCNA
Intermediate: CEH, CISA, CISM, GSEC
Advanced: OSCP, CISSP, CREST
Career roadmaps and industry expectations
Hands-on practice with online labs and CTFs
Skills and Tools Covered
Network Scanning & Enumeration Tools
Nmap
Netstat
Ping/Traceroute
ARP / ARP-scan
Nslookup / Dig
Hping3
Traffic Capture & Protocol Analysis
Wireshark
Tcpdump
NetFlow analyzers
Packet sniffers (various distributions)
Vulnerability Assessment Platforms
OpenVAS
Nikto
Lynis
Nessus
Penetration Testing & Exploit Frameworks
Metasploit Framework
Burp Suite (Community Edition)
OWASP ZAP
Responder
Hydra
John the Ripper / Hashcat
Web & Application Security Tools
SQLMap
DirBuster / Gobuster
Wfuzz
WPScan
Postman (for API security testing)
Digital Forensics & Incident Response Tools
FTK Imager
Autopsy (Sleuth Kit)
WinHex
Memdump / Volatility Framework
Event viewer & Syslog analysis
Sysinternals Suite (Windows)
Endpoint & System Security Tools
EDR/antimalware demonstrations (e.g., Microsoft Defender ATP concepts)
Auditpol
Host-based firewalls
Group Policy Management (Windows environments)
Cloud Security & Administration Tools
AWS IAM & Security Hub (practical intro through sandbox simulations)
Azure Security Center
Google Cloud IAM tools
Offensive Security Operating Systems
Kali Linux
Parrot Security OS
SIEM & Monitoring Platforms (SOC Skill Development)
Splunk (Free-tier labs / simulations)
Wazuh
Elastic Security
Security Onion
Duration
- Beginners: 9 Months
- Intermediates: 5 Months
