This course covers cybersecurity tactics, Windows and Linux OS, and prepares you for the Microsoft SC 900 certification exam. Join expert-led live sessions twice a week and self-study for at least 6 hours a week to further deepen your knowledge in Cybersecurity. Eligibility for the intensive final two weeks and a free exam voucher requires 80% attendance and project completion. The course is ideal for those who have foundational cybersecurity knowledge and can dedicate at least 10 hours a week. Additional benefits include career training workshops, mentorship opportunities, and job fairs.
What you will learn:
Review of basic cybersecurity concepts
Cyber Attacks – Malicious Codes, social engineering, physical attacks, password attacks.
Reconnaissance and Information Gathering
Vulnerability Analysis – Authentication vulnerabilities, authorisation vulnerabilities, injection vulnerabilities, web application vulnerabilities
Vulnerability Analysis – Vulnerability scanning, vulnerability management, penetration testing, security assessment.
Cybersecurity defence – Mitre ATT&CK, Cyber Kill Chain, Diamond Intrusion Analysis, threat intelligence, threat hunting.
Identity and access management
Endpoint Security
Network security
SOC operations – Phishing and email analysis, SIEM, SOAR
Introduction to Risk Management
Security Policies, standards, procedures and guidelines
Introduction to cloud security
Project
Microsoft SC 900 preparation and certification exam
The course is for you if you...
are an analytical thinker and listener
like to problem solve and challenge yourself
are sensible to digital ethics
you are flexible and adaptive when considering possible solutions to problems
are passionate about learning, as this field is in constant development and has infinite branches
The skills needed to become a cybersecurity professional are varied and extensive. For example, being able to:
understand the complex processes of the industry, while being able to think critically and solve problems
understand how networks work, how they are built, and how they can be broken, how the software works and what vulnerabilities it has
knowledge of networking protocols, data structures, and design patterns, basics of coding
understanding of defensive strategies such as penetration testing or vulnerability assessment