This course is an introductory course, in which you will learn the following topics:
IT and web fundamentals
Introduction to Computer Networks TCP/IP Framework , OSI Model , Overview of key Network concepts (DHCP,Nat,DNS,HTTP)
Hackers, Hacking and Cyber Security Attacks
Malware & Malware threats
Intro to linux and security tools / Introduction to Linux Distributions / Introduction to Kali Linux
Linux Installation & deep dive
Windows Concepts: Introduction to Windows Logs, Introduction to Windows Active Directory
Network Security and Network Sniffing
Lab: Demonstrating basic scanning and enumeration methodologies using NMAP on Kali Linux
Defense in depth
Introduction to Open Web Application Security Project (OWASP) and Web application attacks
Lab: Demonstrating how to exploit OWASP top 10 vulnerabilities using a Damn Vulnerable Web Application (DVWA)
Introduction to cryptography and PKI
Threat Hunting: Introduction to Threat Hunting / Cyber Kill Chain / Diamond Intrusion Analysis
Vulnerability Analysis
Class Project
Introduction to Cloud computing (Microsoft AZ-900)
After attending the course you:
have an understanding of the fundamentals of cybersecurity and are ready to step up to more advanced cybersecurity topics and courses.Â
are prepared to appear for the Microsoft AZ900 certification exam
The course is for you if you...
are an analytical thinker and listener
like to problem solve and challenge yourself
are sensible to digital ethics
you are flexible and adaptive when considering possible solutions to problems
are passionate about learning, as this field is in constant development and has infinite branches
The skills needed to become a cybersecurity professional are varied and extensive. For example, being able to:
understand the complex processes of the industry, while being able to think critically and solve problems
understand how networks work, how they are built, and how they can be broken, how the software works and what vulnerabilities it has
knowledge of networking protocols, data structures, and design patterns, basics of coding
understanding of defensive strategies such as penetration testing or vulnerability assessment