Cyber Security

Category:

Description

                                                   Curriculum 

DOMAIN 1: General Security Concepts

Lesson 1.1 – Core Security Principles

  • Confidentiality, Integrity, Availability (CIA triad)
  • Authentication, Authorization, and Accounting (AAA)
  • Non-repudiation and least privilege
  • Security controls: administrative, technical, physical

Lesson 1.2 – Threat Actors & Motivations

  • Nation-state, hacktivist, insider, criminal syndicate
  • Attributes: capability, intent, targeting
  • Threat intelligence sources

Lesson 1.3 – Security Frameworks & Policies

  • NIST, ISO 27001, CIS Controls, COBIT
  • Security policies: acceptable use, onboarding, password, data retention
  • Governance, risk, and compliance (GRC) fundamentals

DOMAIN 2: Threats, Vulnerabilities, and Mitigations

Lesson 2.1 – Common Attack Types

  • Phishing, spear-phishing, whaling, smishing
  • Ransomware, spyware, worms, rootkits, trojans
  • Password attacks: brute force, dictionary, credential stuffing

Lesson 2.2 – Network Attacks

  • Man-in-the-Middle (MITM), DoS/DDoS, replay, ARP poisoning
  • DNS hijacking, rogue DHCP, VLAN hopping

Lesson 2.3 – Application Attacks

  • SQL injection, XSS, CSRF, command injection
  • Secure coding practices and patch management

Lesson 2.4 – Vulnerability Management

  • Vulnerability lifecycle: discovery, prioritization, remediation, verification
  • CVE, CVSS, NVD usage
  • Patch management and remediation tracking
  • Continuous assessment and reporting

Lesson 2.5 – Threat Modeling & Risk Analysis

  • Attack surface analysis
  • Qualitative vs quantitative risk
  • Risk response: avoid, transfer, mitigate, accept

DOMAIN 3: Security Architecture

Lesson 3.1 – Network Security Design

  • Network segmentation and isolation
  • Zero Trust Architecture principles
  • Secure baseline configuration

Lesson 3.2 – System Hardening

  • Operating system and application hardening
  • Disable unnecessary services, least privilege
  • Firmware security, patch management

Lesson 3.3 – Security Techniques

  • Encryption, hashing, digital signatures
  • VPNs, PKI, steganography
  • Obfuscation, tokenization, non-repudiation

Lesson 3.4 – Identity and Access Management (IAM)

  • Authentication factors (MFA)
  • SSO, federation, LDAP, Kerberos, RADIUS, TACACS+
  • Role-based, attribute-based, and rule-based access

Lesson 3.5 – Cloud and Virtualization Security

  • Shared responsibility model
  • Cloud service types (IaaS, PaaS, SaaS)
  • Secure containers, microservices, APIs

DOMAIN 4: Security Operations

Lesson 4.1 – Alerting and Monitoring

  • SIEM, SOAR, IDS/IPS, EDR/XDR
  • Event correlation and log management
  • Alert severity, MTTD, MTTR metrics

Lesson 4.2 – Incident Response

  • Incident response lifecycle: Preparation, Detection, Containment, Eradication, Recovery, Lessons Learned
  • Playbooks and escalation procedures
  • Digital forensics basics

Lesson 4.3 – Business Continuity & Disaster Recovery

  • BCP, DRP, RTO, RPO concepts
  • Backup strategies: full, incremental, differential
  • Redundancy and fault tolerance

Lesson 4.4 – Change and Configuration Management

  • Baselines, drift detection, version control
  • Secure change management procedures

Lesson 4.5 – Physical and Environmental Security

  • CCTV, locks, alarms, mantraps, biometric access
  • Environmental controls: HVAC, UPS, fire suppression

DOMAIN 5: Security Program Management and Governance

Lesson 5.1 – Security Awareness and Training

  • Social engineering prevention
  • Phishing simulations
  • Employee onboarding and offboarding security

Lesson 5.2 – Security Assessments and Audits

  • Penetration testing vs vulnerability scanning
  • Red team / blue team / purple team exercises
  • Audit logs and compliance reporting

Lesson 5.3 – Risk and Compliance Management

  • Legal and regulatory considerations (GDPR, HIPAA, PCI DSS)
  • Privacy impact assessments (PIA)
  • Third-party risk management

Lesson 5.4 – Continuous Improvement

  • Metrics and reporting
  • Lessons learned documentation
  • Updating playbooks and baselines

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.